| // Copyright 2020 Google Inc. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package android |
| |
| import ( |
| "bytes" |
| "fmt" |
| "os" |
| "path" |
| "path/filepath" |
| "runtime" |
| "sort" |
| "strings" |
| "sync" |
| |
| "android/soong/android/allowlists" |
| "android/soong/bazel/cquery" |
| "android/soong/shared" |
| "android/soong/starlark_fmt" |
| |
| "github.com/google/blueprint" |
| "github.com/google/blueprint/metrics" |
| |
| "android/soong/bazel" |
| ) |
| |
| var ( |
| _ = pctx.HostBinToolVariable("bazelBuildRunfilesTool", "build-runfiles") |
| buildRunfilesRule = pctx.AndroidStaticRule("bazelBuildRunfiles", blueprint.RuleParams{ |
| Command: "${bazelBuildRunfilesTool} ${in} ${outDir}", |
| Depfile: "", |
| Description: "", |
| CommandDeps: []string{"${bazelBuildRunfilesTool}"}, |
| }, "outDir") |
| allowedBazelEnvironmentVars = []string{ |
| // clang-tidy |
| "ALLOW_LOCAL_TIDY_TRUE", |
| "DEFAULT_TIDY_HEADER_DIRS", |
| "TIDY_TIMEOUT", |
| "WITH_TIDY", |
| "WITH_TIDY_FLAGS", |
| "TIDY_EXTERNAL_VENDOR", |
| |
| "SKIP_ABI_CHECKS", |
| "UNSAFE_DISABLE_APEX_ALLOWED_DEPS_CHECK", |
| "AUTO_ZERO_INITIALIZE", |
| "AUTO_PATTERN_INITIALIZE", |
| "AUTO_UNINITIALIZE", |
| "USE_CCACHE", |
| "LLVM_NEXT", |
| "LLVM_PREBUILTS_VERSION", |
| "LLVM_RELEASE_VERSION", |
| "ALLOW_UNKNOWN_WARNING_OPTION", |
| |
| "UNBUNDLED_BUILD_TARGET_SDK_WITH_API_FINGERPRINT", |
| |
| // Overrides the version in the apex_manifest.json. The version is unique for |
| // each branch (internal, aosp, mainline releases, dessert releases). This |
| // enables modules built on an older branch to be installed against a newer |
| // device for development purposes. |
| "OVERRIDE_APEX_MANIFEST_DEFAULT_VERSION", |
| } |
| ) |
| |
| func registerMixedBuildsMutator(ctx RegisterMutatorsContext) { |
| ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel() |
| } |
| |
| func RegisterMixedBuildsMutator(ctx RegistrationContext) { |
| ctx.FinalDepsMutators(registerMixedBuildsMutator) |
| } |
| |
| func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) { |
| if m := ctx.Module(); m.Enabled() { |
| if mixedBuildMod, ok := m.(MixedBuildBuildable); ok { |
| mixedBuildEnabled := MixedBuildsEnabled(ctx) |
| queueMixedBuild := mixedBuildMod.IsMixedBuildSupported(ctx) && mixedBuildEnabled == MixedBuildEnabled |
| if queueMixedBuild { |
| mixedBuildMod.QueueBazelCall(ctx) |
| } |
| } |
| } |
| } |
| |
| type cqueryRequest interface { |
| // Name returns a string name for this request type. Such request type names must be unique, |
| // and must only consist of alphanumeric characters. |
| Name() string |
| |
| // StarlarkFunctionBody returns a starlark function body to process this request type. |
| // The returned string is the body of a Starlark function which obtains |
| // all request-relevant information about a target and returns a string containing |
| // this information. |
| // The function should have the following properties: |
| // - The arguments are `target` (a configured target) and `id_string` (the label + configuration). |
| // - The return value must be a string. |
| // - The function body should not be indented outside of its own scope. |
| StarlarkFunctionBody() string |
| } |
| |
| // Portion of cquery map key to describe target configuration. |
| type configKey struct { |
| arch string |
| osType OsType |
| apexKey ApexConfigKey |
| } |
| |
| type ApexConfigKey struct { |
| WithinApex bool |
| ApexSdkVersion string |
| } |
| |
| func (c ApexConfigKey) String() string { |
| return fmt.Sprintf("%s_%s", withinApexToString(c.WithinApex), c.ApexSdkVersion) |
| } |
| |
| func withinApexToString(withinApex bool) string { |
| if withinApex { |
| return "within_apex" |
| } |
| return "" |
| } |
| |
| func (c configKey) String() string { |
| return fmt.Sprintf("%s::%s::%s", c.arch, c.osType, c.apexKey) |
| } |
| |
| // Map key to describe bazel cquery requests. |
| type cqueryKey struct { |
| label string |
| requestType cqueryRequest |
| configKey configKey |
| } |
| |
| func makeCqueryKey(label string, cqueryRequest cqueryRequest, cfgKey configKey) cqueryKey { |
| if strings.HasPrefix(label, "//") { |
| // Normalize Bazel labels to specify main repository explicitly. |
| label = "@" + label |
| } |
| return cqueryKey{label, cqueryRequest, cfgKey} |
| } |
| |
| func (c cqueryKey) String() string { |
| return fmt.Sprintf("cquery(%s,%s,%s)", c.label, c.requestType.Name(), c.configKey) |
| } |
| |
| type invokeBazelContext interface { |
| GetEventHandler() *metrics.EventHandler |
| } |
| |
| // BazelContext is a context object useful for interacting with Bazel during |
| // the course of a build. Use of Bazel to evaluate part of the build graph |
| // is referred to as a "mixed build". (Some modules are managed by Soong, |
| // some are managed by Bazel). To facilitate interop between these build |
| // subgraphs, Soong may make requests to Bazel and evaluate their responses |
| // so that Soong modules may accurately depend on Bazel targets. |
| type BazelContext interface { |
| // Add a cquery request to the bazel request queue. All queued requests |
| // will be sent to Bazel on a subsequent invocation of InvokeBazel. |
| QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) |
| |
| // ** Cquery Results Retrieval Functions |
| // The below functions pertain to retrieving cquery results from a prior |
| // InvokeBazel function call and parsing the results. |
| |
| // Returns result files built by building the given bazel target label. |
| GetOutputFiles(label string, cfgKey configKey) ([]string, error) |
| |
| // Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order). |
| GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) |
| |
| // Returns the results of the GetApexInfo query (including output files) |
| GetApexInfo(label string, cfgkey configKey) (cquery.ApexInfo, error) |
| |
| // Returns the results of the GetCcUnstrippedInfo query |
| GetCcUnstrippedInfo(label string, cfgkey configKey) (cquery.CcUnstrippedInfo, error) |
| |
| // Returns the results of the GetPrebuiltFileInfo query |
| GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) |
| |
| // ** end Cquery Results Retrieval Functions |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. The ctx argument is optional and is only |
| // used for performance data collection |
| InvokeBazel(config Config, ctx invokeBazelContext) error |
| |
