| // Copyright 2020 Google Inc. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package android |
| |
| import ( |
| "bytes" |
| "errors" |
| "fmt" |
| "io/ioutil" |
| "os" |
| "os/exec" |
| "path" |
| "path/filepath" |
| "runtime" |
| "strings" |
| "sync" |
| |
| "android/soong/bazel/cquery" |
| "android/soong/shared" |
| "github.com/google/blueprint" |
| |
| "android/soong/bazel" |
| ) |
| |
| var ( |
| writeBazelFile = pctx.AndroidStaticRule("bazelWriteFileRule", blueprint.RuleParams{ |
| Command: `sed "s/\\\\n/\n/g" ${out}.rsp >${out}`, |
| Rspfile: "${out}.rsp", |
| RspfileContent: "${content}", |
| }, "content") |
| _ = pctx.HostBinToolVariable("bazelBuildRunfilesTool", "build-runfiles") |
| buildRunfilesRule = pctx.AndroidStaticRule("bazelBuildRunfiles", blueprint.RuleParams{ |
| Command: "${bazelBuildRunfilesTool} ${in} ${outDir}", |
| Depfile: "", |
| Description: "", |
| CommandDeps: []string{"${bazelBuildRunfilesTool}"}, |
| }, "outDir") |
| ) |
| |
| func init() { |
| RegisterMixedBuildsMutator(InitRegistrationContext) |
| } |
| |
| func RegisterMixedBuildsMutator(ctx RegistrationContext) { |
| ctx.PostDepsMutators(func(ctx RegisterMutatorsContext) { |
| ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel() |
| }) |
| } |
| |
| func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) { |
| if m := ctx.Module(); m.Enabled() { |
| if mixedBuildMod, ok := m.(MixedBuildBuildable); ok { |
| if mixedBuildMod.IsMixedBuildSupported(ctx) && MixedBuildsEnabled(ctx) { |
| mixedBuildMod.QueueBazelCall(ctx) |
| } |
| } |
| } |
| } |
| |
| type cqueryRequest interface { |
| // Name returns a string name for this request type. Such request type names must be unique, |
| // and must only consist of alphanumeric characters. |
| Name() string |
| |
| // StarlarkFunctionBody returns a starlark function body to process this request type. |
| // The returned string is the body of a Starlark function which obtains |
| // all request-relevant information about a target and returns a string containing |
| // this information. |
| // The function should have the following properties: |
| // - `target` is the only parameter to this function (a configured target). |
| // - The return value must be a string. |
| // - The function body should not be indented outside of its own scope. |
| StarlarkFunctionBody() string |
| } |
| |
| // Portion of cquery map key to describe target configuration. |
| type configKey struct { |
| arch string |
| osType OsType |
| } |
| |
| func (c configKey) String() string { |
| return fmt.Sprintf("%s::%s", c.arch, c.osType) |
| } |
| |
| // Map key to describe bazel cquery requests. |
| type cqueryKey struct { |
| label string |
| requestType cqueryRequest |
| configKey configKey |
| } |
| |
| func (c cqueryKey) String() string { |
| return fmt.Sprintf("cquery(%s,%s,%s)", c.label, c.requestType.Name(), c.configKey) |
| |
| } |
| |
| // BazelContext is a context object useful for interacting with Bazel during |
| // the course of a build. Use of Bazel to evaluate part of the build graph |
| // is referred to as a "mixed build". (Some modules are managed by Soong, |
| // some are managed by Bazel). To facilitate interop between these build |
| // subgraphs, Soong may make requests to Bazel and evaluate their responses |
| // so that Soong modules may accurately depend on Bazel targets. |
| type BazelContext interface { |
| // Add a cquery request to the bazel request queue. All queued requests |
| // will be sent to Bazel on a subsequent invocation of InvokeBazel. |
| QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) |
| |
| // ** Cquery Results Retrieval Functions |
| // The below functions pertain to retrieving cquery results from a prior |
| // InvokeBazel function call and parsing the results. |
| |
