| // Copyright 2020 Google Inc. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package android |
| |
| import ( |
| "bytes" |
| "crypto/sha1" |
| "encoding/hex" |
| "fmt" |
| "os" |
| "path" |
| "path/filepath" |
| "regexp" |
| "runtime" |
| "sort" |
| "strings" |
| "sync" |
| |
| "android/soong/android/allowlists" |
| "android/soong/bazel/cquery" |
| "android/soong/shared" |
| "android/soong/starlark_import" |
| |
| "github.com/google/blueprint" |
| "github.com/google/blueprint/metrics" |
| |
| "android/soong/bazel" |
| ) |
| |
| var ( |
| _ = pctx.HostBinToolVariable("bazelBuildRunfilesTool", "build-runfiles") |
| buildRunfilesRule = pctx.AndroidStaticRule("bazelBuildRunfiles", blueprint.RuleParams{ |
| Command: "${bazelBuildRunfilesTool} ${in} ${outDir}", |
| Depfile: "", |
| Description: "", |
| CommandDeps: []string{"${bazelBuildRunfilesTool}"}, |
| }, "outDir") |
| ) |
| |
| func registerMixedBuildsMutator(ctx RegisterMutatorsContext) { |
| ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel() |
| } |
| |
| func RegisterMixedBuildsMutator(ctx RegistrationContext) { |
| ctx.FinalDepsMutators(registerMixedBuildsMutator) |
| } |
| |
| func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) { |
| if m := ctx.Module(); m.Enabled() { |
| if mixedBuildMod, ok := m.(MixedBuildBuildable); ok { |
| mixedBuildEnabled := MixedBuildsEnabled(ctx) |
| queueMixedBuild := mixedBuildMod.IsMixedBuildSupported(ctx) && mixedBuildEnabled == MixedBuildEnabled |
| if queueMixedBuild { |
| mixedBuildMod.QueueBazelCall(ctx) |
| } |
| } |
| } |
| } |
| |
| type cqueryRequest interface { |
| // Name returns a string name for this request type. Such request type names must be unique, |
| // and must only consist of alphanumeric characters. |
| Name() string |
| |
| // StarlarkFunctionBody returns a starlark function body to process this request type. |
| // The returned string is the body of a Starlark function which obtains |
| // all request-relevant information about a target and returns a string containing |
| // this information. |
| // The function should have the following properties: |
| // - The arguments are `target` (a configured target) and `id_string` (the label + configuration). |
| // - The return value must be a string. |
| // - The function body should not be indented outside of its own scope. |
| StarlarkFunctionBody() string |
| } |
| |
| // Portion of cquery map key to describe target configuration. |
| type configKey struct { |
| arch string |
| osType OsType |
| apexKey ApexConfigKey |
| } |
| |
| type ApexConfigKey struct { |
| WithinApex bool |
| ApexSdkVersion string |
| ApiDomain string |
| } |
| |
| func (c ApexConfigKey) String() string { |
| return fmt.Sprintf("%s_%s_%s", withinApexToString(c.WithinApex), c.ApexSdkVersion, c.ApiDomain) |
| } |
| |
| func withinApexToString(withinApex bool) string { |
| if withinApex { |
| return "within_apex" |
| } |
| return "" |
| } |
| |
| func (c configKey) String() string { |
| return fmt.Sprintf("%s::%s::%s", c.arch, c.osType, c.apexKey) |
| } |
| |
| // Map key to describe bazel cquery requests. |
| type cqueryKey struct { |
| label string |
| requestType cqueryRequest |
| configKey configKey |
| } |
| |
| func makeCqueryKey(label string, cqueryRequest cqueryRequest, cfgKey configKey) cqueryKey { |
| if strings.HasPrefix(label, "//") { |
| // Normalize Bazel labels to specify main repository explicitly. |
| label = "@" + label |
| } |
| return cqueryKey{label, cqueryRequest, cfgKey} |
| } |
| |
| func (c cqueryKey) String() string { |
| return fmt.Sprintf("cquery(%s,%s,%s)", c.label, c.requestType.Name(), c.configKey) |
| } |
| |
| type invokeBazelContext interface { |
| GetEventHandler() *metrics.EventHandler |
| } |
| |
| // BazelContext is a context object useful for interacting with Bazel during |
| // the course of a build. Use of Bazel to evaluate part of the build graph |
| // is referred to as a "mixed build". (Some modules are managed by Soong, |
| // some are managed by Bazel). To facilitate interop between these build |
| // subgraphs, Soong may make requests to Bazel and evaluate their responses |
| // so that Soong modules may accurately depend on Bazel targets. |
| type BazelContext interface { |
| // Add a cquery request to the bazel request queue. All queued requests |
| // will be sent to Bazel on a subsequent invocation of InvokeBazel. |
| QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) |
| |
| // ** Cquery Results Retrieval Functions |
| // The below functions pertain to retrieving cquery results from a prior |
| // InvokeBazel function call and parsing the results. |
| |
| // Returns result files built by building the given bazel target label. |
| GetOutputFiles(label string, cfgKey configKey) ([]string, error) |
| |
| // Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order). |
| GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) |
| |
| // Returns the results of the GetApexInfo query (including output files) |
| GetApexInfo(label string, cfgkey configKey) (cquery.ApexInfo, error) |
| |
| // Returns the results of the GetCcUnstrippedInfo query |
| GetCcUnstrippedInfo(label string, cfgkey configKey) (cquery.CcUnstrippedInfo, error) |
| |
| // Returns the results of the GetPrebuiltFileInfo query |
| GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) |
| |
| // ** end Cquery Results Retrieval Functions |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. The ctx argument is optional and is only |
| // used for performance data collection |
| InvokeBazel(config Config, ctx invokeBazelContext) error |
| |
| // Returns true if Bazel handling is enabled for the module with the given name. |
| // Note that this only implies "bazel mixed build" allowlisting. The caller |
| // should independently verify the module is eligible for Bazel handling |
| // (for example, that it is MixedBuildBuildable). |
| IsModuleNameAllowed(moduleName string, withinApex bool) bool |
| |
| // Returns the bazel output base (the root directory for all bazel intermediate outputs). |
| OutputBase() string |
| |
| // Returns build statements which should get registered to reflect Bazel's outputs. |
| BuildStatementsToRegister() []*bazel.BuildStatement |
| |
| // Returns the depsets defined in Bazel's aquery response. |
| AqueryDepsets() []bazel.AqueryDepset |
| |
| QueueBazelSandwichCqueryRequests(config Config) error |
| } |
| |
| type bazelRunner interface { |
| issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (output string, errorMessage string, error error) |
| } |
| |
| type bazelPaths struct { |
| homeDir string |
| bazelPath string |
| outputBase string |
| workspaceDir string |
| soongOutDir string |
| metricsDir string |
| bazelDepsFile string |
| } |
| |
| // A context object which tracks queued requests that need to be made to Bazel, |
| // and their results after the requests have been made. |
| type mixedBuildBazelContext struct { |
| bazelRunner |
| paths *bazelPaths |
| // cquery requests that have not yet been issued to Bazel. This list is maintained |
| // in a sorted state, and is guaranteed to have no duplicates. |
