* [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update @ 2023-08-16 21:15 VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) VivianNK ` (8 more replies) 0 siblings, 9 replies; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel v1 -> v2: - Update commit message to explain the audit only mode change is temporary to prevent intermediate CI failures. - Format patch Cc's correctly v1 archive:https://edk2.groups.io/g/devel/message/107665 VivianNK (7): .pytool: Set uncrustify check to audit only (temporary) .pytool: Add cpp support to uncrustify plugin MdeModulePkg: Apply uncrustify formatting to relevant files. MdePkg: Apply uncrustify formatting to relevant files SecurityPkg: Apply uncrustify formatting to relevant files UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files .pytool: Undo uncrustify check change .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- .pytool/Plugin/UncrustifyCheck/uncrustify.cfg | 4 +- MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp | 37 +- MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h | 4 +- MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp | 8 +- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp | 114 ++-- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp | 114 ++-- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp | 563 ++++++++++---------- MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h | 6 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h | 6 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h | 4 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h | 4 +- MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp | 40 +- MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp | 52 +- MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp | 6 +- MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp | 12 +- SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp | 205 ++++--- SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h | 4 +- SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp | 4 +- UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h | 2 +- UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp | 76 +-- 21 files changed, 664 insertions(+), 603 deletions(-) -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107809): https://edk2.groups.io/g/devel/message/107809 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 22:09 ` Michael Kubacki 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 2/7] .pytool: Add cpp support to uncrustify plugin VivianNK ` (7 subsequent siblings) 8 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Sean Brogan, Michael Kubacki, Michael D Kinney, Liming Gao Temporarily set uncrustify to audit only mode so the following commits can adjust the code for new formatting settings before those settings are applied. Cc: Sean Brogan <sean.brogan@microsoft.com> Cc: Michael Kubacki <mikuback@linux.microsoft.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Liming Gao <gaoliming@byosoft.com.cn> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> --- .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py index 8dc9ffe6945a..8978ffc443bf 100644 --- a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py +++ b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py @@ -530,7 +530,7 @@ class UncrustifyCheck(ICiBuildPlugin): """ Initializes options that influence test case output. """ - self._audit_only_mode = False + self._audit_only_mode = True self._output_file_diffs = True if "AuditOnly" in self._package_config and self._package_config["AuditOnly"]: -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107810): https://edk2.groups.io/g/devel/message/107810 Mute This Topic: https://groups.io/mt/100788666/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) VivianNK @ 2023-08-16 22:09 ` Michael Kubacki 0 siblings, 0 replies; 19+ messages in thread From: Michael Kubacki @ 2023-08-16 22:09 UTC (permalink / raw) To: VivianNK, devel; +Cc: Sean Brogan, Michael D Kinney, Liming Gao Reviewed-by: Michael Kubacki <michael.kubacki@microsoft.com> On 8/16/2023 5:15 PM, VivianNK wrote: > Temporarily set uncrustify to audit only mode so the following commits can adjust the code for new formatting settings before those settings are applied. > > Cc: Sean Brogan <sean.brogan@microsoft.com> > Cc: Michael Kubacki <mikuback@linux.microsoft.com> > Cc: Michael D Kinney <michael.d.kinney@intel.com> > Cc: Liming Gao <gaoliming@byosoft.com.cn> > Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > --- > .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > index 8dc9ffe6945a..8978ffc443bf 100644 > --- a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > +++ b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > @@ -530,7 +530,7 @@ class UncrustifyCheck(ICiBuildPlugin): > """ > > Initializes options that influence test case output. > > """ > > - self._audit_only_mode = False > > + self._audit_only_mode = True > > self._output_file_diffs = True > > > > if "AuditOnly" in self._package_config and self._package_config["AuditOnly"]: > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107817): https://edk2.groups.io/g/devel/message/107817 Mute This Topic: https://groups.io/mt/100788666/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 2/7] .pytool: Add cpp support to uncrustify plugin 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 3/7] MdeModulePkg: Apply uncrustify formatting to relevant files VivianNK ` (6 subsequent siblings) 8 siblings, 0 replies; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel Cc: Sean Brogan, Michael Kubacki, Michael D Kinney, Liming Gao, Michael Kubacki Modified the uncrustify config to apply cpp specific formatting rules. Modified uncrustify check to include *.cpp files. Cc: Sean Brogan <sean.brogan@microsoft.com> Cc: Michael Kubacki <mikuback@linux.microsoft.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Liming Gao <gaoliming@byosoft.com.cn> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> Reviewed-by: Michael Kubacki <michael.kubacki@microsoft.com> --- .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- .pytool/Plugin/UncrustifyCheck/uncrustify.cfg | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py index 8978ffc443bf..17f77b48d954 100644 --- a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py +++ b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py @@ -110,7 +110,7 @@ class UncrustifyCheck(ICiBuildPlugin): # A package can add any additional paths with "AdditionalIncludePaths" # A package can remove any of these paths with "IgnoreStandardPaths" # - STANDARD_PLUGIN_DEFINED_PATHS = ("*.c", "*.h") + STANDARD_PLUGIN_DEFINED_PATHS = ("*.c", "*.h", "*.cpp") # # The Uncrustify application path should set in this environment variable diff --git a/.pytool/Plugin/UncrustifyCheck/uncrustify.cfg b/.pytool/Plugin/UncrustifyCheck/uncrustify.cfg index 8506c3333715..d7e86a6e57e6 100644 --- a/.pytool/Plugin/UncrustifyCheck/uncrustify.cfg +++ b/.pytool/Plugin/UncrustifyCheck/uncrustify.cfg @@ -215,7 +215,7 @@ indent_braces = false indent_braces_no_class = false indent_braces_no_func = true indent_braces_no_struct = false -indent_class = false +indent_class = true indent_class_colon = false indent_cmt_with_tabs = false # Whether to indent comments that are not at a brace level with tabs on # a tabstop. Requires indent_with_tabs=2. If false, will use spaces. @@ -223,7 +223,7 @@ indent_col1_comment = true indent_col1_multi_string_literal= true indent_comma_paren = true indent_else_if = true -indent_extern = false +indent_extern = true indent_first_bool_expr = true indent_func_def_param_paren_pos_threshold = 0 -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107811): https://edk2.groups.io/g/devel/message/107811 Mute This Topic: https://groups.io/mt/100788667/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 3/7] MdeModulePkg: Apply uncrustify formatting to relevant files. 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 2/7] .pytool: Add cpp support to uncrustify plugin VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 4/7] MdePkg: " VivianNK ` (5 subsequent siblings) 8 siblings, 0 replies; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Jian J Wang, Liming Gao, Hao A Wu, Ray Ni Apply uncrustify formatting to GoogleTest cpp files and respective header file. Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Liming Gao <gaoliming@byosoft.com.cn> Cc: Hao A Wu <hao.a.wu@intel.com> Cc: Ray Ni <ray.ni@intel.com> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> --- MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp | 37 +++++++++++--------- MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h | 4 +-- MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp | 8 ++--- 3 files changed, 27 insertions(+), 22 deletions(-) diff --git a/MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp b/MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp index 23f6e9cc0611..16986a512fa3 100644 --- a/MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp +++ b/MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp @@ -20,9 +20,9 @@ CompareUint32 ( IN CONST VOID *Right ) { - if (*(UINT32*)Right > *(UINT32*)Left) { + if (*(UINT32 *)Right > *(UINT32 *)Left) { return 1; - } else if (*(UINT32*)Right < *(UINT32*)Left) { + } else if (*(UINT32 *)Right < *(UINT32 *)Left) { return -1; } @@ -31,31 +31,36 @@ CompareUint32 ( // Test PerformQuickSort() API from UefiSortLib to verify a UINT32 array // with 9 elements in ascending order is sorted into descending order. -TEST(PerformQuickSortTest, SortUint32AscendingArray_Size9) { - CONST UINT32 ArraySize = 9; - UINT32 BuffActual[ArraySize]; - UINT32 BuffExpected[ArraySize]; +TEST (PerformQuickSortTest, SortUint32AscendingArray_Size9) { + CONST UINT32 ArraySize = 9; + UINT32 BuffActual[ArraySize]; + UINT32 BuffExpected[ArraySize]; for (UINT32 Index = 0; Index < ArraySize; Index++) { - BuffActual[Index] = Index + 1; + BuffActual[Index] = Index + 1; BuffExpected[Index] = ArraySize - Index; } - PerformQuickSort (BuffActual, (UINTN)ArraySize, sizeof(UINT32), (SORT_COMPARE)CompareUint32); - EXPECT_THAT(BuffActual, ElementsAreArray(BuffExpected, ArraySize)); + PerformQuickSort (BuffActual, (UINTN)ArraySize, sizeof (UINT32), (SORT_COMPARE)CompareUint32); + EXPECT_THAT (BuffActual, ElementsAreArray (BuffExpected, ArraySize)); } // Test StringCompare() API from UefiSortLib to verify the comparison // succeeds when the same buffer is compared with itself. -TEST(StringCompareTest, CompareSameBuffer) { - INTN RetVal; - CONST CHAR16 *Buffer = (CHAR16*)L"abcdefg"; +TEST (StringCompareTest, CompareSameBuffer) { + INTN RetVal; + CONST CHAR16 *Buffer = (CHAR16 *)L"abcdefg"; RetVal = StringCompare (&Buffer, &Buffer); - EXPECT_EQ(RetVal, 0); + EXPECT_EQ (RetVal, 0); } -int main(int argc, char* argv[]) { - testing::InitGoogleTest(&argc, argv); - return RUN_ALL_TESTS(); +int +main ( + int argc, + char *argv[] + ) +{ + testing::InitGoogleTest (&argc, argv); + return RUN_ALL_TESTS (); } diff --git a/MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h b/MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h index a63bed895c60..51eefa6c21e8 100644 --- a/MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h +++ b/MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h @@ -11,8 +11,8 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <Uefi.h> -#include <Library/PciHostBridgeLib.h> + #include <Uefi.h> + #include <Library/PciHostBridgeLib.h> } struct MockPciHostBridgeLib { diff --git a/MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp b/MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp index 4b15aed16966..1891727d3b2a 100644 --- a/MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp +++ b/MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBridgeLib.cpp @@ -7,8 +7,8 @@ #include <GoogleTest/Library/MockPciHostBridgeLib.h> -MOCK_INTERFACE_DEFINITION(MockPciHostBridgeLib); +MOCK_INTERFACE_DEFINITION (MockPciHostBridgeLib); -MOCK_FUNCTION_DEFINITION(MockPciHostBridgeLib, PciHostBridgeGetRootBridges, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPciHostBridgeLib, PciHostBridgeFreeRootBridges, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPciHostBridgeLib, PciHostBridgeResourceConflict, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPciHostBridgeLib, PciHostBridgeGetRootBridges, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPciHostBridgeLib, PciHostBridgeFreeRootBridges, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPciHostBridgeLib, PciHostBridgeResourceConflict, 2, EFIAPI); -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107812): https://edk2.groups.io/g/devel/message/107812 Mute This Topic: https://groups.io/mt/100788668/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 4/7] MdePkg: Apply uncrustify formatting to relevant files 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (2 preceding siblings ...) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 3/7] MdeModulePkg: Apply uncrustify formatting to relevant files VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 5/7] SecurityPkg: " VivianNK ` (4 subsequent siblings) 8 siblings, 0 replies; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Michael D Kinney, Liming Gao, Zhiguang Liu Apply uncrustify formatting to GoogleTest cpp and header files. Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Liming Gao <gaoliming@byosoft.com.cn> Cc: Zhiguang Liu <zhiguang.liu@intel.com> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> --- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp | 114 ++-- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp | 114 ++-- MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp | 563 ++++++++++---------- MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h | 6 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h | 6 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h | 4 +- MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h | 4 +- MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp | 40 +- MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp | 52 +- MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp | 6 +- MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp | 12 +- 11 files changed, 463 insertions(+), 458 deletions(-) diff --git a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp index 6fbf302c1c5e..3f50f0cd99db 100644 --- a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp +++ b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32.cpp @@ -14,10 +14,10 @@ extern "C" { #include <Library/SafeIntLib.h> } -TEST(ConversionTestSuite, TestSafeInt32ToUintn) { +TEST (ConversionTestSuite, TestSafeInt32ToUintn) { RETURN_STATUS Status; - INT32 Operand; - UINTN Result; + INT32 Operand; + UINTN Result; // // If Operand is non-negative, then it's a cast @@ -36,10 +36,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToIntn) { +TEST (ConversionTestSuite, TestSafeUint32ToIntn) { RETURN_STATUS Status; - UINT32 Operand; - INTN Result; + UINT32 Operand; + INTN Result; // // If Operand is <= MAX_INTN, then it's a cast @@ -58,10 +58,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToInt32) { +TEST (ConversionTestSuite, TestSafeIntnToInt32) { RETURN_STATUS Status; - INTN Operand; - INT32 Result; + INTN Operand; + INT32 Result; // // INTN is same as INT32 in IA32, so this is just a cast @@ -73,10 +73,10 @@ TEST(ConversionTestSuite, TestSafeIntnToInt32) { ASSERT_EQ (0x5bababab, Result); } -TEST(ConversionTestSuite, TestSafeIntnToUint32) { +TEST (ConversionTestSuite, TestSafeIntnToUint32) { RETURN_STATUS Status; - INTN Operand; - UINT32 Result; + INTN Operand; + UINT32 Result; // // If Operand is non-negative, then it's a cast @@ -95,10 +95,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToUint32) { +TEST (ConversionTestSuite, TestSafeUintnToUint32) { RETURN_STATUS Status; - UINTN Operand; - UINT32 Result; + UINTN Operand; + UINT32 Result; // // UINTN is same as UINT32 in IA32, so this is just a cast @@ -110,10 +110,10 @@ TEST(ConversionTestSuite, TestSafeUintnToUint32) { ASSERT_EQ (0xabababab, Result); } -TEST(ConversionTestSuite, TestSafeUintnToIntn) { +TEST (ConversionTestSuite, TestSafeUintnToIntn) { RETURN_STATUS Status; - UINTN Operand; - INTN Result; + UINTN Operand; + INTN Result; // // If Operand is <= MAX_INTN, then it's a cast @@ -132,10 +132,10 @@ TEST(ConversionTestSuite, TestSafeUintnToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToInt64) { +TEST (ConversionTestSuite, TestSafeUintnToInt64) { RETURN_STATUS Status; - UINTN Operand; - INT64 Result; + UINTN Operand; + INT64 Result; // // UINTN is same as UINT32 in IA32, and UINT32 is a subset of @@ -148,10 +148,10 @@ TEST(ConversionTestSuite, TestSafeUintnToInt64) { ASSERT_EQ (0xabababab, Result); } -TEST(ConversionTestSuite, TestSafeInt64ToIntn) { +TEST (ConversionTestSuite, TestSafeInt64ToIntn) { RETURN_STATUS Status; - INT64 Operand; - INTN Result; + INT64 Operand; + INTN Result; // // If Operand is between MIN_INTN and MAX_INTN2 inclusive, then it's a cast @@ -179,10 +179,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToUintn) { +TEST (ConversionTestSuite, TestSafeInt64ToUintn) { RETURN_STATUS Status; - INT64 Operand; - UINTN Result; + INT64 Operand; + UINTN Result; // // If Operand is between 0 and MAX_UINTN inclusive, then it's a cast @@ -205,10 +205,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToIntn) { +TEST (ConversionTestSuite, TestSafeUint64ToIntn) { RETURN_STATUS Status; - UINT64 Operand; - INTN Result; + UINT64 Operand; + INTN Result; // // If Operand is <= MAX_INTN, then it's a cast @@ -227,10 +227,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToUintn) { +TEST (ConversionTestSuite, TestSafeUint64ToUintn) { RETURN_STATUS Status; - UINT64 Operand; - UINTN Result; + UINT64 Operand; + UINTN Result; // // If Operand is <= MAX_UINTN, then it's a cast @@ -249,11 +249,11 @@ TEST(ConversionTestSuite, TestSafeUint64ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUintnAdd) { +TEST (AdditionSubtractionTestSuite, TestSafeUintnAdd) { RETURN_STATUS Status; - UINTN Augend; - UINTN Addend; - UINTN Result; + UINTN Augend; + UINTN Addend; + UINTN Result; // // If the result of addition doesn't overflow MAX_UINTN, then it's addition @@ -274,11 +274,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUintnAdd) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeIntnAdd) { +TEST (AdditionSubtractionTestSuite, TestSafeIntnAdd) { RETURN_STATUS Status; - INTN Augend; - INTN Addend; - INTN Result; + INTN Augend; + INTN Addend; + INTN Result; // // If the result of addition doesn't overflow MAX_INTN @@ -311,11 +311,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeIntnAdd) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUintnSub) { +TEST (AdditionSubtractionTestSuite, TestSafeUintnSub) { RETURN_STATUS Status; - UINTN Minuend; - UINTN Subtrahend; - UINTN Result; + UINTN Minuend; + UINTN Subtrahend; + UINTN Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -336,11 +336,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUintnSub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeIntnSub) { +TEST (AdditionSubtractionTestSuite, TestSafeIntnSub) { RETURN_STATUS Status; - INTN Minuend; - INTN Subtrahend; - INTN Result; + INTN Minuend; + INTN Subtrahend; + INTN Result; // // If the result of subtractions doesn't overflow MAX_INTN or @@ -373,11 +373,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeIntnSub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeUintnMult) { +TEST (MultiplicationTestSuite, TestSafeUintnMult) { RETURN_STATUS Status; - UINTN Multiplicand; - UINTN Multiplier; - UINTN Result; + UINTN Multiplicand; + UINTN Multiplier; + UINTN Result; // // If the result of multiplication doesn't overflow MAX_UINTN, it will succeed @@ -398,11 +398,11 @@ TEST(MultiplicationTestSuite, TestSafeUintnMult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeIntnMult) { +TEST (MultiplicationTestSuite, TestSafeIntnMult) { RETURN_STATUS Status; - INTN Multiplicand; - INTN Multiplier; - INTN Result; + INTN Multiplicand; + INTN Multiplier; + INTN Result; // // If the result of multiplication doesn't overflow MAX_INTN and doesn't diff --git a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp index 6fb0710cfed6..6efdd3be7c5e 100644 --- a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp +++ b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64.cpp @@ -14,10 +14,10 @@ extern "C" { #include <Library/SafeIntLib.h> } -TEST(ConversionTestSuite, TestSafeInt32ToUintn) { +TEST (ConversionTestSuite, TestSafeInt32ToUintn) { RETURN_STATUS Status; - INT32 Operand; - UINTN Result; + INT32 Operand; + UINTN Result; // // If Operand is non-negative, then it's a cast @@ -36,10 +36,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToIntn) { +TEST (ConversionTestSuite, TestSafeUint32ToIntn) { RETURN_STATUS Status; - UINT32 Operand; - INTN Result; + UINT32 Operand; + INTN Result; // // For x64, INTN is same as INT64 which is a superset of INT32 @@ -56,10 +56,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToIntn) { ASSERT_EQ (0xabababab, Result); } -TEST(ConversionTestSuite, TestSafeIntnToInt32) { +TEST (ConversionTestSuite, TestSafeIntnToInt32) { RETURN_STATUS Status; - INTN Operand; - INT32 Result; + INTN Operand; + INT32 Result; // // If Operand is between MIN_INT32 and MAX_INT32 inclusive, then it's a cast @@ -87,10 +87,10 @@ TEST(ConversionTestSuite, TestSafeIntnToInt32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToUint32) { +TEST (ConversionTestSuite, TestSafeIntnToUint32) { RETURN_STATUS Status; - INTN Operand; - UINT32 Result; + INTN Operand; + UINT32 Result; // // If Operand is between 0 and MAX_UINT32 inclusive, then it's a cast @@ -113,10 +113,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToUint32) { +TEST (ConversionTestSuite, TestSafeUintnToUint32) { RETURN_STATUS Status; - UINTN Operand; - UINT32 Result; + UINTN Operand; + UINT32 Result; // // If Operand is <= MAX_UINT32, then it's a cast @@ -135,10 +135,10 @@ TEST(ConversionTestSuite, TestSafeUintnToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToIntn) { +TEST (ConversionTestSuite, TestSafeUintnToIntn) { RETURN_STATUS Status; - UINTN Operand; - INTN Result; + UINTN Operand; + INTN Result; // // If Operand is <= MAX_INTN (0x7fff_ffff_ffff_ffff), then it's a cast @@ -157,10 +157,10 @@ TEST(ConversionTestSuite, TestSafeUintnToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToInt64) { +TEST (ConversionTestSuite, TestSafeUintnToInt64) { RETURN_STATUS Status; - UINTN Operand; - INT64 Result; + UINTN Operand; + INT64 Result; // // If Operand is <= MAX_INT64, then it's a cast @@ -179,10 +179,10 @@ TEST(ConversionTestSuite, TestSafeUintnToInt64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToIntn) { +TEST (ConversionTestSuite, TestSafeInt64ToIntn) { RETURN_STATUS Status; - INT64 Operand; - INTN Result; + INT64 Operand; + INTN Result; // // INTN is same as INT64 in x64, so this is just a cast @@ -194,10 +194,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToIntn) { ASSERT_EQ (0x5babababefefefef, Result); } -TEST(ConversionTestSuite, TestSafeInt64ToUintn) { +TEST (ConversionTestSuite, TestSafeInt64ToUintn) { RETURN_STATUS Status; - INT64 Operand; - UINTN Result; + INT64 Operand; + UINTN Result; // // If Operand is non-negative, then it's a cast @@ -216,10 +216,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToIntn) { +TEST (ConversionTestSuite, TestSafeUint64ToIntn) { RETURN_STATUS Status; - UINT64 Operand; - INTN Result; + UINT64 Operand; + INTN Result; // // If Operand is <= MAX_INTN (0x7fff_ffff_ffff_ffff), then it's a cast @@ -238,10 +238,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToIntn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToUintn) { +TEST (ConversionTestSuite, TestSafeUint64ToUintn) { RETURN_STATUS Status; - UINT64 Operand; - UINTN Result; + UINT64 Operand; + UINTN Result; // // UINTN is same as UINT64 in x64, so this is just a cast @@ -253,11 +253,11 @@ TEST(ConversionTestSuite, TestSafeUint64ToUintn) { ASSERT_EQ (0xababababefefefef, Result); } -TEST(AdditionSubtractionTestSuite, TestSafeUintnAdd) { +TEST (AdditionSubtractionTestSuite, TestSafeUintnAdd) { RETURN_STATUS Status; - UINTN Augend; - UINTN Addend; - UINTN Result; + UINTN Augend; + UINTN Addend; + UINTN Result; // // If the result of addition doesn't overflow MAX_UINTN, then it's addition @@ -278,11 +278,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUintnAdd) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeIntnAdd) { +TEST (AdditionSubtractionTestSuite, TestSafeIntnAdd) { RETURN_STATUS Status; - INTN Augend; - INTN Addend; - INTN Result; + INTN Augend; + INTN Addend; + INTN Result; // // If the result of addition doesn't overflow MAX_INTN @@ -315,11 +315,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeIntnAdd) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUintnSub) { +TEST (AdditionSubtractionTestSuite, TestSafeUintnSub) { RETURN_STATUS Status; - UINTN Minuend; - UINTN Subtrahend; - UINTN Result; + UINTN Minuend; + UINTN Subtrahend; + UINTN Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -340,11 +340,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUintnSub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeIntnSub) { +TEST (AdditionSubtractionTestSuite, TestSafeIntnSub) { RETURN_STATUS Status; - INTN Minuend; - INTN Subtrahend; - INTN Result; + INTN Minuend; + INTN Subtrahend; + INTN Result; // // If the result of subtractions doesn't overflow MAX_INTN or @@ -377,11 +377,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeIntnSub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeUintnMult) { +TEST (MultiplicationTestSuite, TestSafeUintnMult) { RETURN_STATUS Status; - UINTN Multiplicand; - UINTN Multiplier; - UINTN Result; + UINTN Multiplicand; + UINTN Multiplier; + UINTN Result; // // If the result of multiplication doesn't overflow MAX_UINTN, it will succeed @@ -402,11 +402,11 @@ TEST(MultiplicationTestSuite, TestSafeUintnMult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeIntnMult) { +TEST (MultiplicationTestSuite, TestSafeIntnMult) { RETURN_STATUS Status; - INTN Multiplicand; - INTN Multiplier; - INTN Result; + INTN Multiplicand; + INTN Multiplier; + INTN Result; // // If the result of multiplication doesn't overflow MAX_INTN and doesn't diff --git a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp index 1fd51067a1f3..857ab4d1d36c 100644 --- a/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp +++ b/MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp @@ -15,10 +15,10 @@ extern "C" { // // Conversion function tests: // -TEST(ConversionTestSuite, TestSafeInt8ToUint8) { +TEST (ConversionTestSuite, TestSafeInt8ToUint8) { RETURN_STATUS Status; - INT8 Operand; - UINT8 Result; + INT8 Operand; + UINT8 Result; // // Positive UINT8 should result in just a cast @@ -37,10 +37,10 @@ TEST(ConversionTestSuite, TestSafeInt8ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt8ToUint16) { +TEST (ConversionTestSuite, TestSafeInt8ToUint16) { RETURN_STATUS Status; - INT8 Operand; - UINT16 Result; + INT8 Operand; + UINT16 Result; // // Positive UINT8 should result in just a cast @@ -59,10 +59,10 @@ TEST(ConversionTestSuite, TestSafeInt8ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt8ToUint32) { +TEST (ConversionTestSuite, TestSafeInt8ToUint32) { RETURN_STATUS Status; - INT8 Operand; - UINT32 Result; + INT8 Operand; + UINT32 Result; // // Positive UINT8 should result in just a cast @@ -81,10 +81,10 @@ TEST(ConversionTestSuite, TestSafeInt8ToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt8ToUintn) { +TEST (ConversionTestSuite, TestSafeInt8ToUintn) { RETURN_STATUS Status; - INT8 Operand; - UINTN Result; + INT8 Operand; + UINTN Result; // // Positive UINT8 should result in just a cast @@ -103,10 +103,10 @@ TEST(ConversionTestSuite, TestSafeInt8ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt8ToUint64) { +TEST (ConversionTestSuite, TestSafeInt8ToUint64) { RETURN_STATUS Status; - INT8 Operand; - UINT64 Result; + INT8 Operand; + UINT64 Result; // // Positive UINT8 should result in just a cast @@ -125,10 +125,10 @@ TEST(ConversionTestSuite, TestSafeInt8ToUint64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint8ToInt8) { +TEST (ConversionTestSuite, TestSafeUint8ToInt8) { RETURN_STATUS Status; - UINT8 Operand; - INT8 Result; + UINT8 Operand; + INT8 Result; // // Operand <= 0x7F (MAX_INT8) should result in a cast @@ -147,10 +147,10 @@ TEST(ConversionTestSuite, TestSafeUint8ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint8ToChar8) { +TEST (ConversionTestSuite, TestSafeUint8ToChar8) { RETURN_STATUS Status; - UINT8 Operand; - CHAR8 Result; + UINT8 Operand; + CHAR8 Result; // // CHAR8 is typedefed as char, which by default is signed, thus @@ -174,10 +174,10 @@ TEST(ConversionTestSuite, TestSafeUint8ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToInt8) { +TEST (ConversionTestSuite, TestSafeInt16ToInt8) { RETURN_STATUS Status; - INT16 Operand; - INT8 Result; + INT16 Operand; + INT8 Result; // // If Operand is between MIN_INT8 and MAX_INT8 inclusive, then it's a cast @@ -205,10 +205,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToChar8) { +TEST (ConversionTestSuite, TestSafeInt16ToChar8) { RETURN_STATUS Status; - INT16 Operand; - CHAR8 Result; + INT16 Operand; + CHAR8 Result; // // CHAR8 is typedefed as char, which may be signed or unsigned based @@ -252,10 +252,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToUint8) { +TEST (ConversionTestSuite, TestSafeInt16ToUint8) { RETURN_STATUS Status; - INT16 Operand; - UINT8 Result; + INT16 Operand; + UINT8 Result; // // If Operand is between 0 and MAX_INT8 inclusive, then it's a cast @@ -278,10 +278,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToUint16) { +TEST (ConversionTestSuite, TestSafeInt16ToUint16) { RETURN_STATUS Status; - INT16 Operand = 0x5b5b; - UINT16 Result = 0; + INT16 Operand = 0x5b5b; + UINT16 Result = 0; // // If Operand is non-negative, then it's a cast @@ -298,10 +298,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToUint32) { +TEST (ConversionTestSuite, TestSafeInt16ToUint32) { RETURN_STATUS Status; - INT16 Operand; - UINT32 Result; + INT16 Operand; + UINT32 Result; // // If Operand is non-negative, then it's a cast @@ -320,10 +320,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToUintn) { +TEST (ConversionTestSuite, TestSafeInt16ToUintn) { RETURN_STATUS Status; - INT16 Operand; - UINTN Result; + INT16 Operand; + UINTN Result; // // If Operand is non-negative, then it's a cast @@ -342,10 +342,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt16ToUint64) { +TEST (ConversionTestSuite, TestSafeInt16ToUint64) { RETURN_STATUS Status; - INT16 Operand; - UINT64 Result; + INT16 Operand; + UINT64 Result; // // If Operand is non-negative, then it's a cast @@ -364,10 +364,10 @@ TEST(ConversionTestSuite, TestSafeInt16ToUint64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint16ToInt8) { +TEST (ConversionTestSuite, TestSafeUint16ToInt8) { RETURN_STATUS Status; - UINT16 Operand; - INT8 Result; + UINT16 Operand; + INT8 Result; // // If Operand is <= MAX_INT8, it's a cast @@ -386,10 +386,10 @@ TEST(ConversionTestSuite, TestSafeUint16ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint16ToChar8) { +TEST (ConversionTestSuite, TestSafeUint16ToChar8) { RETURN_STATUS Status; - UINT16 Operand; - CHAR8 Result; + UINT16 Operand; + CHAR8 Result; // CHAR8 is typedefed as char, which by default is signed, thus // CHAR8 is same as INT8, so same tests as above: @@ -411,10 +411,10 @@ TEST(ConversionTestSuite, TestSafeUint16ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint16ToUint8) { +TEST (ConversionTestSuite, TestSafeUint16ToUint8) { RETURN_STATUS Status; - UINT16 Operand; - UINT8 Result; + UINT16 Operand; + UINT8 Result; // // If Operand is <= MAX_UINT8 (0xff), it's a cast @@ -433,10 +433,10 @@ TEST(ConversionTestSuite, TestSafeUint16ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint16ToInt16) { +TEST (ConversionTestSuite, TestSafeUint16ToInt16) { RETURN_STATUS Status; - UINT16 Operand; - INT16 Result; + UINT16 Operand; + INT16 Result; // // If Operand is <= MAX_INT16 (0x7fff), it's a cast @@ -455,10 +455,10 @@ TEST(ConversionTestSuite, TestSafeUint16ToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToInt8) { +TEST (ConversionTestSuite, TestSafeInt32ToInt8) { RETURN_STATUS Status; - INT32 Operand; - INT8 Result; + INT32 Operand; + INT8 Result; // // If Operand is between MIN_INT8 and MAX_INT8 inclusive, then it's a cast @@ -486,10 +486,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToChar8) { +TEST (ConversionTestSuite, TestSafeInt32ToChar8) { RETURN_STATUS Status; - INT32 Operand; - CHAR8 Result; + INT32 Operand; + CHAR8 Result; // // CHAR8 is typedefed as char, which may be signed or unsigned based @@ -533,10 +533,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToUint8) { +TEST (ConversionTestSuite, TestSafeInt32ToUint8) { RETURN_STATUS Status; - INT32 Operand; - UINT8 Result; + INT32 Operand; + UINT8 Result; // // If Operand is between 0 and MAX_INT8 inclusive, then it's a cast @@ -563,10 +563,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToInt16) { +TEST (ConversionTestSuite, TestSafeInt32ToInt16) { RETURN_STATUS Status; - INT32 Operand; - INT16 Result; + INT32 Operand; + INT16 Result; // // If Operand is between MIN_INT16 and MAX_INT16 inclusive, then it's a cast @@ -594,10 +594,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToUint16) { +TEST (ConversionTestSuite, TestSafeInt32ToUint16) { RETURN_STATUS Status; - INT32 Operand; - UINT16 Result; + INT32 Operand; + UINT16 Result; // // If Operand is between 0 and MAX_UINT16 inclusive, then it's a cast @@ -624,10 +624,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToUint32) { +TEST (ConversionTestSuite, TestSafeInt32ToUint32) { RETURN_STATUS Status; - INT32 Operand; - UINT32 Result; + INT32 Operand; + UINT32 Result; // // If Operand is non-negative, then it's a cast @@ -646,10 +646,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt32ToUint64) { +TEST (ConversionTestSuite, TestSafeInt32ToUint64) { RETURN_STATUS Status; - INT32 Operand; - UINT64 Result; + INT32 Operand; + UINT64 Result; // // If Operand is non-negative, then it's a cast @@ -668,10 +668,10 @@ TEST(ConversionTestSuite, TestSafeInt32ToUint64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToInt8) { +TEST (ConversionTestSuite, TestSafeUint32ToInt8) { RETURN_STATUS Status; - UINT32 Operand; - INT8 Result; + UINT32 Operand; + INT8 Result; // // If Operand is <= MAX_INT8, then it's a cast @@ -690,10 +690,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToChar8) { +TEST (ConversionTestSuite, TestSafeUint32ToChar8) { RETURN_STATUS Status; - UINT32 Operand; - CHAR8 Result; + UINT32 Operand; + CHAR8 Result; // CHAR8 is typedefed as char, which by default is signed, thus // CHAR8 is same as INT8, so same tests as above: @@ -715,10 +715,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToUint8) { +TEST (ConversionTestSuite, TestSafeUint32ToUint8) { RETURN_STATUS Status; - UINT32 Operand; - UINT8 Result; + UINT32 Operand; + UINT8 Result; // // If Operand is <= MAX_UINT8, then it's a cast @@ -737,10 +737,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToInt16) { +TEST (ConversionTestSuite, TestSafeUint32ToInt16) { RETURN_STATUS Status; - UINT32 Operand; - INT16 Result; + UINT32 Operand; + INT16 Result; // // If Operand is <= MAX_INT16, then it's a cast @@ -759,10 +759,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToUint16) { +TEST (ConversionTestSuite, TestSafeUint32ToUint16) { RETURN_STATUS Status; - UINT32 Operand; - UINT16 Result; + UINT32 Operand; + UINT16 Result; // // If Operand is <= MAX_UINT16, then it's a cast @@ -781,10 +781,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint32ToInt32) { +TEST (ConversionTestSuite, TestSafeUint32ToInt32) { RETURN_STATUS Status; - UINT32 Operand; - INT32 Result; + UINT32 Operand; + INT32 Result; // // If Operand is <= MAX_INT32, then it's a cast @@ -803,10 +803,10 @@ TEST(ConversionTestSuite, TestSafeUint32ToInt32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToInt8) { +TEST (ConversionTestSuite, TestSafeIntnToInt8) { RETURN_STATUS Status; - INTN Operand; - INT8 Result; + INTN Operand; + INT8 Result; // // If Operand is between MIN_INT8 and MAX_INT8 inclusive, then it's a cast @@ -834,10 +834,10 @@ TEST(ConversionTestSuite, TestSafeIntnToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToChar8) { +TEST (ConversionTestSuite, TestSafeIntnToChar8) { RETURN_STATUS Status; - INTN Operand; - CHAR8 Result; + INTN Operand; + CHAR8 Result; // // CHAR8 is typedefed as char, which may be signed or unsigned based @@ -881,10 +881,10 @@ TEST(ConversionTestSuite, TestSafeIntnToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToUint8) { +TEST (ConversionTestSuite, TestSafeIntnToUint8) { RETURN_STATUS Status; - INTN Operand; - UINT8 Result; + INTN Operand; + UINT8 Result; // // If Operand is between 0 and MAX_UINT8 inclusive, then it's a cast @@ -907,10 +907,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToInt16) { +TEST (ConversionTestSuite, TestSafeIntnToInt16) { RETURN_STATUS Status; - INTN Operand; - INT16 Result; + INTN Operand; + INT16 Result; // // If Operand is between MIN_INT16 and MAX_INT16 inclusive, then it's a cast @@ -938,10 +938,10 @@ TEST(ConversionTestSuite, TestSafeIntnToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToUint16) { +TEST (ConversionTestSuite, TestSafeIntnToUint16) { RETURN_STATUS Status; - INTN Operand; - UINT16 Result; + INTN Operand; + UINT16 Result; // // If Operand is between 0 and MAX_UINT16 inclusive, then it's a cast @@ -964,10 +964,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToUintn) { +TEST (ConversionTestSuite, TestSafeIntnToUintn) { RETURN_STATUS Status; - INTN Operand; - UINTN Result; + INTN Operand; + UINTN Result; // // If Operand is non-negative, then it's a cast @@ -986,10 +986,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUintn) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeIntnToUint64) { +TEST (ConversionTestSuite, TestSafeIntnToUint64) { RETURN_STATUS Status; - INTN Operand; - UINT64 Result; + INTN Operand; + UINT64 Result; // // If Operand is non-negative, then it's a cast @@ -1008,10 +1008,10 @@ TEST(ConversionTestSuite, TestSafeIntnToUint64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToInt8) { +TEST (ConversionTestSuite, TestSafeUintnToInt8) { RETURN_STATUS Status; - UINTN Operand; - INT8 Result; + UINTN Operand; + INT8 Result; // // If Operand is <= MAX_INT8, then it's a cast @@ -1030,10 +1030,10 @@ TEST(ConversionTestSuite, TestSafeUintnToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToChar8) { +TEST (ConversionTestSuite, TestSafeUintnToChar8) { RETURN_STATUS Status; - UINTN Operand; - CHAR8 Result; + UINTN Operand; + CHAR8 Result; // CHAR8 is typedefed as char, which by default is signed, thus // CHAR8 is same as INT8, so same tests as above: @@ -1055,10 +1055,10 @@ TEST(ConversionTestSuite, TestSafeUintnToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToUint8) { +TEST (ConversionTestSuite, TestSafeUintnToUint8) { RETURN_STATUS Status; - UINTN Operand; - UINT8 Result; + UINTN Operand; + UINT8 Result; // // If Operand is <= MAX_UINT8, then it's a cast @@ -1077,10 +1077,10 @@ TEST(ConversionTestSuite, TestSafeUintnToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToInt16) { +TEST (ConversionTestSuite, TestSafeUintnToInt16) { RETURN_STATUS Status; - UINTN Operand; - INT16 Result; + UINTN Operand; + INT16 Result; // // If Operand is <= MAX_INT16, then it's a cast @@ -1099,10 +1099,10 @@ TEST(ConversionTestSuite, TestSafeUintnToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToUint16) { +TEST (ConversionTestSuite, TestSafeUintnToUint16) { RETURN_STATUS Status; - UINTN Operand; - UINT16 Result; + UINTN Operand; + UINT16 Result; // // If Operand is <= MAX_UINT16, then it's a cast @@ -1121,10 +1121,10 @@ TEST(ConversionTestSuite, TestSafeUintnToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUintnToInt32) { +TEST (ConversionTestSuite, TestSafeUintnToInt32) { RETURN_STATUS Status; - UINTN Operand; - INT32 Result; + UINTN Operand; + INT32 Result; // // If Operand is <= MAX_INT32, then it's a cast @@ -1143,10 +1143,10 @@ TEST(ConversionTestSuite, TestSafeUintnToInt32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToInt8) { +TEST (ConversionTestSuite, TestSafeInt64ToInt8) { RETURN_STATUS Status; - INT64 Operand; - INT8 Result; + INT64 Operand; + INT8 Result; // // If Operand is between MIN_INT8 and MAX_INT8 inclusive, then it's a cast @@ -1174,10 +1174,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToChar8) { +TEST (ConversionTestSuite, TestSafeInt64ToChar8) { RETURN_STATUS Status; - INT64 Operand; - CHAR8 Result; + INT64 Operand; + CHAR8 Result; // // CHAR8 is typedefed as char, which may be signed or unsigned based @@ -1221,10 +1221,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToUint8) { +TEST (ConversionTestSuite, TestSafeInt64ToUint8) { RETURN_STATUS Status; - INT64 Operand; - UINT8 Result; + INT64 Operand; + UINT8 Result; // // If Operand is between 0 and MAX_UINT8 inclusive, then it's a cast @@ -1247,10 +1247,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToInt16) { +TEST (ConversionTestSuite, TestSafeInt64ToInt16) { RETURN_STATUS Status; - INT64 Operand; - INT16 Result; + INT64 Operand; + INT16 Result; // // If Operand is between MIN_INT16 and MAX_INT16 inclusive, then it's a cast @@ -1278,10 +1278,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToUint16) { +TEST (ConversionTestSuite, TestSafeInt64ToUint16) { RETURN_STATUS Status; - INT64 Operand; - UINT16 Result; + INT64 Operand; + UINT16 Result; // // If Operand is between 0 and MAX_UINT16 inclusive, then it's a cast @@ -1304,10 +1304,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToInt32) { +TEST (ConversionTestSuite, TestSafeInt64ToInt32) { RETURN_STATUS Status; - INT64 Operand; - INT32 Result; + INT64 Operand; + INT32 Result; // // If Operand is between MIN_INT32 and MAX_INT32 inclusive, then it's a cast @@ -1335,10 +1335,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToInt32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToUint32) { +TEST (ConversionTestSuite, TestSafeInt64ToUint32) { RETURN_STATUS Status; - INT64 Operand; - UINT32 Result; + INT64 Operand; + UINT32 Result; // // If Operand is between 0 and MAX_UINT32 inclusive, then it's a cast @@ -1361,10 +1361,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeInt64ToUint64) { +TEST (ConversionTestSuite, TestSafeInt64ToUint64) { RETURN_STATUS Status; - INT64 Operand; - UINT64 Result; + INT64 Operand; + UINT64 Result; // // If Operand is non-negative, then it's a cast @@ -1383,10 +1383,10 @@ TEST(ConversionTestSuite, TestSafeInt64ToUint64) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToInt8) { +TEST (ConversionTestSuite, TestSafeUint64ToInt8) { RETURN_STATUS Status; - UINT64 Operand; - INT8 Result; + UINT64 Operand; + INT8 Result; // // If Operand is <= MAX_INT8, then it's a cast @@ -1405,10 +1405,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToInt8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToChar8) { +TEST (ConversionTestSuite, TestSafeUint64ToChar8) { RETURN_STATUS Status; - UINT64 Operand; - CHAR8 Result; + UINT64 Operand; + CHAR8 Result; // CHAR8 is typedefed as char, which by default is signed, thus // CHAR8 is same as INT8, so same tests as above: @@ -1430,10 +1430,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToChar8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToUint8) { +TEST (ConversionTestSuite, TestSafeUint64ToUint8) { RETURN_STATUS Status; - UINT64 Operand; - UINT8 Result; + UINT64 Operand; + UINT8 Result; // // If Operand is <= MAX_UINT8, then it's a cast @@ -1452,10 +1452,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToUint8) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToInt16) { +TEST (ConversionTestSuite, TestSafeUint64ToInt16) { RETURN_STATUS Status; - UINT64 Operand; - INT16 Result; + UINT64 Operand; + INT16 Result; // // If Operand is <= MAX_INT16, then it's a cast @@ -1474,10 +1474,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToInt16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToUint16) { +TEST (ConversionTestSuite, TestSafeUint64ToUint16) { RETURN_STATUS Status; - UINT64 Operand; - UINT16 Result; + UINT64 Operand; + UINT16 Result; // // If Operand is <= MAX_UINT16, then it's a cast @@ -1496,10 +1496,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToUint16) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToInt32) { +TEST (ConversionTestSuite, TestSafeUint64ToInt32) { RETURN_STATUS Status; - UINT64 Operand; - INT32 Result; + UINT64 Operand; + INT32 Result; // // If Operand is <= MAX_INT32, then it's a cast @@ -1518,10 +1518,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToInt32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToUint32) { +TEST (ConversionTestSuite, TestSafeUint64ToUint32) { RETURN_STATUS Status; - UINT64 Operand; - UINT32 Result; + UINT64 Operand; + UINT32 Result; // // If Operand is <= MAX_UINT32, then it's a cast @@ -1540,10 +1540,10 @@ TEST(ConversionTestSuite, TestSafeUint64ToUint32) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(ConversionTestSuite, TestSafeUint64ToInt64) { +TEST (ConversionTestSuite, TestSafeUint64ToInt64) { RETURN_STATUS Status; - UINT64 Operand; - INT64 Result; + UINT64 Operand; + INT64 Result; // // If Operand is <= MAX_INT64, then it's a cast @@ -1565,11 +1565,11 @@ TEST(ConversionTestSuite, TestSafeUint64ToInt64) { // // Addition function tests: // -TEST(AdditionSubtractionTestSuite, TestSafeUint8Add) { +TEST (AdditionSubtractionTestSuite, TestSafeUint8Add) { RETURN_STATUS Status; - UINT8 Augend; - UINT8 Addend; - UINT8 Result; + UINT8 Augend; + UINT8 Addend; + UINT8 Result; // // If the result of addition doesn't overflow MAX_UINT8, then it's addition @@ -1590,11 +1590,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint8Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint16Add) { +TEST (AdditionSubtractionTestSuite, TestSafeUint16Add) { RETURN_STATUS Status; - UINT16 Augend = 0x3a3a; - UINT16 Addend = 0x3a3a; - UINT16 Result = 0; + UINT16 Augend = 0x3a3a; + UINT16 Addend = 0x3a3a; + UINT16 Result = 0; // // If the result of addition doesn't overflow MAX_UINT16, then it's addition @@ -1612,11 +1612,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint16Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint32Add) { +TEST (AdditionSubtractionTestSuite, TestSafeUint32Add) { RETURN_STATUS Status; - UINT32 Augend; - UINT32 Addend; - UINT32 Result; + UINT32 Augend; + UINT32 Addend; + UINT32 Result; // // If the result of addition doesn't overflow MAX_UINT32, then it's addition @@ -1637,11 +1637,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint32Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint64Add) { +TEST (AdditionSubtractionTestSuite, TestSafeUint64Add) { RETURN_STATUS Status; - UINT64 Augend; - UINT64 Addend; - UINT64 Result; + UINT64 Augend; + UINT64 Addend; + UINT64 Result; // // If the result of addition doesn't overflow MAX_UINT64, then it's addition @@ -1662,11 +1662,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint64Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt8Add) { +TEST (AdditionSubtractionTestSuite, TestSafeInt8Add) { RETURN_STATUS Status; - INT8 Augend; - INT8 Addend; - INT8 Result; + INT8 Augend; + INT8 Addend; + INT8 Result; // // If the result of addition doesn't overflow MAX_INT8 @@ -1699,11 +1699,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt8Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt16Add) { +TEST (AdditionSubtractionTestSuite, TestSafeInt16Add) { RETURN_STATUS Status; - INT16 Augend; - INT16 Addend; - INT16 Result; + INT16 Augend; + INT16 Addend; + INT16 Result; // // If the result of addition doesn't overflow MAX_INT16 @@ -1736,11 +1736,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt16Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt32Add) { +TEST (AdditionSubtractionTestSuite, TestSafeInt32Add) { RETURN_STATUS Status; - INT32 Augend; - INT32 Addend; - INT32 Result; + INT32 Augend; + INT32 Addend; + INT32 Result; // // If the result of addition doesn't overflow MAX_INT32 @@ -1773,11 +1773,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt32Add) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt64Add) { +TEST (AdditionSubtractionTestSuite, TestSafeInt64Add) { RETURN_STATUS Status; - INT64 Augend; - INT64 Addend; - INT64 Result; + INT64 Augend; + INT64 Addend; + INT64 Result; // // If the result of addition doesn't overflow MAX_INT64 @@ -1813,11 +1813,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt64Add) { // // Subtraction function tests: // -TEST(AdditionSubtractionTestSuite, TestSafeUint8Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeUint8Sub) { RETURN_STATUS Status; - UINT8 Minuend; - UINT8 Subtrahend; - UINT8 Result; + UINT8 Minuend; + UINT8 Subtrahend; + UINT8 Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -1838,11 +1838,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint8Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint16Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeUint16Sub) { RETURN_STATUS Status; - UINT16 Minuend; - UINT16 Subtrahend; - UINT16 Result; + UINT16 Minuend; + UINT16 Subtrahend; + UINT16 Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -1863,11 +1863,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint16Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint32Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeUint32Sub) { RETURN_STATUS Status; - UINT32 Minuend; - UINT32 Subtrahend; - UINT32 Result; + UINT32 Minuend; + UINT32 Subtrahend; + UINT32 Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -1888,11 +1888,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint32Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeUint64Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeUint64Sub) { RETURN_STATUS Status; - UINT64 Minuend; - UINT64 Subtrahend; - UINT64 Result; + UINT64 Minuend; + UINT64 Subtrahend; + UINT64 Result; // // If Minuend >= Subtrahend, then it's subtraction @@ -1913,11 +1913,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeUint64Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt8Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeInt8Sub) { RETURN_STATUS Status; - INT8 Minuend; - INT8 Subtrahend; - INT8 Result; + INT8 Minuend; + INT8 Subtrahend; + INT8 Result; // // If the result of subtractions doesn't overflow MAX_INT8 or @@ -1950,11 +1950,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt8Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt16Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeInt16Sub) { RETURN_STATUS Status; - INT16 Minuend; - INT16 Subtrahend; - INT16 Result; + INT16 Minuend; + INT16 Subtrahend; + INT16 Result; // // If the result of subtractions doesn't overflow MAX_INT16 or @@ -1987,11 +1987,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt16Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt32Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeInt32Sub) { RETURN_STATUS Status; - INT32 Minuend; - INT32 Subtrahend; - INT32 Result; + INT32 Minuend; + INT32 Subtrahend; + INT32 Result; // // If the result of subtractions doesn't overflow MAX_INT32 or @@ -2024,11 +2024,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt32Sub) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(AdditionSubtractionTestSuite, TestSafeInt64Sub) { +TEST (AdditionSubtractionTestSuite, TestSafeInt64Sub) { RETURN_STATUS Status; - INT64 Minuend; - INT64 Subtrahend; - INT64 Result; + INT64 Minuend; + INT64 Subtrahend; + INT64 Result; // // If the result of subtractions doesn't overflow MAX_INT64 or @@ -2064,11 +2064,11 @@ TEST(AdditionSubtractionTestSuite, TestSafeInt64Sub) { // // Multiplication function tests: // -TEST(MultiplicationTestSuite, TestSafeUint8Mult) { +TEST (MultiplicationTestSuite, TestSafeUint8Mult) { RETURN_STATUS Status; - UINT8 Multiplicand; - UINT8 Multiplier; - UINT8 Result; + UINT8 Multiplicand; + UINT8 Multiplier; + UINT8 Result; // // If the result of multiplication doesn't overflow MAX_UINT8, it will succeed @@ -2089,11 +2089,11 @@ TEST(MultiplicationTestSuite, TestSafeUint8Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeUint16Mult) { +TEST (MultiplicationTestSuite, TestSafeUint16Mult) { RETURN_STATUS Status; - UINT16 Multiplicand; - UINT16 Multiplier; - UINT16 Result; + UINT16 Multiplicand; + UINT16 Multiplier; + UINT16 Result; // // If the result of multiplication doesn't overflow MAX_UINT16, it will succeed @@ -2114,11 +2114,11 @@ TEST(MultiplicationTestSuite, TestSafeUint16Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeUint32Mult) { +TEST (MultiplicationTestSuite, TestSafeUint32Mult) { RETURN_STATUS Status; - UINT32 Multiplicand; - UINT32 Multiplier; - UINT32 Result; + UINT32 Multiplicand; + UINT32 Multiplier; + UINT32 Result; // // If the result of multiplication doesn't overflow MAX_UINT32, it will succeed @@ -2139,11 +2139,11 @@ TEST(MultiplicationTestSuite, TestSafeUint32Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeUint64Mult) { +TEST (MultiplicationTestSuite, TestSafeUint64Mult) { RETURN_STATUS Status; - UINT64 Multiplicand; - UINT64 Multiplier; - UINT64 Result; + UINT64 Multiplicand; + UINT64 Multiplier; + UINT64 Result; // // If the result of multiplication doesn't overflow MAX_UINT64, it will succeed @@ -2164,11 +2164,11 @@ TEST(MultiplicationTestSuite, TestSafeUint64Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeInt8Mult) { +TEST (MultiplicationTestSuite, TestSafeInt8Mult) { RETURN_STATUS Status; - INT8 Multiplicand; - INT8 Multiplier; - INT8 Result; + INT8 Multiplicand; + INT8 Multiplier; + INT8 Result; // // If the result of multiplication doesn't overflow MAX_INT8 and doesn't @@ -2190,11 +2190,11 @@ TEST(MultiplicationTestSuite, TestSafeInt8Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeInt16Mult) { +TEST (MultiplicationTestSuite, TestSafeInt16Mult) { RETURN_STATUS Status; - INT16 Multiplicand; - INT16 Multiplier; - INT16 Result; + INT16 Multiplicand; + INT16 Multiplier; + INT16 Result; // // If the result of multiplication doesn't overflow MAX_INT16 and doesn't @@ -2216,11 +2216,11 @@ TEST(MultiplicationTestSuite, TestSafeInt16Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeInt32Mult) { +TEST (MultiplicationTestSuite, TestSafeInt32Mult) { RETURN_STATUS Status; - INT32 Multiplicand; - INT32 Multiplier; - INT32 Result; + INT32 Multiplicand; + INT32 Multiplier; + INT32 Result; // // If the result of multiplication doesn't overflow MAX_INT32 and doesn't @@ -2242,11 +2242,11 @@ TEST(MultiplicationTestSuite, TestSafeInt32Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -TEST(MultiplicationTestSuite, TestSafeInt64Mult) { +TEST (MultiplicationTestSuite, TestSafeInt64Mult) { RETURN_STATUS Status; - INT64 Multiplicand; - INT64 Multiplier; - INT64 Result; + INT64 Multiplicand; + INT64 Multiplier; + INT64 Result; // // If the result of multiplication doesn't overflow MAX_INT64 and doesn't @@ -2268,7 +2268,12 @@ TEST(MultiplicationTestSuite, TestSafeInt64Mult) { ASSERT_EQ (RETURN_BUFFER_TOO_SMALL, Status); } -int main(int argc, char* argv[]) { - testing::InitGoogleTest(&argc, argv); - return RUN_ALL_TESTS(); +int +main ( + int argc, + char *argv[] + ) +{ + testing::InitGoogleTest (&argc, argv); + return RUN_ALL_TESTS (); } diff --git a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h index 994b8133e5d0..586b479ea5d2 100644 --- a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h +++ b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h @@ -11,9 +11,9 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <Pi/PiMultiPhase.h> -#include <Uefi.h> -#include <Library/HobLib.h> + #include <Pi/PiMultiPhase.h> + #include <Uefi.h> + #include <Library/HobLib.h> } struct MockHobLib { diff --git a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h index 4a99fec539c0..6a6424d7c6fc 100644 --- a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h +++ b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h @@ -11,9 +11,9 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <PiPei.h> -#include <Uefi.h> -#include <Library/PeiServicesLib.h> + #include <PiPei.h> + #include <Uefi.h> + #include <Library/PeiServicesLib.h> } struct MockPeiServicesLib { diff --git a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h index dec2c93e1b34..93697da9cf86 100644 --- a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h +++ b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h @@ -11,8 +11,8 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <Uefi.h> -#include <Library/UefiLib.h> + #include <Uefi.h> + #include <Library/UefiLib.h> } struct MockUefiLib { diff --git a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h index afdfc6b85597..241abc55c079 100644 --- a/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h +++ b/MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h @@ -11,8 +11,8 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <Uefi.h> -#include <Library/UefiRuntimeServicesTableLib.h> + #include <Uefi.h> + #include <Library/UefiRuntimeServicesTableLib.h> } struct MockUefiRuntimeServicesTableLib { diff --git a/MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp b/MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp index 5a5a9159fcfe..51ee09065e92 100644 --- a/MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp +++ b/MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp @@ -7,24 +7,24 @@ #include <GoogleTest/Library/MockHobLib.h> -MOCK_INTERFACE_DEFINITION(MockHobLib); +MOCK_INTERFACE_DEFINITION (MockHobLib); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetHobList, 0, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetNextHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetFirstHob, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetNextGuidHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetFirstGuidHob, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, GetBootModeHob, 0, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildModuleHob, 4, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildResourceDescriptorWithOwnerHob, 5, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildResourceDescriptorHob, 4, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildGuidHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildGuidDataHob, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildFvHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildFv2Hob, 4, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildFv3Hob, 6, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildCvHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildCpuHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildStackHob, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildBspStoreHob, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockHobLib, BuildMemoryAllocationHob, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetHobList, 0, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetNextHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetFirstHob, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetNextGuidHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetFirstGuidHob, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, GetBootModeHob, 0, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildModuleHob, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildResourceDescriptorWithOwnerHob, 5, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildResourceDescriptorHob, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildGuidHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildGuidDataHob, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildFvHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildFv2Hob, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildFv3Hob, 6, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildCvHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildCpuHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildStackHob, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildBspStoreHob, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockHobLib, BuildMemoryAllocationHob, 3, EFIAPI); diff --git a/MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp b/MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp index 9a7ff4bd8ffb..c6035bd664cf 100644 --- a/MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp +++ b/MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp @@ -7,30 +7,30 @@ #include <GoogleTest/Library/MockPeiServicesLib.h> -MOCK_INTERFACE_DEFINITION(MockPeiServicesLib); +MOCK_INTERFACE_DEFINITION (MockPeiServicesLib); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesInstallPpi, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesReInstallPpi, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesLocatePpi, 4, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesNotifyPpi, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesGetBootMode, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesSetBootMode, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesGetHobList, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesCreateHob, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsFindNextVolume, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsFindNextFile, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsFindSectionData, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsFindSectionData3, 5, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesInstallPeiMemory, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesAllocatePages, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFreePages, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesAllocatePool, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesResetSystem, 0, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsFindFileByName, 3, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsGetFileInfo, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsGetFileInfo2, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesFfsGetVolumeInfo, 2, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesRegisterForShadow, 1, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesInstallFvInfoPpi, 5, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesInstallFvInfo2Ppi, 6, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockPeiServicesLib, PeiServicesResetSystem2, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesInstallPpi, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesReInstallPpi, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesLocatePpi, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesNotifyPpi, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesGetBootMode, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesSetBootMode, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesGetHobList, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesCreateHob, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsFindNextVolume, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsFindNextFile, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsFindSectionData, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsFindSectionData3, 5, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesInstallPeiMemory, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesAllocatePages, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFreePages, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesAllocatePool, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesResetSystem, 0, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsFindFileByName, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsGetFileInfo, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsGetFileInfo2, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesFfsGetVolumeInfo, 2, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesRegisterForShadow, 1, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesInstallFvInfoPpi, 5, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesInstallFvInfo2Ppi, 6, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPeiServicesLib, PeiServicesResetSystem2, 4, EFIAPI); diff --git a/MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp b/MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp index 5339d040c999..2a0c9613eaa2 100644 --- a/MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp +++ b/MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp @@ -6,7 +6,7 @@ **/ #include <GoogleTest/Library/MockUefiLib.h> -MOCK_INTERFACE_DEFINITION(MockUefiLib); +MOCK_INTERFACE_DEFINITION (MockUefiLib); -MOCK_FUNCTION_DEFINITION(MockUefiLib, GetVariable2, 4, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockUefiLib, GetEfiGlobalVariable2, 3, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockUefiLib, GetVariable2, 4, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockUefiLib, GetEfiGlobalVariable2, 3, EFIAPI); diff --git a/MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp b/MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp index ecd1ba82366c..14296b0ccb88 100644 --- a/MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp +++ b/MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiRuntimeServicesTableLib.cpp @@ -6,13 +6,13 @@ **/ #include <GoogleTest/Library/MockUefiRuntimeServicesTableLib.h> -MOCK_INTERFACE_DEFINITION(MockUefiRuntimeServicesTableLib); +MOCK_INTERFACE_DEFINITION (MockUefiRuntimeServicesTableLib); -MOCK_FUNCTION_DEFINITION(MockUefiRuntimeServicesTableLib, gRT_GetVariable, 5, EFIAPI); -MOCK_FUNCTION_DEFINITION(MockUefiRuntimeServicesTableLib, gRT_SetVariable, 5, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockUefiRuntimeServicesTableLib, gRT_GetVariable, 5, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockUefiRuntimeServicesTableLib, gRT_SetVariable, 5, EFIAPI); -static EFI_RUNTIME_SERVICES localRt = { - {0}, // EFI_TABLE_HEADER +static EFI_RUNTIME_SERVICES localRt = { + { 0 }, // EFI_TABLE_HEADER NULL, // EFI_GET_TIME NULL, // EFI_SET_TIME @@ -36,5 +36,5 @@ static EFI_RUNTIME_SERVICES localRt = { }; extern "C" { - EFI_RUNTIME_SERVICES* gRT = &localRt; + EFI_RUNTIME_SERVICES *gRT = &localRt; } -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107813): https://edk2.groups.io/g/devel/message/107813 Mute This Topic: https://groups.io/mt/100788669/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 5/7] SecurityPkg: Apply uncrustify formatting to relevant files 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (3 preceding siblings ...) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 4/7] MdePkg: " VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-17 2:41 ` Yao, Jiewen 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 6/7] UnitTestFrameworkPkg: " VivianNK ` (3 subsequent siblings) 8 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Jiewen Yao, Jian J Wang Apply uncrustify formatting to GoogleTest cpp and header files. Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> --- SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp | 205 ++++++++++++-------- SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h | 4 +- SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp | 4 +- 3 files changed, 124 insertions(+), 89 deletions(-) diff --git a/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp b/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp index c9190c8ffd61..f66c595a97a8 100644 --- a/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp +++ b/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoogleTest.cpp @@ -21,154 +21,189 @@ using namespace testing; ////////////////////////////////////////////////////////////////////////////// class SetSecureBootModeTest : public Test { - protected: - MockUefiRuntimeServicesTableLib RtServicesMock; - UINT8 SecureBootMode; - EFI_STATUS Status; +protected: + MockUefiRuntimeServicesTableLib RtServicesMock; + UINT8 SecureBootMode; + EFI_STATUS Status; - void SetUp() override { - // Any random magic number can be used for these tests - SecureBootMode = 0xAB; - } + void + SetUp ( + ) override + { + // Any random magic number can be used for these tests + SecureBootMode = 0xAB; + } }; // Test SetSecureBootMode() API from SecureBootVariableLib to verify the // expected error is returned when the call to gRT->SetVariable() fails. -TEST_F(SetSecureBootModeTest, SetVarError) { - EXPECT_CALL(RtServicesMock, gRT_SetVariable) - .WillOnce(Return(EFI_INVALID_PARAMETER)); +TEST_F (SetSecureBootModeTest, SetVarError) { + EXPECT_CALL (RtServicesMock, gRT_SetVariable) + .WillOnce (Return (EFI_INVALID_PARAMETER)); - Status = SetSecureBootMode(SecureBootMode); - EXPECT_EQ(Status, EFI_INVALID_PARAMETER); + Status = SetSecureBootMode (SecureBootMode); + EXPECT_EQ (Status, EFI_INVALID_PARAMETER); } // Test SetSecureBootMode() API from SecureBootVariableLib to verify the // expected secure boot mode is written to the correct variable in the call // to gRT->SetVariable(). -TEST_F(SetSecureBootModeTest, PropogateModeToSetVar) { - EXPECT_CALL(RtServicesMock, - gRT_SetVariable( - Char16StrEq(EFI_CUSTOM_MODE_NAME), - BufferEq(&gEfiCustomModeEnableGuid, sizeof(EFI_GUID)), +TEST_F (SetSecureBootModeTest, PropogateModeToSetVar) { + EXPECT_CALL ( + RtServicesMock, + gRT_SetVariable ( + Char16StrEq (EFI_CUSTOM_MODE_NAME), + BufferEq (&gEfiCustomModeEnableGuid, sizeof (EFI_GUID)), EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS, - sizeof(SecureBootMode), - BufferEq(&SecureBootMode, sizeof(SecureBootMode)))) - .WillOnce(Return(EFI_SUCCESS)); + sizeof (SecureBootMode), + BufferEq (&SecureBootMode, sizeof (SecureBootMode)) + ) + ) + .WillOnce (Return (EFI_SUCCESS)); - Status = SetSecureBootMode(SecureBootMode); - EXPECT_EQ(Status, EFI_SUCCESS); + Status = SetSecureBootMode (SecureBootMode); + EXPECT_EQ (Status, EFI_SUCCESS); } ////////////////////////////////////////////////////////////////////////////// class GetSetupModeTest : public Test { - protected: - MockUefiRuntimeServicesTableLib RtServicesMock; - UINT8 SetupMode; - EFI_STATUS Status; - UINT8 ExpSetupMode; +protected: + MockUefiRuntimeServicesTableLib RtServicesMock; + UINT8 SetupMode; + EFI_STATUS Status; + UINT8 ExpSetupMode; - void SetUp() override { - // Any random magic number can be used for these tests - ExpSetupMode = 0xAB; - } + void + SetUp ( + ) override + { + // Any random magic number can be used for these tests + ExpSetupMode = 0xAB; + } }; // Test GetSetupMode() API from SecureBootVariableLib to verify the expected // error is returned when the call to gRT->GetVariable() fails. -TEST_F(GetSetupModeTest, GetVarError) { - EXPECT_CALL(RtServicesMock, gRT_GetVariable) - .WillOnce(Return(EFI_INVALID_PARAMETER)); +TEST_F (GetSetupModeTest, GetVarError) { + EXPECT_CALL (RtServicesMock, gRT_GetVariable) + .WillOnce (Return (EFI_INVALID_PARAMETER)); Status = GetSetupMode (&SetupMode); - EXPECT_EQ(Status, EFI_INVALID_PARAMETER); + EXPECT_EQ (Status, EFI_INVALID_PARAMETER); } // Test GetSetupMode() API from SecureBootVariableLib to verify the expected // setup mode is returned (and with a success return code) when the mode is // successfully read from the call to gRT->GetVariable(). -TEST_F(GetSetupModeTest, FetchModeFromGetVar) { - EXPECT_CALL(RtServicesMock, - gRT_GetVariable( - Char16StrEq(EFI_SETUP_MODE_NAME), - BufferEq(&gEfiGlobalVariableGuid, sizeof(EFI_GUID)), +TEST_F (GetSetupModeTest, FetchModeFromGetVar) { + EXPECT_CALL ( + RtServicesMock, + gRT_GetVariable ( + Char16StrEq (EFI_SETUP_MODE_NAME), + BufferEq (&gEfiGlobalVariableGuid, sizeof (EFI_GUID)), _, - Pointee(Eq(sizeof(SetupMode))), - NotNull())) - .WillOnce(DoAll( - SetArgPointee<3>(sizeof(ExpSetupMode)), - SetArgBuffer<4>(&ExpSetupMode, sizeof(ExpSetupMode)), - Return(EFI_SUCCESS))); + Pointee (Eq (sizeof (SetupMode))), + NotNull () + ) + ) + .WillOnce ( + DoAll ( + SetArgPointee<3>(sizeof (ExpSetupMode)), + SetArgBuffer<4>(&ExpSetupMode, sizeof (ExpSetupMode)), + Return (EFI_SUCCESS) + ) + ); Status = GetSetupMode (&SetupMode); - ASSERT_EQ(Status, EFI_SUCCESS); - EXPECT_EQ(SetupMode, ExpSetupMode); + ASSERT_EQ (Status, EFI_SUCCESS); + EXPECT_EQ (SetupMode, ExpSetupMode); } ////////////////////////////////////////////////////////////////////////////// class IsSecureBootEnabledTest : public Test { - protected: - MockUefiLib UefiLibMock; - BOOLEAN Enabled; +protected: + MockUefiLib UefiLibMock; + BOOLEAN Enabled; }; // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify FALSE // is returned when the call to GetEfiGlobalVariable2() fails. -TEST_F(IsSecureBootEnabledTest, GetVarError) { - EXPECT_CALL(UefiLibMock, GetEfiGlobalVariable2) - .WillOnce(Return(EFI_ABORTED)); +TEST_F (IsSecureBootEnabledTest, GetVarError) { + EXPECT_CALL (UefiLibMock, GetEfiGlobalVariable2) + .WillOnce (Return (EFI_ABORTED)); Enabled = IsSecureBootEnabled (); - EXPECT_EQ(Enabled, FALSE); + EXPECT_EQ (Enabled, FALSE); } ////////////////////////////////////////////////////////////////////////////// class IsSecureBootEnabledAllocTest : public IsSecureBootEnabledTest { - protected: - UINT8 *BootEnabledBuffer; +protected: + UINT8 *BootEnabledBuffer; - void SetUp() override { - BootEnabledBuffer = (UINT8*) AllocatePool(1); - ASSERT_NE(BootEnabledBuffer, nullptr); - } + void + SetUp ( + ) override + { + BootEnabledBuffer = (UINT8 *)AllocatePool (1); + ASSERT_NE (BootEnabledBuffer, nullptr); + } }; // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify TRUE // is returned when the call to GetEfiGlobalVariable2() is successful and // returns SECURE_BOOT_MODE_ENABLE. -TEST_F(IsSecureBootEnabledAllocTest, IsEnabled) { +TEST_F (IsSecureBootEnabledAllocTest, IsEnabled) { *BootEnabledBuffer = SECURE_BOOT_MODE_ENABLE; - EXPECT_CALL(UefiLibMock, - GetEfiGlobalVariable2( - Char16StrEq(EFI_SECURE_BOOT_MODE_NAME), - NotNull(), - _)) - .WillOnce(DoAll( - SetArgBuffer<1>(&BootEnabledBuffer, sizeof(VOID*)), - Return(EFI_SUCCESS))); + EXPECT_CALL ( + UefiLibMock, + GetEfiGlobalVariable2 ( + Char16StrEq (EFI_SECURE_BOOT_MODE_NAME), + NotNull (), + _ + ) + ) + .WillOnce ( + DoAll ( + SetArgBuffer<1>(&BootEnabledBuffer, sizeof (VOID *)), + Return (EFI_SUCCESS) + ) + ); Enabled = IsSecureBootEnabled (); - EXPECT_EQ(Enabled, TRUE); + EXPECT_EQ (Enabled, TRUE); } // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify FALSE // is returned when the call to GetEfiGlobalVariable2() is successful and // returns SECURE_BOOT_MODE_DISABLE. -TEST_F(IsSecureBootEnabledAllocTest, IsDisabled) { +TEST_F (IsSecureBootEnabledAllocTest, IsDisabled) { *BootEnabledBuffer = SECURE_BOOT_MODE_DISABLE; - EXPECT_CALL(UefiLibMock, - GetEfiGlobalVariable2( - Char16StrEq(EFI_SECURE_BOOT_MODE_NAME), - NotNull(), - _)) - .WillOnce(DoAll( - SetArgBuffer<1>(&BootEnabledBuffer, sizeof(VOID*)), - Return(EFI_SUCCESS))); + EXPECT_CALL ( + UefiLibMock, + GetEfiGlobalVariable2 ( + Char16StrEq (EFI_SECURE_BOOT_MODE_NAME), + NotNull (), + _ + ) + ) + .WillOnce ( + DoAll ( + SetArgBuffer<1>(&BootEnabledBuffer, sizeof (VOID *)), + Return (EFI_SUCCESS) + ) + ); Enabled = IsSecureBootEnabled (); - EXPECT_EQ(Enabled, FALSE); + EXPECT_EQ (Enabled, FALSE); } -int main(int argc, char* argv[]) { - testing::InitGoogleTest(&argc, argv); - return RUN_ALL_TESTS(); +int +main ( + int argc, + char *argv[] + ) +{ + testing::InitGoogleTest (&argc, argv); + return RUN_ALL_TESTS (); } diff --git a/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h b/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h index 8024f4be2975..04288f2b75a3 100644 --- a/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h +++ b/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib.h @@ -11,8 +11,8 @@ #include <Library/GoogleTestLib.h> #include <Library/FunctionMockLib.h> extern "C" { -#include <Uefi.h> -#include <Library/PlatformPKProtectionLib.h> + #include <Uefi.h> + #include <Library/PlatformPKProtectionLib.h> } struct MockPlatformPKProtectionLib { diff --git a/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp b/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp index 5ea030f6dfcf..6613d5ed199a 100644 --- a/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp +++ b/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlatformPKProtectionLib.cpp @@ -6,6 +6,6 @@ **/ #include <GoogleTest/Library/MockPlatformPKProtectionLib.h> -MOCK_INTERFACE_DEFINITION(MockPlatformPKProtectionLib); +MOCK_INTERFACE_DEFINITION (MockPlatformPKProtectionLib); -MOCK_FUNCTION_DEFINITION(MockPlatformPKProtectionLib, DisablePKProtection, 0, EFIAPI); +MOCK_FUNCTION_DEFINITION (MockPlatformPKProtectionLib, DisablePKProtection, 0, EFIAPI); -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107814): https://edk2.groups.io/g/devel/message/107814 Mute This Topic: https://groups.io/mt/100788670/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 5/7] SecurityPkg: Apply uncrustify formatting to relevant files 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 5/7] SecurityPkg: " VivianNK @ 2023-08-17 2:41 ` Yao, Jiewen 0 siblings, 0 replies; 19+ messages in thread From: Yao, Jiewen @ 2023-08-17 2:41 UTC (permalink / raw) To: VivianNK, devel@edk2.groups.io; +Cc: Wang, Jian J Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com> > -----Original Message----- > From: VivianNK <vnowkakeane@linux.microsoft.com> > Sent: Thursday, August 17, 2023 5:15 AM > To: devel@edk2.groups.io > Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com> > Subject: [PATCH v2 5/7] SecurityPkg: Apply uncrustify formatting to relevant files > > Apply uncrustify formatting to GoogleTest cpp and header files. > > > Cc: Jiewen Yao <jiewen.yao@intel.com> > Cc: Jian J Wang <jian.j.wang@intel.com> > Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > --- > > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGo > ogleTest.cpp | 205 ++++++++++++-------- > > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLi > b.h | 4 +- > > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockP > latformPKProtectionLib.cpp | 4 +- > 3 files changed, 124 insertions(+), 89 deletions(-) > > diff --git > a/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLib > GoogleTest.cpp > b/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLib > GoogleTest.cpp > index c9190c8ffd61..f66c595a97a8 100644 > --- > a/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLib > GoogleTest.cpp > +++ > b/SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLib > GoogleTest.cpp > @@ -21,154 +21,189 @@ using namespace testing; > > > ////////////////////////////////////////////////////////////////////////////// > > class SetSecureBootModeTest : public Test { > > - protected: > > - MockUefiRuntimeServicesTableLib RtServicesMock; > > - UINT8 SecureBootMode; > > - EFI_STATUS Status; > > +protected: > > + MockUefiRuntimeServicesTableLib RtServicesMock; > > + UINT8 SecureBootMode; > > + EFI_STATUS Status; > > > > - void SetUp() override { > > - // Any random magic number can be used for these tests > > - SecureBootMode = 0xAB; > > - } > > + void > > + SetUp ( > > + ) override > > + { > > + // Any random magic number can be used for these tests > > + SecureBootMode = 0xAB; > > + } > > }; > > > > // Test SetSecureBootMode() API from SecureBootVariableLib to verify the > > // expected error is returned when the call to gRT->SetVariable() fails. > > -TEST_F(SetSecureBootModeTest, SetVarError) { > > - EXPECT_CALL(RtServicesMock, gRT_SetVariable) > > - .WillOnce(Return(EFI_INVALID_PARAMETER)); > > +TEST_F (SetSecureBootModeTest, SetVarError) { > > + EXPECT_CALL (RtServicesMock, gRT_SetVariable) > > + .WillOnce (Return (EFI_INVALID_PARAMETER)); > > > > - Status = SetSecureBootMode(SecureBootMode); > > - EXPECT_EQ(Status, EFI_INVALID_PARAMETER); > > + Status = SetSecureBootMode (SecureBootMode); > > + EXPECT_EQ (Status, EFI_INVALID_PARAMETER); > > } > > > > // Test SetSecureBootMode() API from SecureBootVariableLib to verify the > > // expected secure boot mode is written to the correct variable in the call > > // to gRT->SetVariable(). > > -TEST_F(SetSecureBootModeTest, PropogateModeToSetVar) { > > - EXPECT_CALL(RtServicesMock, > > - gRT_SetVariable( > > - Char16StrEq(EFI_CUSTOM_MODE_NAME), > > - BufferEq(&gEfiCustomModeEnableGuid, sizeof(EFI_GUID)), > > +TEST_F (SetSecureBootModeTest, PropogateModeToSetVar) { > > + EXPECT_CALL ( > > + RtServicesMock, > > + gRT_SetVariable ( > > + Char16StrEq (EFI_CUSTOM_MODE_NAME), > > + BufferEq (&gEfiCustomModeEnableGuid, sizeof (EFI_GUID)), > > EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS, > > - sizeof(SecureBootMode), > > - BufferEq(&SecureBootMode, sizeof(SecureBootMode)))) > > - .WillOnce(Return(EFI_SUCCESS)); > > + sizeof (SecureBootMode), > > + BufferEq (&SecureBootMode, sizeof (SecureBootMode)) > > + ) > > + ) > > + .WillOnce (Return (EFI_SUCCESS)); > > > > - Status = SetSecureBootMode(SecureBootMode); > > - EXPECT_EQ(Status, EFI_SUCCESS); > > + Status = SetSecureBootMode (SecureBootMode); > > + EXPECT_EQ (Status, EFI_SUCCESS); > > } > > > > ////////////////////////////////////////////////////////////////////////////// > > class GetSetupModeTest : public Test { > > - protected: > > - MockUefiRuntimeServicesTableLib RtServicesMock; > > - UINT8 SetupMode; > > - EFI_STATUS Status; > > - UINT8 ExpSetupMode; > > +protected: > > + MockUefiRuntimeServicesTableLib RtServicesMock; > > + UINT8 SetupMode; > > + EFI_STATUS Status; > > + UINT8 ExpSetupMode; > > > > - void SetUp() override { > > - // Any random magic number can be used for these tests > > - ExpSetupMode = 0xAB; > > - } > > + void > > + SetUp ( > > + ) override > > + { > > + // Any random magic number can be used for these tests > > + ExpSetupMode = 0xAB; > > + } > > }; > > > > // Test GetSetupMode() API from SecureBootVariableLib to verify the expected > > // error is returned when the call to gRT->GetVariable() fails. > > -TEST_F(GetSetupModeTest, GetVarError) { > > - EXPECT_CALL(RtServicesMock, gRT_GetVariable) > > - .WillOnce(Return(EFI_INVALID_PARAMETER)); > > +TEST_F (GetSetupModeTest, GetVarError) { > > + EXPECT_CALL (RtServicesMock, gRT_GetVariable) > > + .WillOnce (Return (EFI_INVALID_PARAMETER)); > > > > Status = GetSetupMode (&SetupMode); > > - EXPECT_EQ(Status, EFI_INVALID_PARAMETER); > > + EXPECT_EQ (Status, EFI_INVALID_PARAMETER); > > } > > > > // Test GetSetupMode() API from SecureBootVariableLib to verify the expected > > // setup mode is returned (and with a success return code) when the mode is > > // successfully read from the call to gRT->GetVariable(). > > -TEST_F(GetSetupModeTest, FetchModeFromGetVar) { > > - EXPECT_CALL(RtServicesMock, > > - gRT_GetVariable( > > - Char16StrEq(EFI_SETUP_MODE_NAME), > > - BufferEq(&gEfiGlobalVariableGuid, sizeof(EFI_GUID)), > > +TEST_F (GetSetupModeTest, FetchModeFromGetVar) { > > + EXPECT_CALL ( > > + RtServicesMock, > > + gRT_GetVariable ( > > + Char16StrEq (EFI_SETUP_MODE_NAME), > > + BufferEq (&gEfiGlobalVariableGuid, sizeof (EFI_GUID)), > > _, > > - Pointee(Eq(sizeof(SetupMode))), > > - NotNull())) > > - .WillOnce(DoAll( > > - SetArgPointee<3>(sizeof(ExpSetupMode)), > > - SetArgBuffer<4>(&ExpSetupMode, sizeof(ExpSetupMode)), > > - Return(EFI_SUCCESS))); > > + Pointee (Eq (sizeof (SetupMode))), > > + NotNull () > > + ) > > + ) > > + .WillOnce ( > > + DoAll ( > > + SetArgPointee<3>(sizeof (ExpSetupMode)), > > + SetArgBuffer<4>(&ExpSetupMode, sizeof (ExpSetupMode)), > > + Return (EFI_SUCCESS) > > + ) > > + ); > > > > Status = GetSetupMode (&SetupMode); > > - ASSERT_EQ(Status, EFI_SUCCESS); > > - EXPECT_EQ(SetupMode, ExpSetupMode); > > + ASSERT_EQ (Status, EFI_SUCCESS); > > + EXPECT_EQ (SetupMode, ExpSetupMode); > > } > > > > ////////////////////////////////////////////////////////////////////////////// > > class IsSecureBootEnabledTest : public Test { > > - protected: > > - MockUefiLib UefiLibMock; > > - BOOLEAN Enabled; > > +protected: > > + MockUefiLib UefiLibMock; > > + BOOLEAN Enabled; > > }; > > > > // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify FALSE > > // is returned when the call to GetEfiGlobalVariable2() fails. > > -TEST_F(IsSecureBootEnabledTest, GetVarError) { > > - EXPECT_CALL(UefiLibMock, GetEfiGlobalVariable2) > > - .WillOnce(Return(EFI_ABORTED)); > > +TEST_F (IsSecureBootEnabledTest, GetVarError) { > > + EXPECT_CALL (UefiLibMock, GetEfiGlobalVariable2) > > + .WillOnce (Return (EFI_ABORTED)); > > > > Enabled = IsSecureBootEnabled (); > > - EXPECT_EQ(Enabled, FALSE); > > + EXPECT_EQ (Enabled, FALSE); > > } > > > > ////////////////////////////////////////////////////////////////////////////// > > class IsSecureBootEnabledAllocTest : public IsSecureBootEnabledTest { > > - protected: > > - UINT8 *BootEnabledBuffer; > > +protected: > > + UINT8 *BootEnabledBuffer; > > > > - void SetUp() override { > > - BootEnabledBuffer = (UINT8*) AllocatePool(1); > > - ASSERT_NE(BootEnabledBuffer, nullptr); > > - } > > + void > > + SetUp ( > > + ) override > > + { > > + BootEnabledBuffer = (UINT8 *)AllocatePool (1); > > + ASSERT_NE (BootEnabledBuffer, nullptr); > > + } > > }; > > > > // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify TRUE > > // is returned when the call to GetEfiGlobalVariable2() is successful and > > // returns SECURE_BOOT_MODE_ENABLE. > > -TEST_F(IsSecureBootEnabledAllocTest, IsEnabled) { > > +TEST_F (IsSecureBootEnabledAllocTest, IsEnabled) { > > *BootEnabledBuffer = SECURE_BOOT_MODE_ENABLE; > > - EXPECT_CALL(UefiLibMock, > > - GetEfiGlobalVariable2( > > - Char16StrEq(EFI_SECURE_BOOT_MODE_NAME), > > - NotNull(), > > - _)) > > - .WillOnce(DoAll( > > - SetArgBuffer<1>(&BootEnabledBuffer, sizeof(VOID*)), > > - Return(EFI_SUCCESS))); > > + EXPECT_CALL ( > > + UefiLibMock, > > + GetEfiGlobalVariable2 ( > > + Char16StrEq (EFI_SECURE_BOOT_MODE_NAME), > > + NotNull (), > > + _ > > + ) > > + ) > > + .WillOnce ( > > + DoAll ( > > + SetArgBuffer<1>(&BootEnabledBuffer, sizeof (VOID *)), > > + Return (EFI_SUCCESS) > > + ) > > + ); > > > > Enabled = IsSecureBootEnabled (); > > - EXPECT_EQ(Enabled, TRUE); > > + EXPECT_EQ (Enabled, TRUE); > > } > > > > // Test IsSecureBootEnabled() API from SecureBootVariableLib to verify FALSE > > // is returned when the call to GetEfiGlobalVariable2() is successful and > > // returns SECURE_BOOT_MODE_DISABLE. > > -TEST_F(IsSecureBootEnabledAllocTest, IsDisabled) { > > +TEST_F (IsSecureBootEnabledAllocTest, IsDisabled) { > > *BootEnabledBuffer = SECURE_BOOT_MODE_DISABLE; > > - EXPECT_CALL(UefiLibMock, > > - GetEfiGlobalVariable2( > > - Char16StrEq(EFI_SECURE_BOOT_MODE_NAME), > > - NotNull(), > > - _)) > > - .WillOnce(DoAll( > > - SetArgBuffer<1>(&BootEnabledBuffer, sizeof(VOID*)), > > - Return(EFI_SUCCESS))); > > + EXPECT_CALL ( > > + UefiLibMock, > > + GetEfiGlobalVariable2 ( > > + Char16StrEq (EFI_SECURE_BOOT_MODE_NAME), > > + NotNull (), > > + _ > > + ) > > + ) > > + .WillOnce ( > > + DoAll ( > > + SetArgBuffer<1>(&BootEnabledBuffer, sizeof (VOID *)), > > + Return (EFI_SUCCESS) > > + ) > > + ); > > > > Enabled = IsSecureBootEnabled (); > > - EXPECT_EQ(Enabled, FALSE); > > + EXPECT_EQ (Enabled, FALSE); > > } > > > > -int main(int argc, char* argv[]) { > > - testing::InitGoogleTest(&argc, argv); > > - return RUN_ALL_TESTS(); > > +int > > +main ( > > + int argc, > > + char *argv[] > > + ) > > +{ > > + testing::InitGoogleTest (&argc, argv); > > + return RUN_ALL_TESTS (); > > } > > diff --git > a/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtection > Lib.h > b/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtection > Lib.h > index 8024f4be2975..04288f2b75a3 100644 > --- > a/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtection > Lib.h > +++ > b/SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtection > Lib.h > @@ -11,8 +11,8 @@ > #include <Library/GoogleTestLib.h> > > #include <Library/FunctionMockLib.h> > > extern "C" { > > -#include <Uefi.h> > > -#include <Library/PlatformPKProtectionLib.h> > > + #include <Uefi.h> > > + #include <Library/PlatformPKProtectionLib.h> > > } > > > > struct MockPlatformPKProtectionLib { > > diff --git > a/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/Moc > kPlatformPKProtectionLib.cpp > b/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/Moc > kPlatformPKProtectionLib.cpp > index 5ea030f6dfcf..6613d5ed199a 100644 > --- > a/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/Moc > kPlatformPKProtectionLib.cpp > +++ > b/SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/Moc > kPlatformPKProtectionLib.cpp > @@ -6,6 +6,6 @@ > **/ > > #include <GoogleTest/Library/MockPlatformPKProtectionLib.h> > > > > -MOCK_INTERFACE_DEFINITION(MockPlatformPKProtectionLib); > > +MOCK_INTERFACE_DEFINITION (MockPlatformPKProtectionLib); > > > > -MOCK_FUNCTION_DEFINITION(MockPlatformPKProtectionLib, > DisablePKProtection, 0, EFIAPI); > > +MOCK_FUNCTION_DEFINITION (MockPlatformPKProtectionLib, > DisablePKProtection, 0, EFIAPI); > > -- > 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107820): https://edk2.groups.io/g/devel/message/107820 Mute This Topic: https://groups.io/mt/100788670/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 6/7] UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (4 preceding siblings ...) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 5/7] SecurityPkg: " VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change VivianNK ` (2 subsequent siblings) 8 siblings, 0 replies; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Michael D Kinney, Michael Kubacki, Sean Brogan, Michael Kubacki Apply uncrustify formatting to GoogleTest cpp and header files. Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Michael Kubacki <mikuback@linux.microsoft.com> Cc: Sean Brogan <sean.brogan@microsoft.com> Reviewed-by: Michael D Kinney <michael.d.kinney@intel.com> Reviewed-by: Michael Kubacki <michael.kubacki@microsoft.com> --- UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h | 2 +- UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp | 76 ++++++++++++-------- 2 files changed, 47 insertions(+), 31 deletions(-) diff --git a/UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h b/UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h index c0a3d8e66011..c723b5c23050 100644 --- a/UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h +++ b/UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h @@ -14,7 +14,7 @@ #include <cstring> extern "C" { -#include <Uefi.h> + #include <Uefi.h> } ////////////////////////////////////////////////////////////////////////////// diff --git a/UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp b/UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp index c83e58596a82..94cbf2cf0b3c 100644 --- a/UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp +++ b/UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest.cpp @@ -18,7 +18,7 @@ extern "C" { Sample unit test that verifies the expected result of an unsigned integer addition operation. **/ -TEST(SimpleMathTests, OnePlusOneShouldEqualTwo) { +TEST (SimpleMathTests, OnePlusOneShouldEqualTwo) { UINTN A; UINTN B; UINTN C; @@ -34,11 +34,11 @@ TEST(SimpleMathTests, OnePlusOneShouldEqualTwo) { Sample unit test that verifies that a global BOOLEAN is updatable. **/ class GlobalBooleanVarTests : public ::testing::Test { - public: - BOOLEAN SampleGlobalTestBoolean = FALSE; +public: + BOOLEAN SampleGlobalTestBoolean = FALSE; }; -TEST_F(GlobalBooleanVarTests, GlobalBooleanShouldBeChangeable) { +TEST_F (GlobalBooleanVarTests, GlobalBooleanShouldBeChangeable) { SampleGlobalTestBoolean = TRUE; ASSERT_TRUE (SampleGlobalTestBoolean); @@ -51,37 +51,46 @@ TEST_F(GlobalBooleanVarTests, GlobalBooleanShouldBeChangeable) { pointer is updatable. **/ class GlobalVarTests : public ::testing::Test { - public: - VOID *SampleGlobalTestPointer = NULL; +public: + VOID *SampleGlobalTestPointer = NULL; - protected: - void SetUp() override { +protected: + void + SetUp ( + ) override + { ASSERT_EQ ((UINTN)SampleGlobalTestPointer, (UINTN)NULL); } - void TearDown() { + + void + TearDown ( + ) + { SampleGlobalTestPointer = NULL; } }; -TEST_F(GlobalVarTests, GlobalPointerShouldBeChangeable) { +TEST_F (GlobalVarTests, GlobalPointerShouldBeChangeable) { SampleGlobalTestPointer = (VOID *)-1; ASSERT_EQ ((UINTN)SampleGlobalTestPointer, (UINTN)((VOID *)-1)); } - /** Set PcdDebugPropertyMask for each MacroTestsAssertsEnabledDisabled test **/ class MacroTestsAssertsEnabledDisabled : public testing::TestWithParam<UINT8> { - void SetUp() { - PatchPcdSet8 (PcdDebugPropertyMask, GetParam()); + void + SetUp ( + ) + { + PatchPcdSet8 (PcdDebugPropertyMask, GetParam ()); } }; /** Sample unit test using the ASSERT_TRUE() macro. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertTrue) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertTrue) { UINT64 Result; // @@ -99,7 +108,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertTrue) { /** Sample unit test using the ASSERT_FALSE() macro. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertFalse) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertFalse) { UINT64 Result; // @@ -117,7 +126,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertFalse) { /** Sample unit test using the ASSERT_EQ() macro. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertEqual) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertEqual) { UINT64 Result; // @@ -135,7 +144,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertEqual) { /** Sample unit test using the ASSERT_STREQ() macro. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertMemEqual) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertMemEqual) { CHAR8 *String1; CHAR8 *String2; @@ -150,7 +159,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertMemEqual) { /** Sample unit test using the ASSERT_NE() macro. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotEqual) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertNotEqual) { UINT64 Result; // @@ -169,7 +178,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotEqual) { Sample unit test using the ASSERT_TRUE() and ASSERT(FALSE) and EFI_EFFOR() macros to check status **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotEfiError) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertNotEfiError) { // // This test passes because the status is not an EFI error. // @@ -184,7 +193,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotEfiError) { /** Sample unit test using the ASSERT_EQ() macro to compare EFI_STATUS values. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertStatusEqual) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertStatusEqual) { // // This test passes because the status value are always equal. // @@ -194,7 +203,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertStatusEqual) { /** Sample unit test using ASSERT_NE() macro to make sure a pointer is not NULL. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotNull) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroAssertNotNull) { UINT64 Result; // @@ -206,7 +215,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroAssertNotNull) { /** Sample unit test using that should not generate any ASSERTs() **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroExpectNoAssertFailure) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroExpectNoAssertFailure) { // // This test passes because it never triggers an ASSERT(). // @@ -222,7 +231,7 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroExpectNoAssertFailure) { /** Sample unit test using the ASSERT_DEATH() macro to test expected ASSERT()s. **/ -TEST_P(MacroTestsAssertsEnabledDisabled, MacroExpectAssertFailure) { +TEST_P (MacroTestsAssertsEnabledDisabled, MacroExpectAssertFailure) { // // Skip tests that verify an ASSERT() is triggered if ASSERT()s are disabled. // @@ -243,21 +252,28 @@ TEST_P(MacroTestsAssertsEnabledDisabled, MacroExpectAssertFailure) { ASSERT_DEATH (DecimalToBcd8 (101), ""); } -INSTANTIATE_TEST_SUITE_P(ValidInput, - MacroTestsAssertsEnabledDisabled, - ::testing::Values(PcdGet8 (PcdDebugPropertyMask) | BIT0, PcdGet8 (PcdDebugPropertyMask) & (~BIT0))); +INSTANTIATE_TEST_SUITE_P ( + ValidInput, + MacroTestsAssertsEnabledDisabled, + ::testing::Values (PcdGet8 (PcdDebugPropertyMask) | BIT0, PcdGet8 (PcdDebugPropertyMask) & (~BIT0)) + ); /** Sample unit test using the SCOPED_TRACE() macro for trace messages. **/ -TEST(MacroTestsMessages, MacroTraceMessage) { +TEST (MacroTestsMessages, MacroTraceMessage) { // // Example of logging. // SCOPED_TRACE ("SCOPED_TRACE message\n"); } -int main(int argc, char* argv[]) { - testing::InitGoogleTest(&argc, argv); - return RUN_ALL_TESTS(); +int +main ( + int argc, + char *argv[] + ) +{ + testing::InitGoogleTest (&argc, argv); + return RUN_ALL_TESTS (); } -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107815): https://edk2.groups.io/g/devel/message/107815 Mute This Topic: https://groups.io/mt/100788671/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (5 preceding siblings ...) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 6/7] UnitTestFrameworkPkg: " VivianNK @ 2023-08-16 21:15 ` VivianNK 2023-08-16 22:09 ` Michael Kubacki 2023-09-12 1:08 ` 回复: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update gaoliming via groups.io 2023-09-12 14:42 ` Michael D Kinney 8 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-08-16 21:15 UTC (permalink / raw) To: devel; +Cc: Sean Brogan, Michael Kubacki, Michael D Kinney, Liming Gao Set global audit only to False now that new rules have been applied to all necessary packages. Cc: Sean Brogan <sean.brogan@microsoft.com> Cc: Michael Kubacki <mikuback@linux.microsoft.com> Cc: Michael D Kinney <michael.d.kinney@intel.com> Cc: Liming Gao <gaoliming@byosoft.com.cn> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> --- .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py index 17f77b48d954..ffc72f2c5918 100644 --- a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py +++ b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py @@ -530,7 +530,7 @@ class UncrustifyCheck(ICiBuildPlugin): """ Initializes options that influence test case output. """ - self._audit_only_mode = True + self._audit_only_mode = False self._output_file_diffs = True if "AuditOnly" in self._package_config and self._package_config["AuditOnly"]: -- 2.41.0.windows.3 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107816): https://edk2.groups.io/g/devel/message/107816 Mute This Topic: https://groups.io/mt/100788672/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply related [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change VivianNK @ 2023-08-16 22:09 ` Michael Kubacki 0 siblings, 0 replies; 19+ messages in thread From: Michael Kubacki @ 2023-08-16 22:09 UTC (permalink / raw) To: devel, vnowkakeane; +Cc: Sean Brogan, Michael D Kinney, Liming Gao Reviewed-by: Michael Kubacki <michael.kubacki@microsoft.com> On 8/16/2023 5:15 PM, VivianNK wrote: > Set global audit only to False now that new rules have been applied to > all necessary packages. > > Cc: Sean Brogan <sean.brogan@microsoft.com> > Cc: Michael Kubacki <mikuback@linux.microsoft.com> > Cc: Michael D Kinney <michael.d.kinney@intel.com> > Cc: Liming Gao <gaoliming@byosoft.com.cn> > Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > --- > .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > index 17f77b48d954..ffc72f2c5918 100644 > --- a/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > +++ b/.pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > @@ -530,7 +530,7 @@ class UncrustifyCheck(ICiBuildPlugin): > """ > > Initializes options that influence test case output. > > """ > > - self._audit_only_mode = True > > + self._audit_only_mode = False > > self._output_file_diffs = True > > > > if "AuditOnly" in self._package_config and self._package_config["AuditOnly"]: > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#107818): https://edk2.groups.io/g/devel/message/107818 Mute This Topic: https://groups.io/mt/100788672/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* 回复: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (6 preceding siblings ...) 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change VivianNK @ 2023-09-12 1:08 ` gaoliming via groups.io 2023-09-12 14:42 ` Michael D Kinney 8 siblings, 0 replies; 19+ messages in thread From: gaoliming via groups.io @ 2023-09-12 1:08 UTC (permalink / raw) To: devel, vnowkakeane For this patch set, Acked-by: Liming Gao <gaoliming@byosoft.com.cn> > -----邮件原件----- > 发件人: devel@edk2.groups.io <devel@edk2.groups.io> 代表 VivianNK > 发送时间: 2023年8月17日 5:15 > 收件人: devel@edk2.groups.io > 主题: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > > v1 -> v2: > - Update commit message to explain the audit only mode change is > temporary to prevent intermediate CI failures. > - Format patch Cc's correctly > > v1 archive:https://edk2.groups.io/g/devel/message/107665 > > VivianNK (7): > .pytool: Set uncrustify check to audit only (temporary) > .pytool: Add cpp support to uncrustify plugin > MdeModulePkg: Apply uncrustify formatting to relevant files. > MdePkg: Apply uncrustify formatting to relevant files > SecurityPkg: Apply uncrustify formatting to relevant files > UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files > .pytool: Undo uncrustify check change > > .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > | 2 +- > .pytool/Plugin/UncrustifyCheck/uncrustify.cfg > | 4 +- > MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp > | 37 +- > > MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLi > b.h | 4 +- > > MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/Mock > PciHostBridgeLib.cpp | 8 +- > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTest > s32.cpp | 114 ++-- > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTest > s64.cpp | 114 ++-- > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp > | 563 ++++++++++---------- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h > | 6 +- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h > | 6 +- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h > | 4 +- > > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTa > bleLib.h | 4 +- > MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp > | 40 +- > > MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiService > sLib.cpp | 52 +- > MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp > | 6 +- > > MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/ > MockUefiRuntimeServicesTableLib.cpp | 12 +- > > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLi > bGoogleTest.cpp | 205 ++++--- > > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtecti > onLib.h | 4 +- > > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/M > ockPlatformPKProtectionLib.cpp | 4 +- > UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h > | 2 +- > > UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleG > oogleTest.cpp | 76 +-- > 21 files changed, 664 insertions(+), 603 deletions(-) > > -- > 2.41.0.windows.3 > > > > -=-=-=-=-=-= > Groups.io Links: You receive all messages sent to this group. > View/Reply Online (#107809): > https://edk2.groups.io/g/devel/message/107809 > Mute This Topic: https://groups.io/mt/100788665/4905953 > Group Owner: devel+owner@edk2.groups.io > Unsubscribe: https://edk2.groups.io/g/devel/unsub > [gaoliming@byosoft.com.cn] > -=-=-=-=-=-= > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108509): https://edk2.groups.io/g/devel/message/108509 Mute This Topic: https://groups.io/mt/101306831/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK ` (7 preceding siblings ...) 