Issues like #4427 have mentioned
such function unfortunately doesn't exit. The only way I know of (and that I suspect is the only possible way) to get the value of exe_wrapper is to call
exe_wrapper = find_program('exe_wrapper', required: false)
If the cross file does not provide a exe_wrapper (or if no cross file is used), $PATH is used. This behavior leads to unexpected and possibly unanticipated results. I wouldn't be surprised if this was a possible attack vector (but don't quote me on that).
This issue is related to #13399, but I am sure that there are plenty of other scenarios where having access to exe_wrapper would be useful.
Issues like #4427 have mentioned
meson.get_exe_wrapper()such function unfortunately doesn't exit. The only way I know of (and that I suspect is the only possible way) to get the value of
exe_wrapperis to callIf the cross file does not provide a
exe_wrapper(or if no cross file is used),$PATHis used. This behavior leads to unexpected and possibly unanticipated results. I wouldn't be surprised if this was a possible attack vector (but don't quote me on that).This issue is related to #13399, but I am sure that there are plenty of other scenarios where having access to
exe_wrapperwould be useful.