| requests []cqueryKey |
| requestMutex sync.Mutex // requests can be written in parallel |
| |
| results map[cqueryKey]string // Results of cquery requests after Bazel invocations |
| |
| // Build statements which should get registered to reflect Bazel's outputs. |
| buildStatements []*bazel.BuildStatement |
| |
| // Depsets which should be used for Bazel's build statements. |
| depsets []bazel.AqueryDepset |
| |
| // Per-module allowlist/denylist functionality to control whether analysis of |
| // modules are handled by Bazel. For modules which do not have a Bazel definition |
| // (or do not sufficiently support bazel handling via MixedBuildBuildable), |
| // this allowlist will have no effect, even if the module is explicitly allowlisted here. |
| // Per-module denylist to opt modules out of bazel handling. |
| bazelDisabledModules map[string]bool |
| // Per-module allowlist to opt modules in to bazel handling. |
| bazelEnabledModules map[string]bool |
| // DCLA modules are enabled when used in apex. |
| bazelDclaEnabledModules map[string]bool |
| |
| targetProduct string |
| targetBuildVariant string |
| } |
| |
| var _ BazelContext = &mixedBuildBazelContext{} |
| |
| // A bazel context to use when Bazel is disabled. |
| type noopBazelContext struct{} |
| |
| var _ BazelContext = noopBazelContext{} |
| |
| // A bazel context to use for tests. |
| type MockBazelContext struct { |
| OutputBaseDir string |
| |
| LabelToOutputFiles map[string][]string |
| LabelToCcInfo map[string]cquery.CcInfo |
| LabelToPythonBinary map[string]string |
| LabelToApexInfo map[string]cquery.ApexInfo |
| LabelToCcBinary map[string]cquery.CcUnstrippedInfo |
| LabelToPrebuiltFileInfo map[string]cquery.PrebuiltFileInfo |
| |
| BazelRequests map[string]bool |
| } |
| |
| func (m MockBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { |
| key := BuildMockBazelContextRequestKey(label, requestType, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) |
| if m.BazelRequests == nil { |
| m.BazelRequests = make(map[string]bool) |
| } |
| m.BazelRequests[key] = true |
| } |
| |
| func (m MockBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) GetOutputFiles(label string, _ configKey) ([]string, error) { |
| result, ok := m.LabelToOutputFiles[label] |
| if !ok { |
| return []string{}, fmt.Errorf("no target with label %q in LabelToOutputFiles", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { |
| result, ok := m.LabelToCcInfo[label] |
| if !ok { |
| key := BuildMockBazelContextResultKey(label, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) |
| result, ok = m.LabelToCcInfo[key] |
| if !ok { |
| return cquery.CcInfo{}, fmt.Errorf("no target with label %q in LabelToCcInfo", label) |
| } |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetApexInfo(label string, _ configKey) (cquery.ApexInfo, error) { |
| result, ok := m.LabelToApexInfo[label] |
| if !ok { |
| return cquery.ApexInfo{}, fmt.Errorf("no target with label %q in LabelToApexInfo", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetCcUnstrippedInfo(label string, _ configKey) (cquery.CcUnstrippedInfo, error) { |
| result, ok := m.LabelToCcBinary[label] |
| if !ok { |
| return cquery.CcUnstrippedInfo{}, fmt.Errorf("no target with label %q in LabelToCcBinary", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetPrebuiltFileInfo(label string, _ configKey) (cquery.PrebuiltFileInfo, error) { |
| result, ok := m.LabelToPrebuiltFileInfo[label] |
| if !ok { |
| return cquery.PrebuiltFileInfo{}, fmt.Errorf("no target with label %q in LabelToPrebuiltFileInfo", label) |
| } |
| return result, nil |
| } |
| |
| func (m MockBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { |
| return true |
| } |
| |
| func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir } |
| |
| func (m MockBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return []*bazel.BuildStatement{} |
| } |
| |
| func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| var _ BazelContext = MockBazelContext{} |
| |
| func BuildMockBazelContextRequestKey(label string, request cqueryRequest, arch string, osType OsType, apexKey ApexConfigKey) string { |
| cfgKey := configKey{ |
| arch: arch, |
| osType: osType, |
| apexKey: apexKey, |
| } |
| |
| return strings.Join([]string{label, request.Name(), cfgKey.String()}, "_") |
| } |
| |
| func BuildMockBazelContextResultKey(label string, arch string, osType OsType, apexKey ApexConfigKey) string { |
| cfgKey := configKey{ |
| arch: arch, |
| osType: osType, |
| apexKey: apexKey, |
| } |
| |
| return strings.Join([]string{label, cfgKey.String()}, "_") |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { |
| key := makeCqueryKey(label, requestType, cfgKey) |
| bazelCtx.requestMutex.Lock() |
| defer bazelCtx.requestMutex.Unlock() |
| |
| // Insert key into requests, maintaining the sort, and only if it's not duplicate. |
| keyString := key.String() |
| foundEqual := false |
| notLessThanKeyString := func(i int) bool { |
| s := bazelCtx.requests[i].String() |
| v := strings.Compare(s, keyString) |
| if v == 0 { |
| foundEqual = true |
| } |
| return v >= 0 |
| } |
| targetIndex := sort.Search(len(bazelCtx.requests), notLessThanKeyString) |
| if foundEqual { |
| return |
| } |
| |
| if targetIndex == len(bazelCtx.requests) { |
| bazelCtx.requests = append(bazelCtx.requests, key) |
| } else { |
| bazelCtx.requests = append(bazelCtx.requests[:targetIndex+1], bazelCtx.requests[targetIndex:]...) |
| bazelCtx.requests[targetIndex] = key |
| } |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) { |
| key := makeCqueryKey(label, cquery.GetOutputFiles, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| |
| return cquery.GetOutputFiles.ParseResult(bazelOutput), nil |
| } |
| return nil, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { |
| key := makeCqueryKey(label, cquery.GetCcInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| return cquery.GetCcInfo.ParseResult(bazelOutput) |
| } |
| return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetApexInfo(label string, cfgKey configKey) (cquery.ApexInfo, error) { |
| key := makeCqueryKey(label, cquery.GetApexInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetApexInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.ApexInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetCcUnstrippedInfo(label string, cfgKey configKey) (cquery.CcUnstrippedInfo, error) { |
| key := makeCqueryKey(label, cquery.GetCcUnstrippedInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetCcUnstrippedInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.CcUnstrippedInfo{}, fmt.Errorf("no bazel response for %s", key) |
| } |
| |
| func (bazelCtx *mixedBuildBazelContext) GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) { |
| key := makeCqueryKey(label, cquery.GetPrebuiltFileInfo, cfgKey) |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetPrebuiltFileInfo.ParseResult(strings.TrimSpace(rawString)) |
| } |
| return cquery.PrebuiltFileInfo{}, fmt.Errorf("no bazel response for %s", key) |
| } |
| |