| // Returns true if Bazel handling is enabled for the module with the given name. |
| // Note that this only implies "bazel mixed build" allowlisting. The caller |
| // should independently verify the module is eligible for Bazel handling |
| // (for example, that it is MixedBuildBuildable). |
| IsModuleNameAllowed(moduleName string, withinApex bool) bool |
| |
| IsModuleDclaAllowed(moduleName string) bool |
| |
| // Returns the bazel output base (the root directory for all bazel intermediate outputs). |
| OutputBase() string |
| |
| // Returns build statements which should get registered to reflect Bazel's outputs. |
| BuildStatementsToRegister() []*bazel.BuildStatement |
| |
| // Returns the depsets defined in Bazel's aquery response. |
| AqueryDepsets() []bazel.AqueryDepset |
| } |
| |
| type bazelRunner interface { |
| issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (output string, errorMessage string, error error) |
| } |
| |
| type bazelPaths struct { |
| homeDir string |
| bazelPath string |
| outputBase string |
| workspaceDir string |
| soongOutDir string |
| metricsDir string |
| bazelDepsFile string |
| } |
| |
| // A context object which tracks queued requests that need to be made to Bazel, |
| // and their results after the requests have been made. |
| type mixedBuildBazelContext struct { |
| bazelRunner |
| paths *bazelPaths |
| // cquery requests that have not yet been issued to Bazel. This list is maintained |
| // in a sorted state, and is guaranteed to have no duplicates. |
| requests []cqueryKey |
| requestMutex sync.Mutex // requests can be written in parallel |
| |
| results map[cqueryKey]string // Results of cquery requests after Bazel invocations |
| |
| // Build statements which should get registered to reflect Bazel's outputs. |
| buildStatements []*bazel.BuildStatement |
| |
| // Depsets which should be used for Bazel's build statements. |
| depsets []bazel.AqueryDepset |
| |
| // Per-module allowlist/denylist functionality to control whether analysis of |
| // modules are handled by Bazel. For modules which do not have a Bazel definition |
| // (or do not sufficiently support bazel handling via MixedBuildBuildable), |
| // this allowlist will have no effect, even if the module is explicitly allowlisted here. |
| // Per-module denylist to opt modules out of bazel handling. |
| bazelDisabledModules map[string]bool |
| // Per-module allowlist to opt modules in to bazel handling. |
| bazelEnabledModules map[string]bool |
| // DCLA modules are enabled when used in apex. |
| bazelDclaEnabledModules map[string]bool |
| // If true, modules are bazel-enabled by default, unless present in bazelDisabledModules. |
| modulesDefaultToBazel bool |
| |
| targetProduct string |
| targetBuildVariant string |
| } |
| |
| var _ BazelContext = &mixedBuildBazelContext{} |
| |
| // A bazel context to use when Bazel is disabled. |
| type noopBazelContext struct{} |
| |
| var _ BazelContext = noopBazelContext{} |
| |
| // A bazel context to use for tests. |
| type MockBazelContext struct { |
| OutputBaseDir string |
| |
| LabelToOutputFiles map[string][]string |
| LabelToCcInfo map[string]cquery.CcInfo |
| LabelToPythonBinary map[string]string |
| LabelToApexInfo map[string]cquery.ApexInfo |
| LabelToCcBinary map[string]cquery.CcUnstrippedInfo |
| LabelToPrebuiltFileInfo map[string]cquery.PrebuiltFileInfo |
| |
| BazelRequests map[string]bool |
| } |
| |
| func (m MockBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { |
| key := BuildMockBazelContextRequestKey(label, requestType, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) |
| if m.BazelRequests == nil { |
| m.BazelRequests = make(map[string]bool) |
| } |
| m.BazelRequests[key] = true |
| } |
| |
| func (m MockBazelContext) GetOutputFiles(label string, _ configKey) ([]string, error) { |
| result, ok := m.LabelToOutputFiles[label] |
| if !ok { |
| return []string{}, fmt.Errorf("no target with label %q in LabelToOutputFiles", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { |
| result, ok := m.LabelToCcInfo[label] |
| if !ok { |
| key := BuildMockBazelContextResultKey(label, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) |
| result, ok = m.LabelToCcInfo[key] |
| if !ok { |
| return cquery.CcInfo{}, fmt.Errorf("no target with label %q in LabelToCcInfo", label) |
| } |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetApexInfo(label string, _ configKey) (cquery.ApexInfo, error) { |
| result, ok := m.LabelToApexInfo[label] |
| if !ok { |
| return cquery.ApexInfo{}, fmt.Errorf("no target with label %q in LabelToApexInfo", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetCcUnstrippedInfo(label string, _ configKey) (cquery.CcUnstrippedInfo, error) { |
| result, ok := m.LabelToCcBinary[label] |
| if !ok { |
| return cquery.CcUnstrippedInfo{}, fmt.Errorf("no target with label %q in LabelToCcBinary", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetPrebuiltFileInfo(label string, _ configKey) (cquery.PrebuiltFileInfo, error) { |
| result, ok := m.LabelToPrebuiltFileInfo[label] |
| if !ok { |
| return cquery.PrebuiltFileInfo{}, fmt.Errorf("no target with label %q in LabelToPrebuiltFileInfo", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { |
| return true |
| } |
| |
| func (m MockBazelContext) IsModuleDclaAllowed(_ string) bool { |
| return true |
| } |
| |
| func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir } |
| |
| func (m MockBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return []*bazel.BuildStatement{} |
| } |
| |
| func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| var _ BazelContext = MockBazelContext{} |
| |
| func BuildMockBazelContextRequestKey(label string, request cqueryRequest, arch string, osType OsType, apexKey ApexConfigKey) string { |
| cfgKey := configKey{ |
| arch: arch, |
| osType: osType, |
| apexKey: apexKey, |
| } |
| |
| return strings.Join([]string{label, request.Name(), cfgKey.String()}, "_") |
| } |
| |
| func BuildMockBazelContextResultKey(label string, arch string, osType OsType, apexKey ApexConfigKey) string { |
| cfgKey := configKey{ |
| arch: arch, |
| osType: osType, |
| apexKey: apexKey, |
| } |
| |
| return strings.Join([]string{label, cfgKey.String()}, "_") |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { |
| key := makeCqueryKey(label, requestType, cfgKey) |
| bazelCtx.requestMutex.Lock() |
| defer bazelCtx.requestMutex.Unlock() |
| |