2023-09-12 1:08 ` 回复: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update gaoliming via groups.io @ 2023-09-12 14:42 ` Michael D Kinney 2023-09-27 19:43 ` VivianNK 8 siblings, 1 reply; 19+ messages in thread From: Michael D Kinney @ 2023-09-12 14:42 UTC (permalink / raw) To: devel@edk2.groups.io, vnowkakeane@linux.microsoft.com; +Cc: Kinney, Michael D Series Reviewed-by: Michael D Kinney <michael.d.kinney@intel.com> > -----Original Message----- > From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of VivianNK > Sent: Wednesday, August 16, 2023 2:15 PM > To: devel@edk2.groups.io > Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > > v1 -> v2: > - Update commit message to explain the audit only mode change is > temporary to prevent intermediate CI failures. > - Format patch Cc's correctly > > v1 archive:https://edk2.groups.io/g/devel/message/107665 > > VivianNK (7): > .pytool: Set uncrustify check to audit only (temporary) > .pytool: Add cpp support to uncrustify plugin > MdeModulePkg: Apply uncrustify formatting to relevant files. > MdePkg: Apply uncrustify formatting to relevant files > SecurityPkg: Apply uncrustify formatting to relevant files > UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files > .pytool: Undo uncrustify check change > > .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > | 2 +- > .pytool/Plugin/UncrustifyCheck/uncrustify.cfg > | 4 +- > MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp > | 37 +- > MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h > | 4 +- > > MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBri > dgeLib.cpp | 8 +- > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32. > cpp | 114 ++-- > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64. > cpp | 114 ++-- > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp > | 563 ++++++++++---------- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h > | 6 +- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h > | 6 +- > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h > | 4 +- > > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h > | 4 +- > MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp > | 40 +- > > MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp > | 52 +- > MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp > | 6 +- > > MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiR > untimeServicesTableLib.cpp | 12 +- > > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoo > gleTest.cpp | 205 ++++--- > > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib. > h | 4 +- > > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlat > formPKProtectionLib.cpp | 4 +- > UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h > | 2 +- > > UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest > .cpp | 76 +-- > 21 files changed, 664 insertions(+), 603 deletions(-) > > -- > 2.41.0.windows.3 > > > > -=-=-=-=-=-= > Groups.io Links: You receive all messages sent to this group. > View/Reply Online (#107809): https://edk2.groups.io/g/devel/message/107809 > Mute This Topic: https://groups.io/mt/100788665/1643496 > Group Owner: devel+owner@edk2.groups.io > Unsubscribe: https://edk2.groups.io/g/devel/unsub > [michael.d.kinney@intel.com] > -=-=-=-=-=-= > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#108536): https://edk2.groups.io/g/devel/message/108536 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-09-12 14:42 ` Michael D Kinney @ 2023-09-27 19:43 ` VivianNK 2023-10-24 20:34 ` VivianNK 0 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-09-27 19:43 UTC (permalink / raw) To: devel, michael.d.kinney Hi Mike, Can you help merge this? Looks like it has all of the reviews. Thank you! - Vivian On 9/12/2023 7:42 AM, Michael D Kinney wrote: > Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> > >> -----Original Message----- >> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of VivianNK >> Sent: Wednesday, August 16, 2023 2:15 PM >> To:devel@edk2.groups.io >> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update >> >> v1 -> v2: >> - Update commit message to explain the audit only mode change is >> temporary to prevent intermediate CI failures. >> - Format patch Cc's correctly >> >> v1 archive:https://edk2.groups.io/g/devel/message/107665 >> >> VivianNK (7): >> .pytool: Set uncrustify check to audit only (temporary) >> .pytool: Add cpp support to uncrustify plugin >> MdeModulePkg: Apply uncrustify formatting to relevant files. >> MdePkg: Apply uncrustify formatting to relevant files >> SecurityPkg: Apply uncrustify formatting to relevant files >> UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files >> .pytool: Undo uncrustify check change >> >> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py >> | 2 +- >> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg >> | 4 +- >> MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp >> | 37 +- >> MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h >> | 4 +- >> >> MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBri >> dgeLib.cpp | 8 +- >> >> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32. >> cpp | 114 ++-- >> >> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64. >> cpp | 114 ++-- >> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp >> | 563 ++++++++++---------- >> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h >> | 6 +- >> MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h >> | 6 +- >> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h >> | 4 +- >> >> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h >> | 4 +- >> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp >> | 40 +- >> >> MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp >> | 52 +- >> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp >> | 6 +- >> >> MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiR >> untimeServicesTableLib.cpp | 12 +- >> >> SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoo >> gleTest.cpp | 205 ++++--- >> >> SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib. >> h | 4 +- >> >> SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlat >> formPKProtectionLib.cpp | 4 +- >> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h >> | 2 +- >> >> UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest >> .cpp | 76 +-- >> 21 files changed, 664 insertions(+), 603 deletions(-) >> >> -- >> 2.41.0.windows.3 >> >> >> >> -=-=-=-=-=-= >> Groups.io Links: You receive all messages sent to this group. >> View/Reply Online (#107809):https://edk2.groups.io/g/devel/message/107809 >> Mute This Topic:https://groups.io/mt/100788665/1643496 >> Group Owner:devel+owner@edk2.groups.io >> Unsubscribe:https://edk2.groups.io/g/devel/unsub >> [michael.d.kinney@intel.com] >> -=-=-=-=-=-= >> > > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#109129): https://edk2.groups.io/g/devel/message/109129 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-09-27 19:43 ` VivianNK @ 2023-10-24 20:34 ` VivianNK 2023-10-25 17:11 ` Michael D Kinney 0 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-10-24 20:34 UTC (permalink / raw) To: devel, michael.d.kinney Hi, following up to see if there's any update on this. Thanks for your help, - Vivian On 9/27/2023 12:43 PM, Vivian Nowka-Keane wrote: > Hi Mike, > > Can you help merge this? Looks like it has all of the reviews. > > Thank you! > - Vivian > > On 9/12/2023 7:42 AM, Michael D Kinney wrote: >> Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> >> >>> -----Original Message----- >>> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of >>> VivianNK >>> Sent: Wednesday, August 16, 2023 2:15 PM >>> To:devel@edk2.groups.io >>> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update >>> >>> v1 -> v2: >>> - Update commit message to explain the audit only mode change is >>> temporary to prevent intermediate CI failures. >>> - Format patch Cc's correctly >>> >>> v1 archive:https://edk2.groups.io/g/devel/message/107665 >>> >>> VivianNK (7): >>> .pytool: Set uncrustify check to audit only (temporary) >>> .pytool: Add cpp support to uncrustify plugin >>> MdeModulePkg: Apply uncrustify formatting to relevant files. >>> MdePkg: Apply uncrustify formatting to relevant files >>> SecurityPkg: Apply uncrustify formatting to relevant files >>> UnitTestFrameworkPkg: Apply uncrustify formatting to relevant files >>> .pytool: Undo uncrustify check change >>> >>> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py >>> | 2 +- >>> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg >>> | 4 +- >>> MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp >>> | 37 +- >>> MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib.h >>> >>> | 4 +- >>> >>> MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPciHostBri >>> >>> dgeLib.cpp | 8 +- >>> >>> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests32. >>> >>> cpp | 114 ++-- >>> >>> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitTests64. >>> >>> cpp | 114 ++-- >>> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp >>> | 563 ++++++++++---------- >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h >>> | 6 +- >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h >>> | 6 +- >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h >>> | 4 +- >>> >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTableLib.h >>> >>> | 4 +- >>> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp >>> | 40 +- >>> >>> MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServicesLib.cpp >>> >>> | 52 +- >>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp >>> | 6 +- >>> >>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/MockUefiR >>> >>> untimeServicesTableLib.cpp | 12 +- >>> >>> SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariableLibGoo >>> >>> gleTest.cpp | 205 ++++--- >>> >>> SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtectionLib. >>> >>> h | 4 +- >>> >>> SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/MockPlat >>> >>> formPKProtectionLib.cpp | 4 +- >>> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h >>> | 2 +- >>> >>> UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoogleTest >>> >>> .cpp | 76 +-- >>> 21 files changed, 664 insertions(+), 603 deletions(-) >>> >>> -- >>> 2.41.0.windows.3 >>> >>> >>> >>> -=-=-=-=-=-= >>> Groups.io Links: You receive all messages sent to this group. >>> View/Reply Online >>> (#107809):https://edk2.groups.io/g/devel/message/107809 >>> Mute This Topic:https://groups.io/mt/100788665/1643496 >>> Group Owner:devel+owner@edk2.groups.io >>> Unsubscribe:https://edk2.groups.io/g/devel/unsub >>> [michael.d.kinney@intel.com] >>> -=-=-=-=-=-= >>> >> >> -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110011): https://edk2.groups.io/g/devel/message/110011 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-10-24 20:34 ` VivianNK @ 2023-10-25 17:11 ` Michael D Kinney 2023-10-25 18:08 ` Michael D Kinney 0 siblings, 1 reply; 19+ messages in thread From: Michael D Kinney @ 2023-10-25 17:11 UTC (permalink / raw) To: Vivian Nowka-Keane, devel@edk2.groups.io; +Cc: Kinney, Michael D Hi Vivian, I am working on this. However, I noticed that Patch 6/7 was missing Signed-off-by tag. Is that supposed to be the same as the other 6 patches? Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> Thanks, Mike > -----Original Message----- > From: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > Sent: Tuesday, October 24, 2023 1:35 PM > To: devel@edk2.groups.io; Kinney, Michael D > <michael.d.kinney@intel.com> > Subject: Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > > Hi, following up to see if there's any update on this. > > Thanks for your help, > > - Vivian > > On 9/27/2023 12:43 PM, Vivian Nowka-Keane wrote: > > Hi Mike, > > > > Can you help merge this? Looks like it has all of the reviews. > > > > Thank you! > > - Vivian > > > > On 9/12/2023 7:42 AM, Michael D Kinney wrote: > >> Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> > >> > >>> -----Original Message----- > >>> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of > >>> VivianNK > >>> Sent: Wednesday, August 16, 2023 2:15 PM > >>> To:devel@edk2.groups.io > >>> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > >>> > >>> v1 -> v2: > >>> - Update commit message to explain the audit only mode change is > >>> temporary to prevent intermediate CI failures. > >>> - Format patch Cc's correctly > >>> > >>> v1 archive:https://edk2.groups.io/g/devel/message/107665 > >>> > >>> VivianNK (7): > >>> .pytool: Set uncrustify check to audit only (temporary) > >>> .pytool: Add cpp support to uncrustify plugin > >>> MdeModulePkg: Apply uncrustify formatting to relevant files. > >>> MdePkg: Apply uncrustify formatting to relevant files > >>> SecurityPkg: Apply uncrustify formatting to relevant files > >>> UnitTestFrameworkPkg: Apply uncrustify formatting to relevant > files > >>> .pytool: Undo uncrustify check change > >>> > >>> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > >>> | 2 +- > >>> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg > >>> | 4 +- > >>> > MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp > >>> | 37 +- > >>> > MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib > .h > >>> > >>> | 4 +- > >>> > >>> > MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPci > HostBri > >>> > >>> dgeLib.cpp | 8 +- > >>> > >>> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > ests32. > >>> > >>> cpp | 114 ++-- > >>> > >>> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > ests64. > >>> > >>> cpp | 114 ++-- > >>> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp > >>> | 563 ++++++++++---------- > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h > >>> | 6 +- > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h > >>> | 6 +- > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h > >>> | 4 +- > >>> > >>> > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTab > leLib.h > >>> > >>> | 4 +- > >>> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp > >>> | 40 +- > >>> > >>> > MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServices > Lib.cpp > >>> > >>> | 52 +- > >>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp > >>> | 6 +- > >>> > >>> > MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/Mo > ckUefiR > >>> > >>> untimeServicesTableLib.cpp | 12 +- > >>> > >>> > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariabl > eLibGoo > >>> > >>> gleTest.cpp | 205 ++++--- > >>> > >>> > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtect > ionLib. > >>> > >>> h | 4 +- > >>> > >>> > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/M > ockPlat > >>> > >>> formPKProtectionLib.cpp | 4 +- > >>> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h > >>> | 2 +- > >>> > >>> > UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoo > gleTest > >>> > >>> .cpp | 76 +-- > >>> 21 files changed, 664 insertions(+), 603 deletions(-) > >>> > >>> -- > >>> 2.41.0.windows.3 > >>> > >>> > >>> > >>> -=-=-=-=-=-= > >>> Groups.io Links: You receive all messages sent to this group. > >>> View/Reply Online > >>> (#107809):https://edk2.groups.io/g/devel/message/107809 > >>> Mute This Topic:https://groups.io/mt/100788665/1643496 > >>> Group Owner:devel+owner@edk2.groups.io > >>> Unsubscribe:https://edk2.groups.io/g/devel/unsub > >>> [michael.d.kinney@intel.com] > >>> -=-=-=-=-=-= > >>> > >> > >> -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110060): https://edk2.groups.io/g/devel/message/110060 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-10-25 17:11 ` Michael D Kinney @ 2023-10-25 18:08 ` Michael D Kinney 2023-10-26 21:08 ` VivianNK 0 siblings, 1 reply; 19+ messages in thread From: Michael D Kinney @ 2023-10-25 18:08 UTC (permalink / raw) To: Vivian Nowka-Keane, devel@edk2.groups.io; +Cc: Kinney, Michael D I also noticed that the Author was not set correctly on these patches. I updated using the same name/email from your Signed-off-by tag. Please review your git config to match for future patches. I have started EDK II CI with the following PR: https://github.com/tianocore/edk2/pull/4957 Thanks, Mike > -----Original Message----- > From: Kinney, Michael D <michael.d.kinney@intel.com> > Sent: Wednesday, October 25, 2023 10:11 AM > To: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com>; > devel@edk2.groups.io > Cc: Kinney, Michael D <michael.d.kinney@intel.com> > Subject: RE: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > > Hi Vivian, > > I am working on this. However, I noticed that Patch 6/7 was > missing Signed-off-by tag. Is that supposed to be the same > as the other 6 patches? > > Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > > Thanks, > > Mike > > > -----Original Message----- > > From: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > > Sent: Tuesday, October 24, 2023 1:35 PM > > To: devel@edk2.groups.io; Kinney, Michael D > > <michael.d.kinney@intel.com> > > Subject: Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest > update > > > > Hi, following up to see if there's any update on this. > > > > Thanks for your help, > > > > - Vivian > > > > On 9/27/2023 12:43 PM, Vivian Nowka-Keane wrote: > > > Hi Mike, > > > > > > Can you help merge this? Looks like it has all of the reviews. > > > > > > Thank you! > > > - Vivian > > > > > > On 9/12/2023 7:42 AM, Michael D Kinney wrote: > > >> Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> > > >> > > >>> -----Original Message----- > > >>> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of > > >>> VivianNK > > >>> Sent: Wednesday, August 16, 2023 2:15 PM > > >>> To:devel@edk2.groups.io > > >>> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest > update > > >>> > > >>> v1 -> v2: > > >>> - Update commit message to explain the audit only mode change > is > > >>> temporary to prevent intermediate CI failures. > > >>> - Format patch