| func (n noopBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetOutputFiles(_ string, _ configKey) ([]string, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetCcInfo(_ string, _ configKey) (cquery.CcInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetCcUnstrippedInfo(_ string, _ configKey) (cquery.CcUnstrippedInfo, error) { |
| //TODO implement me |
| panic("implement me") |
| } |
| |
| func (n noopBazelContext) GetPrebuiltFileInfo(_ string, _ configKey) (cquery.PrebuiltFileInfo, error) { |
| panic("implement me") |
| } |
| |
| func (n noopBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { |
| panic("unimplemented") |
| } |
| |
| func (m noopBazelContext) OutputBase() string { |
| return "" |
| } |
| |
| func (n noopBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { |
| return false |
| } |
| |
| func (m noopBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return []*bazel.BuildStatement{} |
| } |
| |
| func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| func AddToStringSet(set map[string]bool, items []string) { |
| for _, item := range items { |
| set[item] = true |
| } |
| } |
| |
| func GetBazelEnabledAndDisabledModules(buildMode SoongBuildMode, forceEnabled map[string]struct{}) (map[string]bool, map[string]bool) { |
| disabledModules := map[string]bool{} |
| enabledModules := map[string]bool{} |
| |
| switch buildMode { |
| case BazelProdMode: |
| AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) |
| for enabledAdHocModule := range forceEnabled { |
| enabledModules[enabledAdHocModule] = true |
| } |
| case BazelStagingMode: |
| // Staging mode includes all prod modules plus all staging modules. |
| AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) |
| AddToStringSet(enabledModules, allowlists.StagingMixedBuildsEnabledList) |
| for enabledAdHocModule := range forceEnabled { |
| enabledModules[enabledAdHocModule] = true |
| } |
| default: |
| panic("Expected BazelProdMode or BazelStagingMode") |
| } |
| return enabledModules, disabledModules |
| } |
| |
| func GetBazelEnabledModules(buildMode SoongBuildMode) []string { |
| enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(buildMode, nil) |
| enabledList := make([]string, 0, len(enabledModules)) |
| for module := range enabledModules { |
| if !disabledModules[module] { |
| enabledList = append(enabledList, module) |
| } |
| } |
| sort.Strings(enabledList) |
| return enabledList |
| } |
| |
| func NewBazelContext(c *config) (BazelContext, error) { |
| if c.BuildMode != BazelProdMode && c.BuildMode != BazelStagingMode { |
| return noopBazelContext{}, nil |
| } |
| |
| enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(c.BuildMode, c.BazelModulesForceEnabledByFlag()) |
| |
| paths := bazelPaths{ |
| soongOutDir: c.soongOutDir, |
| } |
| var missing []string |
| vars := []struct { |
| name string |
| ptr *string |
| |
| // True if the environment variable needs to be tracked so that changes to the variable |
| // cause the ninja file to be regenerated, false otherwise. False should only be set for |
| // environment variables that have no effect on the generated ninja file. |
| track bool |
| }{ |
| {"BAZEL_HOME", &paths.homeDir, true}, |
| {"BAZEL_PATH", &paths.bazelPath, true}, |
| {"BAZEL_OUTPUT_BASE", &paths.outputBase, true}, |
| {"BAZEL_WORKSPACE", &paths.workspaceDir, true}, |
| {"BAZEL_METRICS_DIR", &paths.metricsDir, false}, |
| {"BAZEL_DEPS_FILE", &paths.bazelDepsFile, true}, |
| } |
| for _, v := range vars { |
| if v.track { |
| if s := c.Getenv(v.name); len(s) > 1 { |
| *v.ptr = s |
| continue |
| } |
| } else if s, ok := c.env[v.name]; ok { |
| *v.ptr = s |
| } else { |
| missing = append(missing, v.name) |
| } |
| } |
| if len(missing) > 0 { |
| return nil, fmt.Errorf("missing required env vars to use bazel: %s", missing) |
| } |
| |
| targetBuildVariant := "user" |
| if c.Eng() { |
| targetBuildVariant = "eng" |
| } else if c.Debuggable() { |
| targetBuildVariant = "userdebug" |
| } |
| targetProduct := "unknown" |
| if c.HasDeviceProduct() { |
| targetProduct = c.DeviceProduct() |
| } |
| dclaMixedBuildsEnabledList := []string{} |
| if c.BuildMode == BazelProdMode { |
| dclaMixedBuildsEnabledList = allowlists.ProdDclaMixedBuildsEnabledList |
| } else if c.BuildMode == BazelStagingMode { |
| dclaMixedBuildsEnabledList = append(allowlists.ProdDclaMixedBuildsEnabledList, |
| allowlists.StagingDclaMixedBuildsEnabledList...) |
| } |
| dclaEnabledModules := map[string]bool{} |
| AddToStringSet(dclaEnabledModules, dclaMixedBuildsEnabledList) |
| return &mixedBuildBazelContext{ |
| bazelRunner: &builtinBazelRunner{c.UseBazelProxy, absolutePath(c.outDir)}, |
| paths: &paths, |
| bazelEnabledModules: enabledModules, |
| bazelDisabledModules: disabledModules, |
| bazelDclaEnabledModules: dclaEnabledModules, |
| targetProduct: targetProduct, |
| targetBuildVariant: targetBuildVariant, |
| }, nil |
| } |
| |
| func (p *bazelPaths) BazelMetricsDir() string { |
| return p.metricsDir |
| } |
| |
| func (context *mixedBuildBazelContext) IsModuleNameAllowed(moduleName string, withinApex bool) bool { |
| if context.bazelDisabledModules[moduleName] { |
| return false |
| } |
| if context.bazelEnabledModules[moduleName] { |
| return true |
| } |
| if withinApex && context.bazelDclaEnabledModules[moduleName] { |
| return true |
| } |
| |
| return false |
| } |
| |
| func pwdPrefix() string { |
| // Darwin doesn't have /proc |
| if runtime.GOOS != "darwin" { |
| return "PWD=/proc/self/cwd" |
| } |
| return "" |
| } |
| |
| type bazelCommand struct { |
| command string |
| // query or label |
| expression string |
| } |
| |
| type builtinBazelRunner struct { |
| useBazelProxy bool |
| outDir string |
| } |
| |
| // Issues the given bazel command with given build label and additional flags. |
| // Returns (stdout, stderr, error). The first and second return values are strings |
| // containing the stdout and stderr of the run command, and an error is returned if |
| // the invocation returned an error code. |
| func (r *builtinBazelRunner) issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (string, string, error) { |
| if r.useBazelProxy { |
| eventHandler.Begin("client_proxy") |
| defer eventHandler.End("client_proxy") |
| proxyClient := bazel.NewProxyClient(r.outDir) |
| resp, err := proxyClient.IssueCommand(cmdRequest) |
| |
| if err != nil { |
| return "", "", err |
| } |
| if len(resp.ErrorString) > 0 { |
| return "", "", fmt.Errorf(resp.ErrorString) |
| } |
| return resp.Stdout, resp.Stderr, nil |
| } else { |
| eventHandler.Begin("bazel command") |
| defer eventHandler.End("bazel command") |
| |
| stdout, stderr, err := bazel.ExecBazel(paths.bazelPath, absolutePath(paths.syntheticWorkspaceDir()), cmdRequest) |
| return string(stdout), string(stderr), err |
| } |
| } |
| |
| func (context *mixedBuildBazelContext) createBazelCommand(config Config, runName bazel.RunName, command bazelCommand, |
| extraFlags ...string) bazel.CmdRequest { |
| if runtime.GOOS != "linux" && runtime.GOOS != "darwin" { |
| panic("Unknown GOOS: " + runtime.GOOS) |
| } |
| cmdFlags := []string{ |
| "--output_base=" + absolutePath(context.paths.outputBase), |
| command.command, |
| command.expression, |