| // Insert key into requests, maintaining the sort, and only if it's not duplicate. |
| keyString := key.String() |
| foundEqual := false |
| notLessThanKeyString := func(i int) bool { |
| s := bazelCtx.requests[i].String() |
| v := strings.Compare(s, keyString) |
| if v == 0 { |
| foundEqual = true |
| } |
| return v >= 0 |
| } |
| targetIndex := sort.Search(len(bazelCtx.requests), notLessThanKeyString) |
| if foundEqual { |
| return |
| } |
| |
| if targetIndex == len(bazelCtx.requests) { |
| bazelCtx.requests = append(bazelCtx.requests, key) |
| } else { |
| bazelCtx.requests = append(bazelCtx.requests[:targetIndex+1], bazelCtx.requests[targetIndex:]...) |
| bazelCtx.requests[targetIndex] = key |
| } |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) { |
| key := makeCqueryKey(label, cquery.GetOutputFiles, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| |
| return cquery.GetOutputFiles.ParseResult(bazelOutput), nil |
| } |
| return nil, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { |
| key := makeCqueryKey(label, cquery.GetCcInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| return cquery.GetCcInfo.ParseResult(bazelOutput) |
| } |
| return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetApexInfo(label string, cfgKey configKey) (cquery.ApexInfo, error) { |
| key := makeCqueryKey(label, cquery.GetApexInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetApexInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.ApexInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetCcUnstrippedInfo(label string, cfgKey configKey) (cquery.CcUnstrippedInfo, error) { |
| key := makeCqueryKey(label, cquery.GetCcUnstrippedInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetCcUnstrippedInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.CcUnstrippedInfo{}, fmt.Errorf("no bazel response for %s", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) { |
| key := makeCqueryKey(label, cquery.GetPrebuiltFileInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetPrebuiltFileInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.PrebuiltFileInfo{}, fmt.Errorf("no bazel response for %s", key) |
| } |
| |
| func (n noopBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetOutputFiles(_ string, _ configKey) ([]string, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetCcInfo(_ string, _ configKey) (cquery.CcInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetCcUnstrippedInfo(_ string, _ configKey) (cquery.CcUnstrippedInfo, error) { |
| //TODO implement me |
| panic("implement me") |
| } |
| |
| func (n noopBazelContext) GetPrebuiltFileInfo(_ string, _ configKey) (cquery.PrebuiltFileInfo, error) { |
| panic("implement me") |
| } |
| |
| func (n noopBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { |
| panic("unimplemented") |
| } |
| |
| func (m noopBazelContext) OutputBase() string { |
| return "" |
| } |
| |
| func (n noopBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { |
| return false |
| } |
| |
| func (n noopBazelContext) IsModuleDclaAllowed(_ string) bool { |
| return false |
| } |
| |
| func (m noopBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return []*bazel.BuildStatement{} |
| } |
| |
| func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| func AddToStringSet(set map[string]bool, items []string) { |
| for _, item := range items { |
| set[item] = true |
| } |
| } |
| |
| func GetBazelEnabledAndDisabledModules(buildMode SoongBuildMode, forceEnabled map[string]struct{}) (map[string]bool, map[string]bool) { |
| disabledModules := map[string]bool{} |
| enabledModules := map[string]bool{} |
| |
| switch buildMode { |
| case BazelProdMode: |
| AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) |
| for enabledAdHocModule := range forceEnabled { |
| enabledModules[enabledAdHocModule] = true |
| } |
| case BazelStagingMode: |
| // Staging mode includes all prod modules plus all staging modules. |
| AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) |
| AddToStringSet(enabledModules, allowlists.StagingMixedBuildsEnabledList) |
| for enabledAdHocModule := range forceEnabled { |
| enabledModules[enabledAdHocModule] = true |
| } |
| case BazelDevMode: |
| AddToStringSet(disabledModules, allowlists.MixedBuildsDisabledList) |
| default: |
| panic("Expected BazelProdMode, BazelStagingMode, or BazelDevMode") |
| } |
| return enabledModules, disabledModules |
| } |
| |
| func GetBazelEnabledModules(buildMode SoongBuildMode) []string { |
| enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(buildMode, nil) |
| enabledList := make([]string, 0, len(enabledModules)) |
| for module := range enabledModules { |
| if !disabledModules[module] { |
| enabledList = append(enabledList, module) |
| } |
| } |
| sort.Strings(enabledList) |
| return enabledList |
| } |
| |
| func NewBazelContext(c *config) (BazelContext, error) { |
| if c.BuildMode != BazelProdMode && c.BuildMode != BazelStagingMode && c.BuildMode != BazelDevMode { |
| return noopBazelContext{}, nil |
| } |
| |
| enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(c.BuildMode, c.BazelModulesForceEnabledByFlag()) |
| |
| paths := bazelPaths{ |
| soongOutDir: c.soongOutDir, |
| } |
| var missing []string |
| vars := []struct { |
| name string |
| ptr *string |
| |
| // True if the environment variable needs to be tracked so that changes to the variable |
| // cause the ninja file to be regenerated, false otherwise. False should only be set for |
| // environment variables that have no effect on the generated ninja file. |
| track bool |
| }{ |
| {"BAZEL_HOME", &paths.homeDir, true}, |
| {"BAZEL_PATH", &paths.bazelPath, true}, |
| {"BAZEL_OUTPUT_BASE", &paths.outputBase, true}, |
| {"BAZEL_WORKSPACE", &paths.workspaceDir, true}, |
| {"BAZEL_METRICS_DIR", &paths.metricsDir, false}, |
| {"BAZEL_DEPS_FILE", &paths.bazelDepsFile, true}, |
| } |
| for _, v := range vars { |
| if v.track { |
| if s := c.Getenv(v.name); len(s) > 1 { |
| *v.ptr = s |
| continue |
| } |
| } else if s, ok := c.env[v.name]; ok { |
| *v.ptr = s |
| } else { |
| missing = append(missing, v.name) |
| } |
| } |
| if len(missing) > 0 { |
| return nil, fmt.Errorf("missing required env vars to use bazel: %s", missing) |
| } |
| |
| targetBuildVariant := "user" |
| if c.Eng() { |
| targetBuildVariant = "eng" |
| } else if c.Debuggable() { |
| targetBuildVariant = "userdebug" |
| } |
| targetProduct := "unknown" |
| if c.HasDeviceProduct() { |