| // Returns result files built by building the given bazel target label. |
| GetOutputFiles(label string, cfgKey configKey) ([]string, error) |
| |
| // Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order). |
| GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) |
| |
| // Returns the executable binary resultant from building together the python sources |
| // TODO(b/232976601): Remove. |
| GetPythonBinary(label string, cfgKey configKey) (string, error) |
| |
| // Returns the results of the GetApexInfo query (including output files) |
| GetApexInfo(label string, cfgkey configKey) (cquery.ApexCqueryInfo, error) |
| |
| // ** end Cquery Results Retrieval Functions |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. |
| InvokeBazel(config Config) error |
| |
| // Returns true if bazel is enabled for the given configuration. |
| BazelEnabled() bool |
| |
| // Returns the bazel output base (the root directory for all bazel intermediate outputs). |
| OutputBase() string |
| |
| // Returns build statements which should get registered to reflect Bazel's outputs. |
| BuildStatementsToRegister() []bazel.BuildStatement |
| |
| // Returns the depsets defined in Bazel's aquery response. |
| AqueryDepsets() []bazel.AqueryDepset |
| } |
| |
| type bazelRunner interface { |
| issueBazelCommand(paths *bazelPaths, runName bazel.RunName, command bazelCommand, extraFlags ...string) (string, string, error) |
| } |
| |
| type bazelPaths struct { |
| homeDir string |
| bazelPath string |
| outputBase string |
| workspaceDir string |
| soongOutDir string |
| metricsDir string |
| } |
| |
| // A context object which tracks queued requests that need to be made to Bazel, |
| // and their results after the requests have been made. |
| type bazelContext struct { |
| bazelRunner |
| paths *bazelPaths |
| requests map[cqueryKey]bool // cquery requests that have not yet been issued to Bazel |
| requestMutex sync.Mutex // requests can be written in parallel |
| |
| results map[cqueryKey]string // Results of cquery requests after Bazel invocations |
| |
| // Build statements which should get registered to reflect Bazel's outputs. |
| buildStatements []bazel.BuildStatement |
| |
| // Depsets which should be used for Bazel's build statements. |
| depsets []bazel.AqueryDepset |
| } |
| |
| var _ BazelContext = &bazelContext{} |
| |
| // A bazel context to use when Bazel is disabled. |
| type noopBazelContext struct{} |
| |
| var _ BazelContext = noopBazelContext{} |
| |
| // A bazel context to use for tests. |
| type MockBazelContext struct { |
| OutputBaseDir string |
| |
| LabelToOutputFiles map[string][]string |
| LabelToCcInfo map[string]cquery.CcInfo |
| LabelToPythonBinary map[string]string |
| LabelToApexInfo map[string]cquery.ApexCqueryInfo |
| } |
| |
| func (m MockBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) GetOutputFiles(label string, _ configKey) ([]string, error) { |
| result, _ := m.LabelToOutputFiles[label] |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetCcInfo(label string, _ configKey) (cquery.CcInfo, error) { |
| result, _ := m.LabelToCcInfo[label] |
| return result, nil |
| } |
| |
| func (m MockBazelContext) GetPythonBinary(label string, _ configKey) (string, error) { |
| result, _ := m.LabelToPythonBinary[label] |
| return result, nil |
| } |
| |
| func (n MockBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexCqueryInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) InvokeBazel(_ Config) error { |
| panic("unimplemented") |
| } |
| |
| func (m MockBazelContext) BazelEnabled() bool { |
| return true |
| } |
| |
| func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir } |
| |
| func (m MockBazelContext) BuildStatementsToRegister() []bazel.BuildStatement { |
| return []bazel.BuildStatement{} |
| } |
| |