| "--profile=" + shared.BazelMetricsFilename(context.paths, runName), |
| |
| "--host_platform=@soong_injection//product_config_platforms:mixed_builds_product-" + context.targetBuildVariant + "_" + runtime.GOOS + "_x86_64", |
| // Don't specify --platforms, because on some products/branches (like kernel-build-tools) |
| // the main platform for mixed_builds_product-variant doesn't exist because an arch isn't |
| // specified in product config. The derivative platforms that config_node transitions into |
| // will still work. |
| |
| // Suppress noise |
| "--ui_event_filters=-INFO", |
| "--noshow_progress", |
| "--norun_validations", |
| } |
| cmdFlags = append(cmdFlags, extraFlags...) |
| |
| extraEnv := []string{ |
| "HOME=" + context.paths.homeDir, |
| pwdPrefix(), |
| "BUILD_DIR=" + absolutePath(context.paths.soongOutDir), |
| // Make OUT_DIR absolute here so build/bazel/bin/bazel uses the correct |
| // OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out. |
| "OUT_DIR=" + absolutePath(context.paths.outDir()), |
| // Disables local host detection of gcc; toolchain information is defined |
| // explicitly in BUILD files. |
| "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1", |
| } |
| capturedEnvVars, err := starlark_import.GetStarlarkValue[[]string]("captured_env_vars") |
| if err != nil { |
| panic(err) |
| } |
| for _, envvar := range capturedEnvVars { |
| val := config.Getenv(envvar) |
| if val == "" { |
| continue |
| } |
| extraEnv = append(extraEnv, fmt.Sprintf("%s=%s", envvar, val)) |
| } |
| envVars := append(os.Environ(), extraEnv...) |
| |
| return bazel.CmdRequest{cmdFlags, envVars} |
| } |
| |
| func (context *mixedBuildBazelContext) printableCqueryCommand(bazelCmd bazel.CmdRequest) string { |
| args := append([]string{context.paths.bazelPath}, bazelCmd.Argv...) |
| outputString := strings.Join(bazelCmd.Env, " ") + " \"" + strings.Join(args, "\" \"") + "\"" |
| return outputString |
| } |
| |
| func (context *mixedBuildBazelContext) mainBzlFileContents() []byte { |
| // TODO(cparsons): Define configuration transitions programmatically based |
| // on available archs. |
| contents := ` |
| ##################################################### |
| # This file is generated by soong_build. Do not edit. |
| ##################################################### |
| def _config_node_transition_impl(settings, attr): |
| if attr.os == "android" and attr.arch == "target": |
| target = "mixed_builds_product-{VARIANT}" |
| else: |
| target = "mixed_builds_product-{VARIANT}_%s_%s" % (attr.os, attr.arch) |
| apex_name = "" |
| if attr.within_apex: |
| # //build/bazel/rules/apex:apex_name has to be set to a non_empty value, |
| # otherwise //build/bazel/rules/apex:non_apex will be true and the |
| # "-D__ANDROID_APEX__" compiler flag will be missing. Apex_name is used |
| # in some validation on bazel side which don't really apply in mixed |
| # build because soong will do the work, so we just set it to a fixed |
| # value here. |
| apex_name = "dcla_apex" |
| outputs = { |
| "//command_line_option:platforms": "@soong_injection//product_config_platforms:%s" % target, |
| "@//build/bazel/rules/apex:within_apex": attr.within_apex, |
| "@//build/bazel/rules/apex:min_sdk_version": attr.apex_sdk_version, |
| "@//build/bazel/rules/apex:apex_name": apex_name, |
| "@//build/bazel/rules/apex:api_domain": attr.api_domain, |
| } |
| |
| return outputs |
| |
| _config_node_transition = transition( |
| implementation = _config_node_transition_impl, |
| inputs = [], |
| outputs = [ |
| "//command_line_option:platforms", |
| "@//build/bazel/rules/apex:within_apex", |
| "@//build/bazel/rules/apex:min_sdk_version", |
| "@//build/bazel/rules/apex:apex_name", |
| "@//build/bazel/rules/apex:api_domain", |
| ], |
| ) |
| |
| def _passthrough_rule_impl(ctx): |
| return [DefaultInfo(files = depset(ctx.files.deps))] |
| |
| config_node = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "arch" : attr.string(mandatory = True), |
| "os" : attr.string(mandatory = True), |
| "within_apex" : attr.bool(default = False), |
| "apex_sdk_version" : attr.string(mandatory = True), |
| "api_domain" : attr.string(mandatory = True), |
| "deps" : attr.label_list(cfg = _config_node_transition, allow_files = True), |
| "_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"), |
| }, |
| ) |
| |
| |
| # Rule representing the root of the build, to depend on all Bazel targets that |
| # are required for the build. Building this target will build the entire Bazel |
| # build tree. |
| mixed_build_root = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "deps" : attr.label_list(), |
| }, |
| ) |
| |
| def _phony_root_impl(ctx): |
| return [] |
| |
| # Rule to depend on other targets but build nothing. |
| # This is useful as follows: building a target of this rule will generate |
| # symlink forests for all dependencies of the target, without executing any |
| # actions of the build. |
| phony_root = rule( |
| implementation = _phony_root_impl, |
| attrs = {"deps" : attr.label_list()}, |
| ) |
| ` |
| |
| productReplacer := strings.NewReplacer( |
| "{PRODUCT}", context.targetProduct, |
| "{VARIANT}", context.targetBuildVariant) |
| |
| return []byte(productReplacer.Replace(contents)) |
| } |
| |
| func (context *mixedBuildBazelContext) mainBuildFileContents() []byte { |
| // TODO(cparsons): Map label to attribute programmatically; don't use hard-coded |
| // architecture mapping. |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| load(":main.bzl", "config_node", "mixed_build_root", "phony_root") |
| |
| %s |
| |
| mixed_build_root(name = "buildroot", |
| deps = [%s], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| |
| phony_root(name = "phonyroot", |
| deps = [":buildroot"], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| ` |
| configNodeFormatString := ` |
| config_node(name = "%s", |
| arch = "%s", |
| os = "%s", |
| within_apex = %s, |
| apex_sdk_version = "%s", |
| api_domain = "%s", |
| deps = [%s], |
| testonly = True, # Unblocks testonly deps. |
| ) |
| ` |
| |
| configNodesSection := "" |
| |
| labelsByConfig := map[string][]string{} |
| |
| for _, val := range context.requests { |
| labelString := fmt.Sprintf("\"@%s\"", val.label) |
| configString := getConfigString(val) |
| labelsByConfig[configString] = append(labelsByConfig[configString], labelString) |
| } |
| |
| // Configs need to be sorted to maintain determinism of the BUILD file. |
| sortedConfigs := make([]string, 0, len(labelsByConfig)) |
| for val := range labelsByConfig { |
| sortedConfigs = append(sortedConfigs, val) |
| } |
| sort.Slice(sortedConfigs, func(i, j int) bool { return sortedConfigs[i] < sortedConfigs[j] }) |
| |
| allLabels := []string{} |
| for _, configString := range sortedConfigs { |
| labels := labelsByConfig[configString] |
| configTokens := strings.Split(configString, "|") |
| if len(configTokens) < 2 { |
| panic(fmt.Errorf("Unexpected config string format: %s", configString)) |
| } |
| archString := configTokens[0] |
| osString := configTokens[1] |
| withinApex := "False" |
| apexSdkVerString := "" |
| apiDomainString := "" |
| if osString == "android" { |
| // api domains are meaningful only for device variants |
| apiDomainString = "system" |
| } |
| targetString := fmt.Sprintf("%s_%s", osString, archString) |
| if len(configTokens) > 2 { |
| targetString += "_" + configTokens[2] |
| if configTokens[2] == withinApexToString(true) { |
| withinApex = "True" |
| } |
| } |
| if len(configTokens) > 3 { |
| targetString += "_" + configTokens[3] |
| apexSdkVerString = configTokens[3] |
| } |
| if len(configTokens) > 4 { |
| apiDomainString = configTokens[4] |
| targetString += "_" + apiDomainString |
| } |
| allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString)) |
| labelsString := strings.Join(labels, ",\n ") |
| configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, withinApex, apexSdkVerString, apiDomainString, |
| labelsString) |
| } |
| |
| return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n "))) |
| } |
| |
| func indent(original string) string { |
| result := "" |
| for _, line := range strings.Split(original, "\n") { |
| result += " " + line + "\n" |
| } |
| return result |
| } |
| |
| // Returns the file contents of the buildroot.cquery file that should be used for the cquery |
| // expression in order to obtain information about buildroot and its dependencies. |
| // The contents of this file depend on the mixedBuildBazelContext's requests; requests are enumerated |
| // and grouped by their request type. The data retrieved for each label depends on its |
| // request type. |
| func (context *mixedBuildBazelContext) cqueryStarlarkFileContents() []byte { |
| requestTypeToCqueryIdEntries := map[cqueryRequest][]string{} |
| requestTypes := []cqueryRequest{} |
| for _, val := range context.requests { |
| cqueryId := getCqueryId(val) |
| mapEntryString := fmt.Sprintf("%q : True", cqueryId) |
| if _, seenKey := requestTypeToCqueryIdEntries[val.requestType]; !seenKey { |
| requestTypes = append(requestTypes, val.requestType) |
| } |
| requestTypeToCqueryIdEntries[val.requestType] = |
| append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString) |
| } |
| labelRegistrationMapSection := "" |
| functionDefSection := "" |
| mainSwitchSection := "" |
| |
| mapDeclarationFormatString := ` |
| %s = { |
| %s |
| } |
| ` |
| functionDefFormatString := ` |
| def %s(target, id_string): |
| %s |
| ` |
| mainSwitchSectionFormatString := ` |
| if id_string in %s: |
| return id_string + ">>" + %s(target, id_string) |
| ` |
| |
| for _, requestType := range requestTypes { |
| labelMapName := requestType.Name() + "_Labels" |
| functionName := requestType.Name() + "_Fn" |
| labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString, |
| labelMapName, |
| strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n ")) |
| functionDefSection += fmt.Sprintf(functionDefFormatString, |
| functionName, |
| indent(requestType.StarlarkFunctionBody())) |
| mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString, |
| labelMapName, functionName) |
| } |
| |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| |
| {LABEL_REGISTRATION_MAP_SECTION} |
| |
| {FUNCTION_DEF_SECTION} |
| |
| def get_arch(target): |
| # TODO(b/199363072): filegroups and file targets aren't associated with any |
| # specific platform architecture in mixed builds. This is consistent with how |
| # Soong treats filegroups, but it may not be the case with manually-written |
| # filegroup BUILD targets. |
| buildoptions = build_options(target) |
| |
| if buildoptions == None: |
| # File targets do not have buildoptions. File targets aren't associated with |
| # any specific platform architecture in mixed builds, so use the host. |
| return "x86_64|linux" |
| platforms = buildoptions["//command_line_option:platforms"] |
| if len(platforms) != 1: |
| # An individual configured target should have only one platform architecture. |
| # Note that it's fine for there to be multiple architectures for the same label, |
| # but each is its own configured target. |
| fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms)) |
| platform_name = platforms[0].name |
| if platform_name == "host": |
| return "HOST" |
| if not platform_name.startswith("mixed_builds_product-{TARGET_BUILD_VARIANT}"): |
| fail("expected platform name of the form 'mixed_builds_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'mixed_builds_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms)) |
| platform_name = platform_name.removeprefix("mixed_builds_product-{TARGET_BUILD_VARIANT}").removeprefix("_") |
| config_key = "" |
| if not platform_name: |
| config_key = "target|android" |
| elif platform_name.startswith("android_"): |
| config_key = platform_name.removeprefix("android_") + "|android" |
| elif platform_name.startswith("linux_"): |
| config_key = platform_name.removeprefix("linux_") + "|linux" |
| else: |
| fail("expected platform name of the form 'mixed_builds_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'mixed_builds_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms)) |
| |
| within_apex = buildoptions.get("//build/bazel/rules/apex:within_apex") |
| apex_sdk_version = buildoptions.get("//build/bazel/rules/apex:min_sdk_version") |
| api_domain = buildoptions.get("//build/bazel/rules/apex:api_domain") |
| |
| if within_apex: |
| config_key += "|within_apex" |
| if apex_sdk_version != None and len(apex_sdk_version) > 0: |
| config_key += "|" + apex_sdk_version |
| if api_domain != None and len(api_domain) > 0: |
| config_key += "|" + api_domain |
| |
| return config_key |
| |
| def format(target): |
| id_string = str(target.label) + "|" + get_arch(target) |
| |
| # TODO(b/248106697): Remove once Bazel is updated to always normalize labels. |
| if id_string.startswith("//"): |
| id_string = "@" + id_string |
| |
| {MAIN_SWITCH_SECTION} |
| |
| # This target was not requested via cquery, and thus must be a dependency |
| # of a requested target. |
| return id_string + ">>NONE" |
| ` |
| replacer := strings.NewReplacer( |
| "{TARGET_PRODUCT}", context.targetProduct, |
| "{TARGET_BUILD_VARIANT}", context.targetBuildVariant, |
| "{LABEL_REGISTRATION_MAP_SECTION}", labelRegistrationMapSection, |
| "{FUNCTION_DEF_SECTION}", functionDefSection, |
| "{MAIN_SWITCH_SECTION}", mainSwitchSection) |
| |
| return []byte(replacer.Replace(formatString)) |
| } |
| |
| // Returns a path containing build-related metadata required for interfacing |
| // with Bazel. Example: out/soong/bazel. |
| func (p *bazelPaths) intermediatesDir() string { |
| return filepath.Join(p.soongOutDir, "bazel") |
| } |
| |
| // Returns the path where the contents of the @soong_injection repository live. |
| // It is used by Soong to tell Bazel things it cannot over the command line. |
| func (p *bazelPaths) injectedFilesDir() string { |
| return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName) |
| } |
| |
| // Returns the path of the synthetic Bazel workspace that contains a symlink |
| // forest composed the whole source tree and BUILD files generated by bp2build. |
| func (p *bazelPaths) syntheticWorkspaceDir() string { |
| return filepath.Join(p.soongOutDir, "workspace") |
| } |
| |
| // Returns the path to the top level out dir ($OUT_DIR). |
| func (p *bazelPaths) outDir() string { |
| return filepath.Dir(p.soongOutDir) |
| } |
| |
| const buildrootLabel = "@soong_injection//mixed_builds:buildroot" |
| |
| var ( |
| cqueryCmd = bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)} |
| aqueryCmd = bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)} |
| buildCmd = bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"} |
| allBazelCommands = []bazelCommand{aqueryCmd, cqueryCmd, buildCmd} |
| ) |
| |
| func GetBazelSandwichCqueryRequests(config Config) ([]cqueryKey, error) { |
| result := make([]cqueryKey, 0, len(allowlists.BazelSandwichTargets)) |
| labelRegex := regexp.MustCompile("^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$") |
| // Note that bazel "targets" are different from soong "targets", the bazel targets are |
| // synonymous with soong modules, and soong targets are a configuration a module is built in. |
| for _, target := range allowlists.BazelSandwichTargets { |
| match := labelRegex.FindStringSubmatch(target.Label) |
| if match == nil { |
| return nil, fmt.Errorf("invalid label, must match `^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$`: %s", target.Label) |
| } |
| if _, err := os.Stat(absolutePath(match[1])); err != nil { |
| if os.IsNotExist(err) { |
| // Ignore bazel sandwich targets that don't exist. |
| continue |
| } else { |
| return nil, err |
| } |
| } |
| |
| var soongTarget Target |
| if target.Host { |
| soongTarget = config.BuildOSTarget |
| } else { |
| soongTarget = config.AndroidCommonTarget |
| if soongTarget.Os.Class != Device { |
| // kernel-build-tools seems to set the AndroidCommonTarget to a linux host |
| // target for some reason, disable device builds in that case. |
| continue |
| } |
| } |
| |
| result = append(result, cqueryKey{ |
| label: target.Label, |
| requestType: cquery.GetOutputFiles, |
| configKey: configKey{ |
| arch: soongTarget.Arch.String(), |
| osType: soongTarget.Os, |
| }, |
| }) |
| } |
| return result, nil |
| } |
| |
| // QueueBazelSandwichCqueryRequests queues cquery requests for all the bazel labels in |
| // bazel_sandwich_targets. These will later be given phony targets so that they can be built on the |
| // command line. |
| func (context *mixedBuildBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { |
| requests, err := GetBazelSandwichCqueryRequests(config) |
| if err != nil { |
| return err |
| } |
| for _, request := range requests { |
| context.QueueBazelRequest(request.label, request.requestType, request.configKey) |
| } |
| |
| return nil |
| } |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. |
| func (context *mixedBuildBazelContext) InvokeBazel(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("bazel") |
| defer eventHandler.End("bazel") |
| |
| if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" { |
| if err := os.MkdirAll(metricsDir, 0777); err != nil { |
| return err |
| } |
| } |
| context.results = make(map[cqueryKey]string) |
| if err := context.runCquery(config, ctx); err != nil { |
| return err |
| } |
| if err := context.runAquery(config, ctx); err != nil { |
| return err |
| } |
| if err := context.generateBazelSymlinks(config, ctx); err != nil { |
| return err |
| } |
| |
| // Clear requests. |
| context.requests = []cqueryKey{} |
| return nil |
| } |
| |
| func (context *mixedBuildBazelContext) runCquery(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("cquery") |
| defer eventHandler.End("cquery") |
| soongInjectionPath := absolutePath(context.paths.injectedFilesDir()) |
| mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds") |
| if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) { |
| err = os.MkdirAll(mixedBuildsPath, 0777) |
| if err != nil { |
| return err |
| } |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666); err != nil { |
| return err |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "main.bzl"), context.mainBzlFileContents(), 0666); err != nil { |
| return err |
| } |
| if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "BUILD.bazel"), context.mainBuildFileContents(), 0666); err != nil { |
| return err |
| } |
| cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery") |
| if err := writeFileBytesIfChanged(absolutePath(cqueryFileRelpath), context.cqueryStarlarkFileContents(), 0666); err != nil { |
| return err |
| } |
| |
| extraFlags := []string{"--output=starlark", "--starlark:file=" + absolutePath(cqueryFileRelpath)} |
| if Bool(config.productVariables.ClangCoverage) { |
| extraFlags = append(extraFlags, "--collect_code_coverage") |
| } |
| |
| cqueryCmdRequest := context.createBazelCommand(config, bazel.CqueryBuildRootRunName, cqueryCmd, extraFlags...) |
| cqueryOutput, cqueryErrorMessage, cqueryErr := context.issueBazelCommand(cqueryCmdRequest, context.paths, eventHandler) |
| if cqueryErr != nil { |
| return cqueryErr |
| } |
| cqueryCommandPrint := fmt.Sprintf("cquery command line:\n %s \n\n\n", context.printableCqueryCommand(cqueryCmdRequest)) |
| if err := os.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"), []byte(cqueryCommandPrint+cqueryOutput), 0666); err != nil { |
| return err |
| } |
| cqueryResults := map[string]string{} |
| for _, outputLine := range strings.Split(cqueryOutput, "\n") { |
| if strings.Contains(outputLine, ">>") { |
| splitLine := strings.SplitN(outputLine, ">>", 2) |
| cqueryResults[splitLine[0]] = splitLine[1] |
| } |
| } |
| for _, val := range context.requests { |
| if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok { |
| context.results[val] = cqueryResult |
| } else { |
| return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]", |
| getCqueryId(val), cqueryOutput, cqueryErrorMessage) |
| } |
| } |
| return nil |
| } |
| |
| func writeFileBytesIfChanged(path string, contents []byte, perm os.FileMode) error { |
| oldContents, err := os.ReadFile(path) |
| if err != nil || !bytes.Equal(contents, oldContents) { |
| err = os.WriteFile(path, contents, perm) |
| } |
| return nil |
| } |
| |
| func (context *mixedBuildBazelContext) runAquery(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("aquery") |
| defer eventHandler.End("aquery") |
| // Issue an aquery command to retrieve action information about the bazel build tree. |
| // |
| // Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's |
| // proto sources, which would add a number of unnecessary dependencies. |
| extraFlags := []string{"--output=proto", "--include_file_write_contents"} |
| if Bool(config.productVariables.ClangCoverage) { |
| extraFlags = append(extraFlags, "--collect_code_coverage") |
| paths := make([]string, 0, 2) |
| if p := config.productVariables.NativeCoveragePaths; len(p) > 0 { |
| for i := range p { |
| // TODO(b/259404593) convert path wildcard to regex values |
| if p[i] == "*" { |
| p[i] = ".*" |
| } |
| } |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "+", ",")) |
| } |
| if p := config.productVariables.NativeCoverageExcludePaths; len(p) > 0 { |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "-", ",")) |
| } |
| if len(paths) > 0 { |
| extraFlags = append(extraFlags, "--instrumentation_filter="+strings.Join(paths, ",")) |