| targetProduct = c.DeviceProduct() |
| } |
| dclaMixedBuildsEnabledList := []string{} |
| if c.BuildMode == BazelProdMode { |
| dclaMixedBuildsEnabledList = allowlists.ProdDclaMixedBuildsEnabledList |
| } else if c.BuildMode == BazelStagingMode { |
| dclaMixedBuildsEnabledList = append(allowlists.ProdDclaMixedBuildsEnabledList, |
| allowlists.StagingDclaMixedBuildsEnabledList...) |
| } |
| dclaEnabledModules := map[string]bool{} |
| AddToStringSet(dclaEnabledModules, dclaMixedBuildsEnabledList) |
| return &mixedBuildBazelContext{ |
| bazelRunner: &builtinBazelRunner{c.UseBazelProxy, absolutePath(c.outDir)}, |
| paths: &paths, |
| modulesDefaultToBazel: c.BuildMode == BazelDevMode, |
| bazelEnabledModules: enabledModules, |
| bazelDisabledModules: disabledModules, |
| bazelDclaEnabledModules: dclaEnabledModules, |
| targetProduct: targetProduct, |
| targetBuildVariant: targetBuildVariant, |
| }, nil |
| } |
| |
| func (p *bazelPaths) BazelMetricsDir() string { |
| return p.metricsDir |
| } |
| |
| func (context *mixedBuildBazelContext) IsModuleNameAllowed(moduleName string, withinApex bool) bool { |
| if context.bazelDisabledModules[moduleName] { |
| return false |
| } |
| if context.bazelEnabledModules[moduleName] { |
| return true |
| } |
| if withinApex && context.IsModuleDclaAllowed(moduleName) { |
| return true |
| } |
| |
| return context.modulesDefaultToBazel |
| } |
| |
| func (context *mixedBuildBazelContext) IsModuleDclaAllowed(moduleName string) bool { |
| return context.bazelDclaEnabledModules[moduleName] |
| } |
| |
| func pwdPrefix() string { |
| // Darwin doesn't have /proc |
| if runtime.GOOS != "darwin" { |
| return "PWD=/proc/self/cwd" |
| } |
| return "" |
| } |
| |
| type bazelCommand struct { |
| command string |
| // query or label |
| expression string |
| } |
| |
| type builtinBazelRunner struct { |
| useBazelProxy bool |
| outDir string |
| } |
| |
| // Issues the given bazel command with given build label and additional flags. |
| // Returns (stdout, stderr, error). The first and second return values are strings |
| // containing the stdout and stderr of the run command, and an error is returned if |
| // the invocation returned an error code. |
| func (r *builtinBazelRunner) issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (string, string, error) { |
| if r.useBazelProxy { |
| eventHandler.Begin("client_proxy") |
| defer eventHandler.End("client_proxy") |
| proxyClient := bazel.NewProxyClient(r.outDir) |
| resp, err := proxyClient.IssueCommand(cmdRequest) |
| |
| if err != nil { |
| return "", "", err |
| } |
| if len(resp.ErrorString) > 0 { |
| return "", "", fmt.Errorf(resp.ErrorString) |
| } |
| return resp.Stdout, resp.Stderr, nil |
| } else { |
| eventHandler.Begin("bazel command") |
| defer eventHandler.End("bazel command") |
| |
| stdout, stderr, err := bazel.ExecBazel(paths.bazelPath, absolutePath(paths.syntheticWorkspaceDir()), cmdRequest) |
| return string(stdout), string(stderr), err |
| } |
| } |
| |
| func (context *mixedBuildBazelContext) createBazelCommand(config Config, runName bazel.RunName, command bazelCommand, |
| extraFlags ...string) bazel.CmdRequest { |
| cmdFlags := []string{ |
| "--output_base=" + absolutePath(context.paths.outputBase), |
| command.command, |
| command.expression, |
| "--profile=" + shared.BazelMetricsFilename(context.paths, runName), |
| |
| // We don't need to set --host_platforms because it's set in bazelrc files |
| // that the bazel shell script wrapper passes |
| |
| // Optimize Ninja rebuilds by ensuring Bazel write into product-agnostic |
| // output paths for the configured targets that shouldn't be affected by |
| // TARGET_PRODUCT. Otherwise product agnostic modules will be rebuilt by |
| // Ninja when the product changes, unconditionally. |
| // |
| // For example, Mainline APEXes should be identical regardless of the |
| // product (modulo arch/cpu). |
| // |
| // This flag forcibly disables the platform prefix in the intermediate |
| // outputs during a mixed build. |
| "--noexperimental_platform_in_output_dir", |
| |
| // Suppress noise |
| "--ui_event_filters=-INFO", |
| "--noshow_progress", |
| "--norun_validations", |
| } |
| cmdFlags = append(cmdFlags, extraFlags...) |
| |
| extraEnv := []string{ |
| "HOME=" + context.paths.homeDir, |
| pwdPrefix(), |
| "BUILD_DIR=" + absolutePath(context.paths.soongOutDir), |
| // Make OUT_DIR absolute here so build/bazel/bin/bazel uses the correct |
| // OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out. |
| "OUT_DIR=" + absolutePath(context.paths.outDir()), |
| // Disables local host detection of gcc; toolchain information is defined |
| // explicitly in BUILD files. |
| "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1", |
| } |
| for _, envvar := range allowedBazelEnvironmentVars { |
| val := config.Getenv(envvar) |
| if val == "" { |
| continue |
| } |
| extraEnv = append(extraEnv, fmt.Sprintf("%s=%s", envvar, val)) |
| } |
| envVars := append(os.Environ(), extraEnv...) |
| |
| return bazel.CmdRequest{cmdFlags, envVars} |
| } |
| |
| func (context *mixedBuildBazelContext) printableCqueryCommand(bazelCmd bazel.CmdRequest) string { |
| args := append([]string{context.paths.bazelPath}, bazelCmd.Argv...) |
| outputString := strings.Join(bazelCmd.Env, " ") + " \"" + strings.Join(args, "\" \"") + "\"" |
| return outputString |
| } |
| |
| func (context *mixedBuildBazelContext) mainBzlFileContents() []byte { |
| // TODO(cparsons): Define configuration transitions programmatically based |
| // on available archs. |
| contents := ` |
| ##################################################### |
| # This file is generated by soong_build. Do not edit. |
| ##################################################### |
| def _config_node_transition_impl(settings, attr): |
| if attr.os == "android" and attr.arch == "target": |
| target = "current_product-{VARIANT}" |
| else: |
| target = "current_product-{VARIANT}_%s_%s" % (attr.os, attr.arch) |
| apex_name = "" |
| if attr.within_apex: |
| # //build/bazel/rules/apex:apex_name has to be set to a non_empty value, |
| # otherwise //build/bazel/rules/apex:non_apex will be true and the |
| # "-D__ANDROID_APEX__" compiler flag will be missing. Apex_name is used |
| # in some validation on bazel side which don't really apply in mixed |
| # build because soong will do the work, so we just set it to a fixed |
| # value here. |
| apex_name = "dcla_apex" |
| outputs = { |
| "//command_line_option:platforms": "@soong_injection//product_config_platforms:%s" % target, |
| "@//build/bazel/rules/apex:within_apex": attr.within_apex, |
| "@//build/bazel/rules/apex:min_sdk_version": attr.apex_sdk_version, |
| "@//build/bazel/rules/apex:apex_name": apex_name, |
| } |
| |
| return outputs |
| |
| _config_node_transition = transition( |
| implementation = _config_node_transition_impl, |
| inputs = [], |
| outputs = [ |
| "//command_line_option:platforms", |
| "@//build/bazel/rules/apex:within_apex", |
| "@//build/bazel/rules/apex:min_sdk_version", |
| "@//build/bazel/rules/apex:apex_name", |
| ], |
| ) |
| |
| def _passthrough_rule_impl(ctx): |
| return [DefaultInfo(files = depset(ctx.files.deps))] |
| |
| config_node = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "arch" : attr.string(mandatory = True), |
| "os" : attr.string(mandatory = True), |
| "within_apex" : attr.bool(default = False), |
| "apex_sdk_version" : attr.string(mandatory = True), |
| "deps" : attr.label_list(cfg = _config_node_transition, allow_files = True), |
| "_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"), |
| }, |
| ) |
| |
| |
| # Rule representing the root of the build, to depend on all Bazel targets that |
| # are required for the build. Building this target will build the entire Bazel |
| # build tree. |
| mixed_build_root = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "deps" : attr.label_list(), |
| }, |
| ) |
| |
| def _phony_root_impl(ctx): |
| return [] |
| |
| # Rule to depend on other targets but build nothing. |
| # This is useful as follows: building a target of this rule will generate |
| # symlink forests for all dependencies of the target, without executing any |
| # actions of the build. |
| phony_root = rule( |
| implementation = _phony_root_impl, |
| attrs = {"deps" : attr.label_list()}, |
| ) |
| ` |
| |
| productReplacer := strings.NewReplacer( |
| "{PRODUCT}", context.targetProduct, |
| "{VARIANT}", context.targetBuildVariant) |
| |
| return []byte(productReplacer.Replace(contents)) |
| } |
| |
| func (context *mixedBuildBazelContext) mainBuildFileContents() []byte { |
| // TODO(cparsons): Map label to attribute programmatically; don't use hard-coded |
| // architecture mapping. |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| load(":main.bzl", "config_node", "mixed_build_root", "phony_root") |
| |
| %s |
| |
| mixed_build_root(name = "buildroot", |
| deps = [%s], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| |
| phony_root(name = "phonyroot", |
| deps = [":buildroot"], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| ` |
| configNodeFormatString := ` |
| config_node(name = "%s", |
| arch = "%s", |
| os = "%s", |
| within_apex = %s, |
| apex_sdk_version = "%s", |
| deps = [%s], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| ` |
| |
| configNodesSection := "" |
| |
| labelsByConfig := map[string][]string{} |
| |
| for _, val := range context.requests { |
| labelString := fmt.Sprintf("\"@%s\"", val.label) |
| configString := getConfigString(val) |
| labelsByConfig[configString] = append(labelsByConfig[configString], labelString) |
| } |
| |
| // Configs need to be sorted to maintain determinism of the BUILD file. |
| sortedConfigs := make([]string, 0, len(labelsByConfig)) |
| for val := range labelsByConfig { |
| sortedConfigs = append(sortedConfigs, val) |
| } |
| sort.Slice(sortedConfigs, func(i, j int) bool { return sortedConfigs[i] < sortedConfigs[j] }) |
| |
| allLabels := []string{} |
| for _, configString := range sortedConfigs { |
| labels := labelsByConfig[configString] |
| configTokens := strings.Split(configString, "|") |
| if len(configTokens) < 2 { |
| panic(fmt.Errorf("Unexpected config string format: %s", configString)) |
| } |
| archString := configTokens[0] |
| osString := configTokens[1] |
| withinApex := "False" |
| apexSdkVerString := "" |
| targetString := fmt.Sprintf("%s_%s", osString, archString) |
| if len(configTokens) > 2 { |
| targetString += "_" + configTokens[2] |
| if configTokens[2] == withinApexToString(true) { |
| withinApex = "True" |
| } |
| } |
| if len(configTokens) > 3 { |
| targetString += "_" + configTokens[3] |
| apexSdkVerString = configTokens[3] |
| } |
| allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString)) |
| labelsString := strings.Join(labels, ",\n ") |
| configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, withinApex, apexSdkVerString, |
| labelsString) |
| } |
| |
| return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n "))) |
| } |
| |
| func indent(original string) string { |
| result := "" |
| for _, line := range strings.Split(original, "\n") { |
| result += " " + line + "\n" |
| } |
| return result |
| } |
| |
| // Returns the file contents of the buildroot.cquery file that should be used for the cquery |
| // expression in order to obtain information about buildroot and its dependencies. |
| // The contents of this file depend on the mixedBuildBazelContext's requests; requests are enumerated |
| // and grouped by their request type. The data retrieved for each label depends on its |
| // request type. |
| func (context *mixedBuildBazelContext) cqueryStarlarkFileContents() []byte { |
| requestTypeToCqueryIdEntries := map[cqueryRequest][]string{} |
| requestTypes := []cqueryRequest{} |
| for _, val := range context.requests { |
| cqueryId := getCqueryId(val) |
| mapEntryString := fmt.Sprintf("%q : True", cqueryId) |
| if _, seenKey := requestTypeToCqueryIdEntries[val.requestType]; !seenKey { |
| requestTypes = append(requestTypes, val.requestType) |
| } |
| requestTypeToCqueryIdEntries[val.requestType] = |
| append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString) |
| } |
| labelRegistrationMapSection := "" |
| functionDefSection := "" |
| mainSwitchSection := "" |
| |
| mapDeclarationFormatString := ` |
| %s = { |
| %s |
| } |
| ` |
| functionDefFormatString := ` |
| def %s(target, id_string): |
| %s |
| ` |
| mainSwitchSectionFormatString := ` |
| if id_string in %s: |
| return id_string + ">>" + %s(target, id_string) |
| ` |
| |
| for _, requestType := range requestTypes { |
| labelMapName := requestType.Name() + "_Labels" |
| functionName := requestType.Name() + "_Fn" |
| labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString, |
| labelMapName, |
| strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n ")) |
| functionDefSection += fmt.Sprintf(functionDefFormatString, |
| functionName, |
| indent(requestType.StarlarkFunctionBody())) |
| mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString, |
| labelMapName, functionName) |
| } |
| |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| |
| {LABEL_REGISTRATION_MAP_SECTION} |
| |
| {FUNCTION_DEF_SECTION} |
| |
| def get_arch(target): |
| # TODO(b/199363072): filegroups and file targets aren't associated with any |
| # specific platform architecture in mixed builds. This is consistent with how |
| # Soong treats filegroups, but it may not be the case with manually-written |
| # filegroup BUILD targets. |
| buildoptions = build_options(target) |
| |
| if buildoptions == None: |
| # File targets do not have buildoptions. File targets aren't associated with |
| # any specific platform architecture in mixed builds, so use the host. |
| return "x86_64|linux" |
| platforms = buildoptions["//command_line_option:platforms"] |
| if len(platforms) != 1: |
| # An individual configured target should have only one platform architecture. |
| # Note that it's fine for there to be multiple architectures for the same label, |
| # but each is its own configured target. |
| fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms)) |
| platform_name = platforms[0].name |
| if platform_name == "host": |
| return "HOST" |
| if not platform_name.startswith("current_product-{TARGET_BUILD_VARIANT}"): |
| fail("expected platform name of the form 'current_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'current_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms)) |
| platform_name = platform_name.removeprefix("current_product-{TARGET_BUILD_VARIANT}").removeprefix("_") |
| config_key = "" |
| if not platform_name: |
| config_key = "target|android" |
| elif platform_name.startswith("android_"): |
| config_key = platform_name.removeprefix("android_") + "|android" |
| elif platform_name.startswith("linux_"): |
| config_key = platform_name.removeprefix("linux_") + "|linux" |
| else: |
| fail("expected platform name of the form 'current_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'current_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms)) |
| |
| within_apex = buildoptions.get("//build/bazel/rules/apex:within_apex") |
| apex_sdk_version = buildoptions.get("//build/bazel/rules/apex:min_sdk_version") |
| |
| if within_apex: |
| config_key += "|within_apex" |
| if apex_sdk_version != None and len(apex_sdk_version) > 0: |
| config_key += "|" + apex_sdk_version |
| |
| return config_key |
| |
| def format(target): |
| id_string = str(target.label) + "|" + get_arch(target) |
| |
| # TODO(b/248106697): Remove once Bazel is updated to always normalize labels. |
| if id_string.startswith("//"): |
| id_string = "@" + id_string |
| |
| {MAIN_SWITCH_SECTION} |
| |
| # This target was not requested via cquery, and thus must be a dependency |
| # of a requested target. |
| return id_string + ">>NONE" |
| ` |
| replacer := strings.NewReplacer( |
| "{TARGET_PRODUCT}", context.targetProduct, |
| "{TARGET_BUILD_VARIANT}", context.targetBuildVariant, |
| "{LABEL_REGISTRATION_MAP_SECTION}", labelRegistrationMapSection, |
| "{FUNCTION_DEF_SECTION}", functionDefSection, |
| "{MAIN_SWITCH_SECTION}", mainSwitchSection) |
| |
| return []byte(replacer.Replace(formatString)) |
| } |
| |
| // Returns a path containing build-related metadata required for interfacing |
| // with Bazel. Example: out/soong/bazel. |
| func (p *bazelPaths) intermediatesDir() string { |
| return filepath.Join(p.soongOutDir, "bazel") |
| } |
| |
| // Returns the path where the contents of the @soong_injection repository live. |
| // It is used by Soong to tell Bazel things it cannot over the command line. |
| func (p *bazelPaths) injectedFilesDir() string { |
| return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName) |
| } |
| |
| // Returns the path of the synthetic Bazel workspace that contains a symlink |
| // forest composed the whole source tree and BUILD files generated by bp2build. |
| func (p *bazelPaths) syntheticWorkspaceDir() string { |
| return filepath.Join(p.soongOutDir, "workspace") |
| } |
| |
| // Returns the path to the top level out dir ($OUT_DIR). |
| func (p *bazelPaths) outDir() string { |
| return filepath.Dir(p.soongOutDir) |
| } |
| |
| const buildrootLabel = "@soong_injection//mixed_builds:buildroot" |
| |
| var ( |
| cqueryCmd = bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)} |
| aqueryCmd = bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)} |
| buildCmd = bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"} |
| allBazelCommands = []bazelCommand{aqueryCmd, cqueryCmd, buildCmd} |
| ) |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. |
| func (context *mixedBuildBazelContext) InvokeBazel(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("bazel") |
| defer eventHandler.End("bazel") |
| |
| if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" { |
| if err := os.MkdirAll(metricsDir, 0777); err != nil { |
| return err |
| } |
| } |
| context.results = make(map[cqueryKey]string) |
| if err := context.runCquery(config, ctx); err != nil { |
| return err |
| } |
| if err := context.runAquery(config, ctx); err != nil { |
| return err |
| } |
| if err := context.generateBazelSymlinks(config, ctx); err != nil { |
| return err |
| } |
| |
| // Clear requests. |
| context.requests = []cqueryKey{} |
| return nil |
| } |
| |
| func (context *mixedBuildBazelContext) runCquery(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("cquery") |
| defer eventHandler.End("cquery") |
| soongInjectionPath := absolutePath(context.paths.injectedFilesDir()) |
| mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds") |
| if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) { |
| err = os.MkdirAll(mixedBuildsPath, 0777) |
| if err != nil { |
| return err |
| } |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666); err != nil { |
| return err |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "main.bzl"), context.mainBzlFileContents(), 0666); err != nil { |
| return err |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "BUILD.bazel"), context.mainBuildFileContents(), 0666); err != nil { |
| return err |
| } |
| cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery") |
| if err := writeFileBytesIfChanged(absolutePath(cqueryFileRelpath), context.cqueryStarlarkFileContents(), 0666); err != nil { |
| return err |
| } |
| |
| extraFlags := []string{"--output=starlark", "--starlark:file=" + absolutePath(cqueryFileRelpath)} |
| if Bool(config.productVariables.ClangCoverage) { |
| extraFlags = append(extraFlags, "--collect_code_coverage") |
| } |
| |
| cqueryCmdRequest := context.createBazelCommand(config, bazel.CqueryBuildRootRunName, cqueryCmd, extraFlags...) |
| cqueryOutput, cqueryErrorMessage, cqueryErr := context.issueBazelCommand(cqueryCmdRequest, context.paths, eventHandler) |
| if cqueryErr != nil { |
| return cqueryErr |
| } |
| cqueryCommandPrint := fmt.Sprintf("cquery command line:\n %s \n\n\n", context.printableCqueryCommand(cqueryCmdRequest)) |
| if err := os.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"), []byte(cqueryCommandPrint+cqueryOutput), 0666); err != nil { |
| return err |
| } |
| cqueryResults := map[string]string{} |
| for _, outputLine := range strings.Split(cqueryOutput, "\n") { |
| if strings.Contains(outputLine, ">>") { |
| splitLine := strings.SplitN(outputLine, ">>", 2) |
| cqueryResults[splitLine[0]] = splitLine[1] |
| } |
| } |
| for _, val := range context.requests { |
| if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok { |
| context.results[val] = cqueryResult |
| } else { |
| return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]", |
| getCqueryId(val), cqueryOutput, cqueryErrorMessage) |
| } |
| } |
| return nil |
| } |
| |
| func writeFileBytesIfChanged(path string, contents []byte, perm os.FileMode) error { |
| oldContents, err := os.ReadFile(path) |
| if err != nil || !bytes.Equal(contents, oldContents) { |
| err = os.WriteFile(path, contents, perm) |
| } |
| return nil |
| } |
| |
| func (context *mixedBuildBazelContext) runAquery(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("aquery") |
| defer eventHandler.End("aquery") |
| // Issue an aquery command to retrieve action information about the bazel build tree. |
| // |
| // Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's |
| // proto sources, which would add a number of unnecessary dependencies. |
| extraFlags := []string{"--output=proto", "--include_file_write_contents"} |
| if Bool(config.productVariables.ClangCoverage) { |
| extraFlags = append(extraFlags, "--collect_code_coverage") |
| paths := make([]string, 0, 2) |
| if p := config.productVariables.NativeCoveragePaths; len(p) > 0 { |
| for i := range p { |
| // TODO(b/259404593) convert path wildcard to regex values |
| if p[i] == "*" { |
| p[i] = ".*" |
| } |
| } |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "+", ",")) |
| } |
| if p := config.productVariables.NativeCoverageExcludePaths; len(p) > 0 { |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "-", ",")) |
| } |
| if len(paths) > 0 { |
| extraFlags = append(extraFlags, "--instrumentation_filter="+strings.Join(paths, ",")) |
| } |
| } |
| aqueryOutput, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.AqueryBuildRootRunName, aqueryCmd, |
| extraFlags...), context.paths, eventHandler) |
| if err != nil { |
| return err |
| } |
| context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput), eventHandler) |
| return err |
| } |
| |
| func (context *mixedBuildBazelContext) generateBazelSymlinks(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("symlinks") |
| defer eventHandler.End("symlinks") |
| // Issue a build command of the phony root to generate symlink forests for dependencies of the |
| // Bazel build. This is necessary because aquery invocations do not generate this symlink forest, |
| // but some of symlinks may be required to resolve source dependencies of the build. |
| _, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.BazelBuildPhonyRootRunName, buildCmd), context.paths, eventHandler) |
| return err |
| } |
| |
| func (context *mixedBuildBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return context.buildStatements |
| } |
| |
| func (context *mixedBuildBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return context.depsets |
| } |
| |
| func (context *mixedBuildBazelContext) OutputBase() string { |
| return context.paths.outputBase |
| } |
| |
| // Singleton used for registering BUILD file ninja dependencies (needed |
| // for correctness of builds which use Bazel. |
| func BazelSingleton() Singleton { |
| return &bazelSingleton{} |
| } |
| |
| type bazelSingleton struct{} |
| |
| func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) { |
| // bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled. |
| if !ctx.Config().IsMixedBuildsEnabled() { |
| return |
| } |
| |
| // Add ninja file dependencies for files which all bazel invocations require. |
| bazelBuildList := absolutePath(filepath.Join( |
| filepath.Dir(ctx.Config().moduleListFile), "bazel.list")) |
| ctx.AddNinjaFileDeps(bazelBuildList) |
| |
| data, err := os.ReadFile(bazelBuildList) |
| if err != nil { |
| ctx.Errorf(err.Error()) |
| } |
| files := strings.Split(strings.TrimSpace(string(data)), "\n") |
| for _, file := range files { |
| ctx.AddNinjaFileDeps(file) |
| } |
| |
| for _, depset := range ctx.Config().BazelContext.AqueryDepsets() { |
| var outputs []Path |
| var orderOnlies []Path |
| for _, depsetDepHash := range depset.TransitiveDepSetHashes { |
| otherDepsetName := bazelDepsetName(depsetDepHash) |
| outputs = append(outputs, PathForPhony(ctx, otherDepsetName)) |
| } |
| for _, artifactPath := range depset.DirectArtifacts { |
| pathInBazelOut := PathForBazelOut(ctx, artifactPath) |
| if artifactPath == "bazel-out/volatile-status.txt" { |
| // See https://bazel.build/docs/user-manual#workspace-status |
| orderOnlies = append(orderOnlies, pathInBazelOut) |
| } else { |
| outputs = append(outputs, pathInBazelOut) |
| } |
| } |
| thisDepsetName := bazelDepsetName(depset.ContentHash) |
| ctx.Build(pctx, BuildParams{ |
| Rule: blueprint.Phony, |
| Outputs: []WritablePath{PathForPhony(ctx, thisDepsetName)}, |
| Implicits: outputs, |
| OrderOnly: orderOnlies, |
| }) |
| } |
| |
| executionRoot := path.Join(ctx.Config().BazelContext.OutputBase(), "execroot", "__main__") |
| bazelOutDir := path.Join(executionRoot, "bazel-out") |
| for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() { |
| // nil build statements are a valid case where we do not create an action because it is |
| // unnecessary or handled by other processing |
| if buildStatement == nil { |
| continue |
| } |