Cc's correctly > > >>> > > >>> v1 archive:https://edk2.groups.io/g/devel/message/107665 > > >>> > > >>> VivianNK (7): > > >>> .pytool: Set uncrustify check to audit only (temporary) > > >>> .pytool: Add cpp support to uncrustify plugin > > >>> MdeModulePkg: Apply uncrustify formatting to relevant files. > > >>> MdePkg: Apply uncrustify formatting to relevant files > > >>> SecurityPkg: Apply uncrustify formatting to relevant files > > >>> UnitTestFrameworkPkg: Apply uncrustify formatting to relevant > > files > > >>> .pytool: Undo uncrustify check change > > >>> > > >>> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > > >>> | 2 +- > > >>> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg > > >>> | 4 +- > > >>> > > > MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp > > >>> | 37 +- > > >>> > > > MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib > > .h > > >>> > > >>> | 4 +- > > >>> > > >>> > > > MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPci > > HostBri > > >>> > > >>> dgeLib.cpp | 8 +- > > >>> > > >>> > > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > > ests32. > > >>> > > >>> cpp | 114 ++-- > > >>> > > >>> > > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > > ests64. > > >>> > > >>> cpp | 114 ++-- > > >>> > > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp > > >>> | 563 ++++++++++---------- > > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h > > >>> | 6 +- > > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h > > >>> | 6 +- > > >>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h > > >>> | 4 +- > > >>> > > >>> > > > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTab > > leLib.h > > >>> > > >>> | 4 +- > > >>> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp > > >>> | 40 +- > > >>> > > >>> > > > MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServices > > Lib.cpp > > >>> > > >>> | 52 +- > > >>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp > > >>> | 6 +- > > >>> > > >>> > > > MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/Mo > > ckUefiR > > >>> > > >>> untimeServicesTableLib.cpp | 12 +- > > >>> > > >>> > > > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariabl > > eLibGoo > > >>> > > >>> gleTest.cpp | 205 ++++--- > > >>> > > >>> > > > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtect > > ionLib. > > >>> > > >>> h | 4 +- > > >>> > > >>> > > > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/M > > ockPlat > > >>> > > >>> formPKProtectionLib.cpp | 4 +- > > >>> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h > > >>> | 2 +- > > >>> > > >>> > > > UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoo > > gleTest > > >>> > > >>> .cpp | 76 +-- > > >>> 21 files changed, 664 insertions(+), 603 deletions(-) > > >>> > > >>> -- > > >>> 2.41.0.windows.3 > > >>> > > >>> > > >>> > > >>> -=-=-=-=-=-= > > >>> Groups.io Links: You receive all messages sent to this group. > > >>> View/Reply Online > > >>> (#107809):https://edk2.groups.io/g/devel/message/107809 > > >>> Mute This Topic:https://groups.io/mt/100788665/1643496 > > >>> Group Owner:devel+owner@edk2.groups.io > > >>> Unsubscribe:https://edk2.groups.io/g/devel/unsub > > >>> [michael.d.kinney@intel.com] > > >>> -=-=-=-=-=-= > > >>> > > >> > > >> -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110061): https://edk2.groups.io/g/devel/message/110061 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-10-25 18:08 ` Michael D Kinney @ 2023-10-26 21:08 ` VivianNK 2023-10-27 2:41 ` Michael D Kinney 0 siblings, 1 reply; 19+ messages in thread From: VivianNK @ 2023-10-26 21:08 UTC (permalink / raw) To: devel, michael.d.kinney Yes the sign-off is supposed to be the same, thanks for catching that. And I'll update my git config for the future! The PR looks good Thanks, - Vivian On 10/25/2023 11:08 AM, Michael D Kinney wrote: > I also noticed that the Author was not set correctly on > these patches. I updated using the same name/email from > your Signed-off-by tag. > > Please review your git config to match for future patches. > > I have started EDK II CI with the following PR: > > https://github.com/tianocore/edk2/pull/4957 > > Thanks, > > Mike > >> -----Original Message----- >> From: Kinney, Michael D <michael.d.kinney@intel.com> >> Sent: Wednesday, October 25, 2023 10:11 AM >> To: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com>; >> devel@edk2.groups.io >> Cc: Kinney, Michael D <michael.d.kinney@intel.com> >> Subject: RE: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update >> >> Hi Vivian, >> >> I am working on this. However, I noticed that Patch 6/7 was >> missing Signed-off-by tag. Is that supposed to be the same >> as the other 6 patches? >> >> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> >> >> Thanks, >> >> Mike >> >>> -----Original Message----- >>> From: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> >>> Sent: Tuesday, October 24, 2023 1:35 PM >>> To: devel@edk2.groups.io; Kinney, Michael D >>> <michael.d.kinney@intel.com> >>> Subject: Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest >> update >>> Hi, following up to see if there's any update on this. >>> >>> Thanks for your help, >>> >>> - Vivian >>> >>> On 9/27/2023 12:43 PM, Vivian Nowka-Keane wrote: >>>> Hi Mike, >>>> >>>> Can you help merge this? Looks like it has all of the reviews. >>>> >>>> Thank you! >>>> - Vivian >>>> >>>> On 9/12/2023 7:42 AM, Michael D Kinney wrote: >>>>> Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> >>>>> >>>>>> -----Original Message----- >>>>>> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of >>>>>> VivianNK >>>>>> Sent: Wednesday, August 16, 2023 2:15 PM >>>>>> To:devel@edk2.groups.io >>>>>> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest >> update >>>>>> v1 -> v2: >>>>>> - Update commit message to explain the audit only mode change >> is >>>>>> temporary to prevent intermediate CI failures. >>>>>> - Format patch Cc's correctly >>>>>> >>>>>> v1 archive:https://edk2.groups.io/g/devel/message/107665 >>>>>> >>>>>> VivianNK (7): >>>>>> .pytool: Set uncrustify check to audit only (temporary) >>>>>> .pytool: Add cpp support to uncrustify plugin >>>>>> MdeModulePkg: Apply uncrustify formatting to relevant files. >>>>>> MdePkg: Apply uncrustify formatting to relevant files >>>>>> SecurityPkg: Apply uncrustify formatting to relevant files >>>>>> UnitTestFrameworkPkg: Apply uncrustify formatting to relevant >>> files >>>>>> .pytool: Undo uncrustify check change >>>>>> >>>>>> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py >>>>>> | 2 +- >>>>>> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg >>>>>> | 4 +- >>>>>> >> MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp >>>>>> | 37 +- >>>>>> >> MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib >>> .h >>>>>> | 4 +- >>>>>> >>>>>> >> MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPci >>> HostBri >>>>>> dgeLib.cpp | 8 +- >>>>>> >>>>>> >> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT >>> ests32. >>>>>> cpp | 114 ++-- >>>>>> >>>>>> >> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT >>> ests64. >>>>>> cpp | 114 ++-- >>>>>> >>> MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp >>>>>> | 563 ++++++++++---------- >>>>>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h >>>>>> | 6 +- >>>>>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h >>>>>> | 6 +- >>>>>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h >>>>>> | 4 +- >>>>>> >>>>>> >> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTab >>> leLib.h >>>>>> | 4 +- >>>>>> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp >>>>>> | 40 +- >>>>>> >>>>>> >> MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServices >>> Lib.cpp >>>>>> | 52 +- >>>>>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp >>>>>> | 6 +- >>>>>> >>>>>> >> MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/Mo >>> ckUefiR >>>>>> untimeServicesTableLib.cpp | 12 +- >>>>>> >>>>>> >> SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariabl >>> eLibGoo >>>>>> gleTest.cpp | 205 ++++--- >>>>>> >>>>>> >> SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtect >>> ionLib. >>>>>> h | 4 +- >>>>>> >>>>>> >> SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/M >>> ockPlat >>>>>> formPKProtectionLib.cpp | 4 +- >>>>>> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h >>>>>> | 2 +- >>>>>> >>>>>> >> UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoo >>> gleTest >>>>>> .cpp | 76 +-- >>>>>> 21 files changed, 664 insertions(+), 603 deletions(-) >>>>>> >>>>>> -- >>>>>> 2.41.0.windows.3 >>>>>> >>>>>> >>>>>> >>>>>> -=-=-=-=-=-= >>>>>> Groups.io Links: You receive all messages sent to this group. >>>>>> View/Reply Online >>>>>> (#107809):https://edk2.groups.io/g/devel/message/107809 >>>>>> Mute This Topic:https://groups.io/mt/100788665/1643496 >>>>>> Group Owner:devel+owner@edk2.groups.io >>>>>> Unsubscribe:https://edk2.groups.io/g/devel/unsub >>>>>> [michael.d.kinney@intel.com] >>>>>> -=-=-=-=-=-= >>>>>> >>>>> > > > > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110142): https://edk2.groups.io/g/devel/message/110142 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update 2023-10-26 21:08 ` VivianNK @ 2023-10-27 2:41 ` Michael D Kinney 0 siblings, 0 replies; 19+ messages in thread From: Michael D Kinney @ 2023-10-27 2:41 UTC (permalink / raw) To: Vivian Nowka-Keane, devel@edk2.groups.io; +Cc: Kinney, Michael D Merged: https://github.com/tianocore/edk2/pull/4957 > -----Original Message----- > From: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > Sent: Thursday, October 26, 2023 2:08 PM > To: devel@edk2.groups.io; Kinney, Michael D > <michael.d.kinney@intel.com> > Subject: Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update > > Yes the sign-off is supposed to be the same, thanks for catching that. > And I'll update my git config for the future! > > The PR looks good > > Thanks, > - Vivian > > On 10/25/2023 11:08 AM, Michael D Kinney wrote: > > I also noticed that the Author was not set correctly on > > these patches. I updated using the same name/email from > > your Signed-off-by tag. > > > > Please review your git config to match for future patches. > > > > I have started EDK II CI with the following PR: > > > > https://github.com/tianocore/edk2/pull/4957 > > > > Thanks, > > > > Mike > > > >> -----Original Message----- > >> From: Kinney, Michael D <michael.d.kinney@intel.com> > >> Sent: Wednesday, October 25, 2023 10:11 AM > >> To: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com>; > >> devel@edk2.groups.io > >> Cc: Kinney, Michael D <michael.d.kinney@intel.com> > >> Subject: RE: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest > update > >> > >> Hi Vivian, > >> > >> I am working on this. However, I noticed that Patch 6/7 was > >> missing Signed-off-by tag. Is that supposed to be the same > >> as the other 6 patches? > >> > >> Signed-off-by: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > >> > >> Thanks, > >> > >> Mike > >> > >>> -----Original Message----- > >>> From: Vivian Nowka-Keane <vnowkakeane@linux.microsoft.com> > >>> Sent: Tuesday, October 24, 2023 1:35 PM > >>> To: devel@edk2.groups.io; Kinney, Michael D > >>> <michael.d.kinney@intel.com> > >>> Subject: Re: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest > >> update > >>> Hi, following up to see if there's any update on this. > >>> > >>> Thanks for your help, > >>> > >>> - Vivian > >>> > >>> On 9/27/2023 12:43 PM, Vivian Nowka-Keane wrote: > >>>> Hi Mike, > >>>> > >>>> Can you help merge this? Looks like it has all of the reviews. > >>>> > >>>> Thank you! > >>>> - Vivian > >>>> > >>>> On 9/12/2023 7:42 AM, Michael D Kinney wrote: > >>>>> Series Reviewed-by: Michael D Kinney<michael.d.kinney@intel.com> > >>>>> > >>>>>> -----Original Message----- > >>>>>> From:devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of > >>>>>> VivianNK > >>>>>> Sent: Wednesday, August 16, 2023 2:15 PM > >>>>>> To:devel@edk2.groups.io > >>>>>> Subject: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest > >> update > >>>>>> v1 -> v2: > >>>>>> - Update commit message to explain the audit only mode > change > >> is > >>>>>> temporary to prevent intermediate CI failures. > >>>>>> - Format patch Cc's correctly > >>>>>> > >>>>>> v1 archive:https://edk2.groups.io/g/devel/message/107665 > >>>>>> > >>>>>> VivianNK (7): > >>>>>> .pytool: Set uncrustify check to audit only (temporary) > >>>>>> .pytool: Add cpp support to uncrustify plugin > >>>>>> MdeModulePkg: Apply uncrustify formatting to relevant > files. > >>>>>> MdePkg: Apply uncrustify formatting to relevant files > >>>>>> SecurityPkg: Apply uncrustify formatting to relevant files > >>>>>> UnitTestFrameworkPkg: Apply uncrustify formatting to > relevant > >>> files > >>>>>> .pytool: Undo uncrustify check change > >>>>>> > >>>>>> .pytool/Plugin/UncrustifyCheck/UncrustifyCheck.py > >>>>>> | 2 +- > >>>>>> .pytool/Plugin/UncrustifyCheck/uncrustify.cfg > >>>>>> | 4 +- > >>>>>> > >> > MdeModulePkg/Library/UefiSortLib/GoogleTest/UefiSortLibGoogleTest.cpp > >>>>>> | 37 +- > >>>>>> > >> > MdeModulePkg/Test/Mock/Include/GoogleTest/Library/MockPciHostBridgeLib > >>> .h > >>>>>> | 4 +- > >>>>>> > >>>>>> > >> > MdeModulePkg/Test/Mock/Library/GoogleTest/MockPciHostBridgeLib/MockPci > >>> HostBri > >>>>>> dgeLib.cpp | 8 +- > >>>>>> > >>>>>> > >> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > >>> ests32. > >>>>>> cpp | 114 ++-- > >>>>>> > >>>>>> > >> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/SafeIntLibUintnIntnUnitT > >>> ests64. > >>>>>> cpp | 114 ++-- > >>>>>> > >>> > MdePkg/Test/GoogleTest/Library/BaseSafeIntLib/TestBaseSafeIntLib.cpp > >>>>>> | 563 ++++++++++---------- > >>>>>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockHobLib.h > >>>>>> | 6 +- > >>>>>> > MdePkg/Test/Mock/Include/GoogleTest/Library/MockPeiServicesLib.h > >>>>>> | 6 +- > >>>>>> MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiLib.h > >>>>>> | 4 +- > >>>>>> > >>>>>> > >> > MdePkg/Test/Mock/Include/GoogleTest/Library/MockUefiRuntimeServicesTab > >>> leLib.h > >>>>>> | 4 +- > >>>>>> MdePkg/Test/Mock/Library/GoogleTest/MockHobLib/MockHobLib.cpp > >>>>>> | 40 +- > >>>>>> > >>>>>> > >> > MdePkg/Test/Mock/Library/GoogleTest/MockPeiServicesLib/MockPeiServices > >>> Lib.cpp > >>>>>> | 52 +- > >>>>>> MdePkg/Test/Mock/Library/GoogleTest/MockUefiLib/MockUefiLib.cpp > >>>>>> | 6 +- > >>>>>> > >>>>>> > >> > MdePkg/Test/Mock/Library/GoogleTest/MockUefiRuntimeServicesTableLib/Mo > >>> ckUefiR > >>>>>> untimeServicesTableLib.cpp | 12 +- > >>>>>> > >>>>>> > >> > SecurityPkg/Library/SecureBootVariableLib/GoogleTest/SecureBootVariabl > >>> eLibGoo > >>>>>> gleTest.cpp | 205 ++++--- > >>>>>> > >>>>>> > >> > SecurityPkg/Test/Mock/Include/GoogleTest/Library/MockPlatformPKProtect > >>> ionLib. > >>>>>> h | 4 +- > >>>>>> > >>>>>> > >> > SecurityPkg/Test/Mock/Library/GoogleTest/MockPlatformPKProtectionLib/M > >>> ockPlat > >>>>>> formPKProtectionLib.cpp | 4 +- > >>>>>> UnitTestFrameworkPkg/Include/Library/GoogleTestLib.h > >>>>>> | 2 +- > >>>>>> > >>>>>> > >> > UnitTestFrameworkPkg/Test/GoogleTest/Sample/SampleGoogleTest/SampleGoo > >>> gleTest > >>>>>> .cpp | 76 +-- > >>>>>> 21 files changed, 664 insertions(+), 603 deletions(-) > >>>>>> > >>>>>> -- > >>>>>> 2.41.0.windows.3 > >>>>>> > >>>>>> > >>>>>> > >>>>>> -=-=-=-=-=-= > >>>>>> Groups.io Links: You receive all messages sent to this group. > >>>>>> View/Reply Online > >>>>>> (#107809):https://edk2.groups.io/g/devel/message/107809 > >>>>>> Mute This Topic:https://groups.io/mt/100788665/1643496 > >>>>>> Group Owner:devel+owner@edk2.groups.io > >>>>>> Unsubscribe:https://edk2.groups.io/g/devel/unsub > >>>>>> [michael.d.kinney@intel.com] > >>>>>> -=-=-=-=-=-= > >>>>>> > >>>>> > > > > > > > > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#110170): https://edk2.groups.io/g/devel/message/110170 Mute This Topic: https://groups.io/mt/100788665/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- ^ permalink raw reply [flat|nested] 19+ messages in thread
end of thread, other threads:[~2023-10-27 2:41 UTC | newest] Thread overview: 19+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2023-08-16 21:15 [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 1/7] .pytool: Set uncrustify check to audit only (temporary) VivianNK 2023-08-16 22:09 ` Michael Kubacki 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 2/7] .pytool: Add cpp support to uncrustify plugin VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 3/7] MdeModulePkg: Apply uncrustify formatting to relevant files VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 4/7] MdePkg: " VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 5/7] SecurityPkg: " VivianNK 2023-08-17 2:41 ` Yao, Jiewen 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 6/7] UnitTestFrameworkPkg: " VivianNK 2023-08-16 21:15 ` [edk2-devel] [PATCH v2 7/7] .pytool: Undo uncrustify check change VivianNK 2023-08-16 22:09 ` Michael Kubacki 2023-09-12 1:08 ` 回复: [edk2-devel] [PATCH v2 0/7] Uncrustify GoogleTest update gaoliming via groups.io 2023-09-12 14:42 ` Michael D Kinney 2023-09-27 19:43 ` VivianNK 2023-10-24 20:34 ` VivianNK 2023-10-25 17:11 ` Michael D Kinney 2023-10-25 18:08 ` Michael D Kinney 2023-10-26 21:08 ` VivianNK 2023-10-27 2:41 ` Michael D Kinney
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox