# RUN: yaml2obj %p/Inputs/ret42.yaml -o %t.obj
# RUN: rm -f %t.exe.manifest
# RUN: lld-link /out:%t.exe /entry:main %t.obj
# RUN: test ! -e %t.exe.manifest
# RUN: lld-link /manifest /out:%t.exe /entry:main %t.obj
# RUN: FileCheck -check-prefix=MANIFEST %s < %t.exe.manifest
MANIFEST: <?xml version="1.0" standalone="yes"?>
MANIFEST: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
MANIFEST: manifestVersion="1.0">
MANIFEST: <trustInfo>
MANIFEST: <security>
MANIFEST: <requestedPrivileges>
MANIFEST: <requestedExecutionLevel level='asInvoker' uiAccess='false'/>
MANIFEST: </requestedPrivileges>
MANIFEST: </security>
MANIFEST: </trustInfo>
MANIFEST: </assembly>
# RUN: lld-link /out:%t.exe /entry:main /manifest \
# RUN: /manifestuac:"level='requireAdministrator' uiAccess='true'" %t.obj
# RUN: FileCheck -check-prefix=UAC %s < %t.exe.manifest
UAC: <?xml version="1.0" standalone="yes"?>
UAC: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
UAC: manifestVersion="1.0">
UAC: <trustInfo>
UAC: <security>
UAC: <requestedPrivileges>
UAC: <requestedExecutionLevel level='requireAdministrator' uiAccess='true'/>
UAC: </requestedPrivileges>
UAC: </security>
UAC: </trustInfo>
UAC: </assembly>
# /manifestdependency implies /manifest. (/manifestuac doesn't.)
# RUN: lld-link /out:%t.exe /entry:main \
# RUN: /manifestdependency:"foo='bar'" %t.obj
# RUN: FileCheck -check-prefix=DEPENDENCY %s < %t.exe.manifest
DEPENDENCY: <?xml version="1.0" standalone="yes"?>
DEPENDENCY: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
DEPENDENCY: manifestVersion="1.0">
DEPENDENCY: <trustInfo>
DEPENDENCY: <security>
DEPENDENCY: <requestedPrivileges>
DEPENDENCY: <requestedExecutionLevel level='asInvoker' uiAccess='false'/>
DEPENDENCY: </requestedPrivileges>
DEPENDENCY: </security>
DEPENDENCY: </trustInfo>
DEPENDENCY: <dependency>
DEPENDENCY: <dependentAssembly>
DEPENDENCY: <assemblyIdentity foo='bar' />
DEPENDENCY: </dependentAssembly>
DEPENDENCY: </dependency>
DEPENDENCY: </assembly>
# RUN: lld-link /manifest /out:%t.exe /entry:main /manifestuac:no \
# RUN: /manifestdependency:"foo='bar'" %t.obj
# RUN: FileCheck -check-prefix=NOUAC %s < %t.exe.manifest
NOUAC: <?xml version="1.0" standalone="yes"?>
NOUAC: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
NOUAC: manifestVersion="1.0">
NOUAC: <dependency>
NOUAC: <dependentAssembly>
NOUAC: <assemblyIdentity foo='bar' />
NOUAC: </dependentAssembly>
NOUAC: </dependency>
NOUAC: </assembly>
# RUN: lld-link /manifest /out:%t.exe /entry:main /manifestuac:no %t.obj
# RUN: FileCheck -check-prefix=NOUACNODEP %s < %t.exe.manifest
NOUACNODEP: <?xml version="1.0" standalone="yes"?>
NOUACNODEP: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
NOUACNODEP: manifestVersion="1.0">
NOUACNODEP: </assembly>
# Several /manifestdependency: flags are naively dedup'd.
# RUN: lld-link /out:%t.exe /entry:main \
# RUN: /manifestdependency:"foo='bar'" \
# RUN: /manifestdependency:"foo='bar'" \
# RUN: /manifestdependency:"baz='quux'" \
# RUN: %t.obj
# RUN: FileCheck -check-prefix=SEVERALDEPS %s < %t.exe.manifest
SEVERALDEPS: <?xml version="1.0" standalone="yes"?>
SEVERALDEPS: <assembly xmlns="urn:schemas-microsoft-com:asm.v1"