| if len(buildStatement.Command) > 0 { |
| rule := NewRuleBuilder(pctx, ctx) |
| createCommand(rule.Command(), buildStatement, executionRoot, bazelOutDir, ctx) |
| desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths) |
| rule.Build(fmt.Sprintf("bazel %d", index), desc) |
| continue |
| } |
| // Certain actions returned by aquery (for instance FileWrite) do not contain a command |
| // and thus require special treatment. If BuildStatement were an interface implementing |
| // buildRule(ctx) function, the code here would just call it. |
| // Unfortunately, the BuildStatement is defined in |
| // the 'bazel' package, which cannot depend on 'android' package where ctx is defined, |
| // because this would cause circular dependency. So, until we move aquery processing |
| // to the 'android' package, we need to handle special cases here. |
| switch buildStatement.Mnemonic { |
| case "FileWrite", "SourceSymlinkManifest": |
| out := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| WriteFileRuleVerbatim(ctx, out, buildStatement.FileContents) |
| case "SymlinkTree": |
| // build-runfiles arguments are the manifest file and the target directory |
| // where it creates the symlink tree according to this manifest (and then |
| // writes the MANIFEST file to it). |
| outManifest := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| outManifestPath := outManifest.String() |
| if !strings.HasSuffix(outManifestPath, "MANIFEST") { |
| panic("the base name of the symlink tree action should be MANIFEST, got " + outManifestPath) |
| } |
| outDir := filepath.Dir(outManifestPath) |
| ctx.Build(pctx, BuildParams{ |
| Rule: buildRunfilesRule, |
| Output: outManifest, |
| Inputs: []Path{PathForBazelOut(ctx, buildStatement.InputPaths[0])}, |
| Description: "symlink tree for " + outDir, |
| Args: map[string]string{ |
| "outDir": outDir, |
| }, |
| }) |
| default: |
| panic(fmt.Sprintf("unhandled build statement: %v", buildStatement)) |
| } |
| } |
| } |
| |
| // Register bazel-owned build statements (obtained from the aquery invocation). |
| func createCommand(cmd *RuleBuilderCommand, buildStatement *bazel.BuildStatement, executionRoot string, bazelOutDir string, ctx BuilderContext) { |
| // executionRoot is the action cwd. |
| cmd.Text(fmt.Sprintf("cd '%s' &&", executionRoot)) |
| |
| // Remove old outputs, as some actions might not rerun if the outputs are detected. |
| if len(buildStatement.OutputPaths) > 0 { |
| cmd.Text("rm -rf") // -r because outputs can be Bazel dir/tree artifacts. |
| for _, outputPath := range buildStatement.OutputPaths { |
| cmd.Text(fmt.Sprintf("'%s'", outputPath)) |
| } |
| cmd.Text("&&") |
| } |
| |
| for _, pair := range buildStatement.Env { |
| // Set per-action env variables, if any. |
| cmd.Flag(pair.Key + "=" + pair.Value) |
| } |
| |
| // The actual Bazel action. |
| if len(buildStatement.Command) > 16*1024 { |
| commandFile := PathForBazelOut(ctx, buildStatement.OutputPaths[0]+".sh") |
| WriteFileRule(ctx, commandFile, buildStatement.Command) |
| |
| cmd.Text("bash").Text(buildStatement.OutputPaths[0] + ".sh").Implicit(commandFile) |
| } else { |
| cmd.Text(buildStatement.Command) |
| } |
| |
| for _, outputPath := range buildStatement.OutputPaths { |
| cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath)) |
| } |
| for _, inputPath := range buildStatement.InputPaths { |
| cmd.Implicit(PathForBazelOut(ctx, inputPath)) |
| } |
| for _, inputDepsetHash := range buildStatement.InputDepsetHashes { |
| otherDepsetName := bazelDepsetName(inputDepsetHash) |
| cmd.Implicit(PathForPhony(ctx, otherDepsetName)) |
| } |
| |
| if depfile := buildStatement.Depfile; depfile != nil { |
| // The paths in depfile are relative to `executionRoot`. |
| // Hence, they need to be corrected by replacing "bazel-out" |
| // with the full `bazelOutDir`. |
| // Otherwise, implicit outputs and implicit inputs under "bazel-out/" |
| // would be deemed missing. |
| // (Note: The regexp uses a capture group because the version of sed |
| // does not support a look-behind pattern.) |
| replacement := fmt.Sprintf(`&& sed -i'' -E 's@(^|\s|")bazel-out/@\1%s/@g' '%s'`, |
| bazelOutDir, *depfile) |
| cmd.Text(replacement) |
| cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile)) |
| } |
| |
| for _, symlinkPath := range buildStatement.SymlinkPaths { |
| cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath)) |
| } |
| } |
| |
| func getCqueryId(key cqueryKey) string { |
| return key.label + "|" + getConfigString(key) |
| } |
| |
| func getConfigString(key cqueryKey) string { |
| arch := key.configKey.arch |
| if len(arch) == 0 || arch == "common" { |
| if key.configKey.osType.Class == Device { |
| // For the generic Android, the expected result is "target|android", which |
| // corresponds to the product_variable_config named "android_target" in |
| // build/bazel/platforms/BUILD.bazel. |
| arch = "target" |
| } else { |
| // Use host platform, which is currently hardcoded to be x86_64. |
| arch = "x86_64" |
| } |
| } |
| osName := key.configKey.osType.Name |
| if len(osName) == 0 || osName == "common_os" || osName == "linux_glibc" || osName == "linux_musl" { |
| // Use host OS, which is currently hardcoded to be linux. |
| osName = "linux" |
| } |
| keyString := arch + "|" + osName |
| if key.configKey.apexKey.WithinApex { |
| keyString += "|" + withinApexToString(key.configKey.apexKey.WithinApex) |
| } |
| |
| if len(key.configKey.apexKey.ApexSdkVersion) > 0 { |
| keyString += "|" + key.configKey.apexKey.ApexSdkVersion |
| } |
| |
| return keyString |
| } |
| |
| func GetConfigKey(ctx BaseModuleContext) configKey { |
| return configKey{ |
| // use string because Arch is not a valid key in go |
| arch: ctx.Arch().String(), |
| osType: ctx.Os(), |
| } |
| } |
| |
| func GetConfigKeyApexVariant(ctx BaseModuleContext, apexKey *ApexConfigKey) configKey { |
| configKey := GetConfigKey(ctx) |
| |
| if apexKey != nil { |
| configKey.apexKey = ApexConfigKey{ |
| WithinApex: apexKey.WithinApex, |
| ApexSdkVersion: apexKey.ApexSdkVersion, |
| } |
| } |
| |
| return configKey |
| } |
| |
| func bazelDepsetName(contentHash string) string { |
| return fmt.Sprintf("bazel_depset_%s", contentHash) |
| } |
| |
| func EnvironmentVarsFile(config Config) string { |
| return fmt.Sprintf(bazel.GeneratedBazelFileWarning+` |
| _env = %s |
| |
| env = _env |
| `, |
| starlark_fmt.PrintStringList(allowedBazelEnvironmentVars, 0), |
| ) |
| } |