| } |
| } |
| aqueryOutput, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.AqueryBuildRootRunName, aqueryCmd, |
| extraFlags...), context.paths, eventHandler) |
| if err != nil { |
| return err |
| } |
| context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput), eventHandler) |
| return err |
| } |
| |
| func (context *mixedBuildBazelContext) generateBazelSymlinks(config Config, ctx invokeBazelContext) error { |
| eventHandler := ctx.GetEventHandler() |
| eventHandler.Begin("symlinks") |
| defer eventHandler.End("symlinks") |
| // Issue a build command of the phony root to generate symlink forests for dependencies of the |
| // Bazel build. This is necessary because aquery invocations do not generate this symlink forest, |
| // but some of symlinks may be required to resolve source dependencies of the build. |
| _, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.BazelBuildPhonyRootRunName, buildCmd), context.paths, eventHandler) |
| return err |
| } |
| |
| func (context *mixedBuildBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { |
| return context.buildStatements |
| } |
| |
| func (context *mixedBuildBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return context.depsets |
| } |
| |
| func (context *mixedBuildBazelContext) OutputBase() string { |
| return context.paths.outputBase |
| } |
| |
| // Singleton used for registering BUILD file ninja dependencies (needed |
| // for correctness of builds which use Bazel. |
| func BazelSingleton() Singleton { |
| return &bazelSingleton{} |
| } |
| |
| type bazelSingleton struct{} |
| |
| func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) { |
| // bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled. |
| if !ctx.Config().IsMixedBuildsEnabled() { |
| return |
| } |
| |
| // Add ninja file dependencies for files which all bazel invocations require. |
| bazelBuildList := absolutePath(filepath.Join( |
| filepath.Dir(ctx.Config().moduleListFile), "bazel.list")) |
| ctx.AddNinjaFileDeps(bazelBuildList) |
| |
| data, err := os.ReadFile(bazelBuildList) |
| if err != nil { |
| ctx.Errorf(err.Error()) |
| } |
| files := strings.Split(strings.TrimSpace(string(data)), "\n") |
| for _, file := range files { |
| ctx.AddNinjaFileDeps(file) |
| } |
| |
| depsetHashToDepset := map[string]bazel.AqueryDepset{} |
| |
| for _, depset := range ctx.Config().BazelContext.AqueryDepsets() { |
| depsetHashToDepset[depset.ContentHash] = depset |
| |
| var outputs []Path |
| var orderOnlies []Path |
| for _, depsetDepHash := range depset.TransitiveDepSetHashes { |
| otherDepsetName := bazelDepsetName(depsetDepHash) |
| outputs = append(outputs, PathForPhony(ctx, otherDepsetName)) |
| } |
| for _, artifactPath := range depset.DirectArtifacts { |
| pathInBazelOut := PathForBazelOut(ctx, artifactPath) |
| if artifactPath == "bazel-out/volatile-status.txt" { |
| // See https://bazel.build/docs/user-manual#workspace-status |
| orderOnlies = append(orderOnlies, pathInBazelOut) |
| } else { |
| outputs = append(outputs, pathInBazelOut) |
| } |
| } |
| thisDepsetName := bazelDepsetName(depset.ContentHash) |
| ctx.Build(pctx, BuildParams{ |
| Rule: blueprint.Phony, |
| Outputs: []WritablePath{PathForPhony(ctx, thisDepsetName)}, |
| Implicits: outputs, |
| OrderOnly: orderOnlies, |
| }) |
| } |
| |
| executionRoot := path.Join(ctx.Config().BazelContext.OutputBase(), "execroot", "__main__") |
| bazelOutDir := path.Join(executionRoot, "bazel-out") |
| rel, err := filepath.Rel(ctx.Config().OutDir(), executionRoot) |
| if err != nil { |
| ctx.Errorf("%s", err.Error()) |
| } |
| dotdotsToOutRoot := strings.Repeat("../", strings.Count(rel, "/")+1) |
| for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() { |
| // nil build statements are a valid case where we do not create an action because it is |
| // unnecessary or handled by other processing |
| if buildStatement == nil { |
| continue |
| } |
| if len(buildStatement.Command) > 0 { |
| rule := NewRuleBuilder(pctx, ctx) |
| intermediateDir, intermediateDirHash := intermediatePathForSboxMixedBuildAction(ctx, buildStatement) |
| if buildStatement.ShouldRunInSbox { |
| // Create a rule to build the output inside a sandbox |
| // This will create two changes of working directory |
| // 1. From ANDROID_BUILD_TOP to sbox top |
| // 2. From sbox top to a a synthetic mixed build execution root relative to it |
| // Finally, the outputs will be copied to intermediateDir |
| rule.Sbox(intermediateDir, |
| PathForOutput(ctx, "mixed_build_sbox_intermediates", intermediateDirHash+".textproto")). |
| SandboxInputs(). |
| // Since we will cd to mixed build execution root, set sbox's out subdir to empty |
| // Without this, we will try to copy from $SBOX_SANDBOX_DIR/out/out/bazel/output/execroot/__main__/... |
| SetSboxOutDirDirAsEmpty() |
| |
| // Create another set of rules to copy files from the intermediate dir to mixed build execution root |
| for _, outputPath := range buildStatement.OutputPaths { |
| ctx.Build(pctx, BuildParams{ |
| Rule: CpIfChanged, |
| Input: intermediateDir.Join(ctx, executionRoot, outputPath), |
| Output: PathForBazelOut(ctx, outputPath), |
| }) |
| } |
| } |
| createCommand(rule.Command(), buildStatement, executionRoot, bazelOutDir, ctx, depsetHashToDepset, dotdotsToOutRoot) |
| |
| desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths) |
| rule.Build(fmt.Sprintf("bazel %d", index), desc) |
| continue |
| } |
| // Certain actions returned by aquery (for instance FileWrite) do not contain a command |
| // and thus require special treatment. If BuildStatement were an interface implementing |
| // buildRule(ctx) function, the code here would just call it. |
| // Unfortunately, the BuildStatement is defined in |
| // the 'bazel' package, which cannot depend on 'android' package where ctx is defined, |
| // because this would cause circular dependency. So, until we move aquery processing |
| // to the 'android' package, we need to handle special cases here. |
| switch buildStatement.Mnemonic { |
| case "RepoMappingManifest": |
| // It appears RepoMappingManifest files currently have |
| // non-deterministic content. Just emit empty files for |
| // now because they're unused. |
| out := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| WriteFileRuleVerbatim(ctx, out, "") |
| case "FileWrite", "SourceSymlinkManifest": |
| out := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| WriteFileRuleVerbatim(ctx, out, buildStatement.FileContents) |
| case "SymlinkTree": |
| // build-runfiles arguments are the manifest file and the target directory |
| // where it creates the symlink tree according to this manifest (and then |
| // writes the MANIFEST file to it). |
| outManifest := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| outManifestPath := outManifest.String() |
| if !strings.HasSuffix(outManifestPath, "MANIFEST") { |
| panic("the base name of the symlink tree action should be MANIFEST, got " + outManifestPath) |
| } |
| outDir := filepath.Dir(outManifestPath) |
| ctx.Build(pctx, BuildParams{ |
| Rule: buildRunfilesRule, |
| Output: outManifest, |
| Inputs: []Path{PathForBazelOut(ctx, buildStatement.InputPaths[0])}, |
| Description: "symlink tree for " + outDir, |
| Args: map[string]string{ |
| "outDir": outDir, |
| }, |
| }) |
| default: |
| panic(fmt.Sprintf("unhandled build statement: %v", buildStatement)) |
| } |
| } |
| |
| // Create phony targets for all the bazel sandwich output files |
| requests, err := GetBazelSandwichCqueryRequests(ctx.Config()) |
| if err != nil { |
| ctx.Errorf(err.Error()) |
| } |
| for _, request := range requests { |
| files, err := ctx.Config().BazelContext.GetOutputFiles(request.label, request.configKey) |
| if err != nil { |
| ctx.Errorf(err.Error()) |
| } |
| filesAsPaths := make([]Path, 0, len(files)) |
| for _, file := range files { |
| filesAsPaths = append(filesAsPaths, PathForBazelOut(ctx, file)) |
| } |
| ctx.Phony("bazel_sandwich", filesAsPaths...) |
| } |
| ctx.Phony("checkbuild", PathForPhony(ctx, "bazel_sandwich")) |
| } |
| |
| // Returns a out dir path for a sandboxed mixed build action |
| func intermediatePathForSboxMixedBuildAction(ctx PathContext, statement *bazel.BuildStatement) (OutputPath, string) { |
| // An artifact can be generated by a single buildstatement. |
| // Use the hash of the first artifact to create a unique path |
| uniqueDir := sha1.New() |
| uniqueDir.Write([]byte(statement.OutputPaths[0])) |
| uniqueDirHashString := hex.EncodeToString(uniqueDir.Sum(nil)) |
| return PathForOutput(ctx, "mixed_build_sbox_intermediates", uniqueDirHashString), uniqueDirHashString |
| } |
| |
| // Register bazel-owned build statements (obtained from the aquery invocation). |
| func createCommand(cmd *RuleBuilderCommand, buildStatement *bazel.BuildStatement, executionRoot string, bazelOutDir string, ctx BuilderContext, depsetHashToDepset map[string]bazel.AqueryDepset, dotdotsToOutRoot string) { |
| // executionRoot is the action cwd. |
| if buildStatement.ShouldRunInSbox { |
| // mkdir -p ensures that the directory exists when run via sbox |
| cmd.Text(fmt.Sprintf("mkdir -p '%s' && cd '%s' &&", executionRoot, executionRoot)) |
| } else { |
| cmd.Text(fmt.Sprintf("cd '%s' &&", executionRoot)) |
| } |
| |
| // Remove old outputs, as some actions might not rerun if the outputs are detected. |
| if len(buildStatement.OutputPaths) > 0 { |
| cmd.Text("rm -rf") // -r because outputs can be Bazel dir/tree artifacts. |
| for _, outputPath := range buildStatement.OutputPaths { |
| cmd.Text(fmt.Sprintf("'%s'", outputPath)) |
| } |
| cmd.Text("&&") |
| } |
| |
| for _, pair := range buildStatement.Env { |
| // Set per-action env variables, if any. |
| cmd.Flag(pair.Key + "=" + pair.Value) |
| } |
| |
| command := buildStatement.Command |
| command = strings.ReplaceAll(command, "{DOTDOTS_TO_OUTPUT_ROOT}", dotdotsToOutRoot) |
| |
| // The actual Bazel action. |
| if len(command) > 16*1024 { |
| commandFile := PathForBazelOut(ctx, buildStatement.OutputPaths[0]+".sh") |
| WriteFileRule(ctx, commandFile, command) |
| |
| cmd.Text("bash").Text(buildStatement.OutputPaths[0] + ".sh").Implicit(commandFile) |
| } else { |
| cmd.Text(command) |
| } |
| |
| for _, outputPath := range buildStatement.OutputPaths { |
| if buildStatement.ShouldRunInSbox { |
| // The full path has three components that get joined together |
| // 1. intermediate output dir that `sbox` will place the artifacts at |
| // 2. mixed build execution root |
| // 3. artifact path returned by aquery |
| intermediateDir, _ := intermediatePathForSboxMixedBuildAction(ctx, buildStatement) |
| cmd.ImplicitOutput(intermediateDir.Join(ctx, executionRoot, outputPath)) |
| } else { |
| cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath)) |
| } |
| } |
| for _, inputPath := range buildStatement.InputPaths { |
| cmd.Implicit(PathForBazelOut(ctx, inputPath)) |
| } |
| for _, inputDepsetHash := range buildStatement.InputDepsetHashes { |
| if buildStatement.ShouldRunInSbox { |
| // Bazel depsets are phony targets that are used to group files. |
| // We need to copy the grouped files into the sandbox |
| ds, _ := depsetHashToDepset[inputDepsetHash] |
| cmd.Implicits(PathsForBazelOut(ctx, ds.DirectArtifacts)) |
| } else { |
| otherDepsetName := bazelDepsetName(inputDepsetHash) |
| cmd.Implicit(PathForPhony(ctx, otherDepsetName)) |
| } |
| } |
| for _, implicitPath := range buildStatement.ImplicitDeps { |
| cmd.Implicit(PathForArbitraryOutput(ctx, implicitPath)) |
| } |
| |
| if depfile := buildStatement.Depfile; depfile != nil { |
| // The paths in depfile are relative to `executionRoot`. |
| // Hence, they need to be corrected by replacing "bazel-out" |
| // with the full `bazelOutDir`. |
| // Otherwise, implicit outputs and implicit inputs under "bazel-out/" |
| // would be deemed missing. |
| // (Note: The regexp uses a capture group because the version of sed |
| // does not support a look-behind pattern.) |
| replacement := fmt.Sprintf(`&& sed -i'' -E 's@(^|\s|")bazel-out/@\1%s/@g' '%s'`, |
| bazelOutDir, *depfile) |
| cmd.Text(replacement) |
| cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile)) |
| } |
| |
| for _, symlinkPath := range buildStatement.SymlinkPaths { |
| cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath)) |
| } |
| } |
| |
| func getCqueryId(key cqueryKey) string { |
| return key.label + "|" + getConfigString(key) |
| } |
| |
| func getConfigString(key cqueryKey) string { |
| arch := key.configKey.arch |
| if len(arch) == 0 || arch == "common" { |
| if key.configKey.osType.Class == Device { |
| // For the generic Android, the expected result is "target|android", which |
| // corresponds to the product_variable_config named "android_target" in |
| // build/bazel/platforms/BUILD.bazel. |
| arch = "target" |
| } else { |
| // Use host platform, which is currently hardcoded to be x86_64. |
| arch = "x86_64" |
| } |
| } |
| osName := key.configKey.osType.Name |
| if len(osName) == 0 || osName == "common_os" || osName == "linux_glibc" || osName == "linux_musl" { |
| // Use host OS, which is currently hardcoded to be linux. |
| osName = "linux" |
| } |
| keyString := arch + "|" + osName |
| if key.configKey.apexKey.WithinApex { |
| keyString += "|" + withinApexToString(key.configKey.apexKey.WithinApex) |
| } |
| |
| if len(key.configKey.apexKey.ApexSdkVersion) > 0 { |
| keyString += "|" + key.configKey.apexKey.ApexSdkVersion |
| } |
| |
| if len(key.configKey.apexKey.ApiDomain) > 0 { |
| keyString += "|" + key.configKey.apexKey.ApiDomain |
| } |
| |
| return keyString |
| } |
| |
| func GetConfigKey(ctx BaseModuleContext) configKey { |
| return configKey{ |
| // use string because Arch is not a valid key in go |
| arch: ctx.Arch().String(), |
| osType: ctx.Os(), |
| } |
| } |
| |
| func GetConfigKeyApexVariant(ctx BaseModuleContext, apexKey *ApexConfigKey) configKey { |
| configKey := GetConfigKey(ctx) |
| |
| if apexKey != nil { |
| configKey.apexKey = ApexConfigKey{ |
| WithinApex: apexKey.WithinApex, |
| ApexSdkVersion: apexKey.ApexSdkVersion, |
| ApiDomain: apexKey.ApiDomain, |
| } |
| } |
| |
| return configKey |
| } |
| |
| func bazelDepsetName(contentHash string) string { |
| return fmt.Sprintf("bazel_depset_%s", contentHash) |
| } |