SEVERALDEPS: manifestVersion="1.0">
SEVERALDEPS: <trustInfo>
SEVERALDEPS: <security>
SEVERALDEPS: <requestedPrivileges>
SEVERALDEPS: <requestedExecutionLevel level='asInvoker' uiAccess='false'/>
SEVERALDEPS: </requestedPrivileges>
SEVERALDEPS: </security>
SEVERALDEPS: </trustInfo>
SEVERALDEPS: <dependency>
SEVERALDEPS: <dependentAssembly>
SEVERALDEPS: <assemblyIdentity foo='bar' />
SEVERALDEPS: </dependentAssembly>
SEVERALDEPS: <dependency>
SEVERALDEPS: <dependentAssembly>
SEVERALDEPS: <assemblyIdentity baz='quux' />
SEVERALDEPS: </dependentAssembly>
SEVERALDEPS: </dependency>
SEVERALDEPS: </assembly>
# /manifestdependency: flags can be in .drectve sections.
# RUN: yaml2obj %p/Inputs/manifestdependency-drectve.yaml -o %t.dir.obj
# RUN: rm %t.exe.manifest
# RUN: lld-link /out:%t.exe /entry:main \
# RUN: %t.obj %t.dir.obj
# RUN: FileCheck -check-prefix=SEVERALDEPS %s < %t.exe.manifest
# /manifestdependency: flags in .drectve sections are ignored with an
# explicit /manifest:no.
# RUN: rm %t.exe.manifest
# RUN: lld-link /out:%t.exe /entry:main /manifest:no \
# RUN: %t.obj %t.dir.obj
# RUN: test ! -e %t.exe.manifest
# Test that /manifestdependency: flags in .drectve sections work
# with /manifest:embed too.
# RUN: lld-link /out:%t.exe /entry:main /manifest:embed \
# RUN: %t.obj %t.dir.obj
# RUN: test ! -e %t.exe.manifest
# RUN: llvm-readobj --coff-resources %t.exe \
# RUN: | FileCheck --check-prefix EMBED %s
EMBED: Data (
EMBED: 0000: 3C3F786D 6C207665 7273696F 6E3D2231 |<?xml version="1|
EMBED: 0010: 2E302220 7374616E 64616C6F 6E653D22 |.0" standalone="|
EMBED: 0020: 79657322 3F3E0A3C 61737365 6D626C79 |yes"?>.<assembly|
EMBED: 0030: 20786D6C 6E733D22 75726E3A 73636865 | xmlns="urn:sche|
EMBED: 0040: 6D61732D 6D696372 6F736F66 742D636F |mas-microsoft-co|
EMBED: 0050: 6D3A6173 6D2E7631 220A2020 20202020 |m:asm.v1". |
EMBED: 0060: 20202020 6D616E69 66657374 56657273 | manifestVers|
EMBED: 0070: 696F6E3D 22312E30 223E0A20 203C7472 |ion="1.0">. <tr|
EMBED: 0080: 75737449 6E666F3E 0A202020 203C7365 |ustInfo>. <se|
EMBED: 0090: 63757269 74793E0A 20202020 20203C72 |curity>. <r|
EMBED: 00A0: 65717565 73746564 50726976 696C6567 |equestedPrivileg|
EMBED: 00B0: 65733E0A 20202020 20202020 203C7265 |es>. <re|
EMBED: 00C0: 71756573 74656445 78656375 74696F6E |questedExecution|
EMBED: 00D0: 4C657665 6C206C65 76656C3D 27617349 |Level level='asI|
EMBED: 00E0: 6E766F6B 65722720 75694163 63657373 |nvoker' uiAccess|
EMBED: 00F0: 3D276661 6C736527 2F3E0A20 20202020 |='false'/>. |
EMBED: 0100: 203C2F72 65717565 73746564 50726976 | </requestedPriv|
EMBED: 0110: 696C6567 65733E0A 20202020 3C2F7365 |ileges>. </se|
EMBED: 0120: 63757269 74793E0A 20203C2F 74727573 |curity>. </trus|
EMBED: 0130: 74496E66 6F3E0A20 203C6465 70656E64 |tInfo>. <depend|
EMBED: 0140: 656E6379 3E0A2020 20203C64 6570656E |ency>. <depen|
EMBED: 0150: 64656E74 41737365 6D626C79 3E0A2020 |dentAssembly>. |
EMBED: 0160: 20202020 3C617373 656D626C 79496465 | <assemblyIde|
EMBED: 0170: 6E746974 7920666F 6F3D2762 61722720 |ntity foo='bar' |
EMBED: 0180: 2F3E0A20 2020203C 2F646570 656E6465 |/>. </depende|
EMBED: 0190: 6E744173 73656D62 6C793E0A 20203C2F |ntAssembly>. </|
EMBED: 01A0: 64657065 6E64656E 63793E0A 20203C64 |dependency>. <d|
EMBED: 01B0: 6570656E 64656E63 793E0A20 2020203C |ependency>. <|
EMBED: 01C0: 64657065 6E64656E 74417373 656D626C |dependentAssembl|
EMBED: 01D0: 793E0A20 20202020 203C6173 73656D62 |y>. <assemb|
EMBED: 01E0: 6C794964 656E7469 74792062 617A3D27 |lyIdentity baz='|
EMBED: 01F0: 71757578 27202F3E 0A202020 203C2F64 |quux' />. </d|
EMBED: 0200: 6570656E 64656E74 41737365 6D626C79 |ependentAssembly|
EMBED: 0210: 3E0A2020 3C2F6465 70656E64 656E6379 |>. </dependency|
EMBED: 0220: 3E0A3C2F 61737365 6D626C79 3E0A |>.</assembly>.|
EMBED: )