| func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| var _ BazelContext = MockBazelContext{} |
| |
| func (bazelCtx *bazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { |
| key := cqueryKey{label, requestType, cfgKey} |
| bazelCtx.requestMutex.Lock() |
| defer bazelCtx.requestMutex.Unlock() |
| bazelCtx.requests[key] = true |
| } |
| |
| func (bazelCtx *bazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) { |
| key := cqueryKey{label, cquery.GetOutputFiles, cfgKey} |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| return cquery.GetOutputFiles.ParseResult(bazelOutput), nil |
| } |
| return nil, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *bazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { |
| key := cqueryKey{label, cquery.GetCcInfo, cfgKey} |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| return cquery.GetCcInfo.ParseResult(bazelOutput) |
| } |
| return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *bazelContext) GetPythonBinary(label string, cfgKey configKey) (string, error) { |
| key := cqueryKey{label, cquery.GetPythonBinary, cfgKey} |
| if rawString, ok := bazelCtx.results[key]; ok { |
| bazelOutput := strings.TrimSpace(rawString) |
| return cquery.GetPythonBinary.ParseResult(bazelOutput), nil |
| } |
| return "", fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (bazelCtx *bazelContext) GetApexInfo(label string, cfgKey configKey) (cquery.ApexCqueryInfo, error) { |
| key := cqueryKey{label, cquery.GetApexInfo, cfgKey} |
| if rawString, ok := bazelCtx.results[key]; ok { |
| return cquery.GetApexInfo.ParseResult(strings.TrimSpace(rawString)), nil |
| } |
| return cquery.ApexCqueryInfo{}, fmt.Errorf("no bazel response found for %v", key) |
| } |
| |
| func (n noopBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetOutputFiles(_ string, _ configKey) ([]string, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetCcInfo(_ string, _ configKey) (cquery.CcInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetPythonBinary(_ string, _ configKey) (string, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexCqueryInfo, error) { |
| panic("unimplemented") |
| } |
| |
| func (n noopBazelContext) InvokeBazel(_ Config) error { |
| panic("unimplemented") |
| } |
| |
| func (m noopBazelContext) OutputBase() string { |
| return "" |
| } |
| |
| func (n noopBazelContext) BazelEnabled() bool { |
| return false |
| } |
| |
| func (m noopBazelContext) BuildStatementsToRegister() []bazel.BuildStatement { |
| return []bazel.BuildStatement{} |
| } |
| |
| func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return []bazel.AqueryDepset{} |
| } |
| |
| func NewBazelContext(c *config) (BazelContext, error) { |
| // TODO(cparsons): Assess USE_BAZEL=1 instead once "mixed Soong/Bazel builds" |
| // are production ready. |
| if !c.IsEnvTrue("USE_BAZEL_ANALYSIS") { |
| return noopBazelContext{}, nil |
| } |
| |
| p, err := bazelPathsFromConfig(c) |
| if err != nil { |
| return nil, err |
| } |
| return &bazelContext{ |
| bazelRunner: &builtinBazelRunner{}, |
| paths: p, |
| requests: make(map[cqueryKey]bool), |
| }, nil |
| } |
| |
| func bazelPathsFromConfig(c *config) (*bazelPaths, error) { |
| p := bazelPaths{ |
| soongOutDir: c.soongOutDir, |
| } |
| var missingEnvVars []string |
| if len(c.Getenv("BAZEL_HOME")) > 1 { |
| p.homeDir = c.Getenv("BAZEL_HOME") |
| } else { |
| missingEnvVars = append(missingEnvVars, "BAZEL_HOME") |
| } |
| if len(c.Getenv("BAZEL_PATH")) > 1 { |
| p.bazelPath = c.Getenv("BAZEL_PATH") |
| } else { |
| missingEnvVars = append(missingEnvVars, "BAZEL_PATH") |
| } |
| if len(c.Getenv("BAZEL_OUTPUT_BASE")) > 1 { |
| p.outputBase = c.Getenv("BAZEL_OUTPUT_BASE") |
| } else { |
| missingEnvVars = append(missingEnvVars, "BAZEL_OUTPUT_BASE") |
| } |
| if len(c.Getenv("BAZEL_WORKSPACE")) > 1 { |
| p.workspaceDir = c.Getenv("BAZEL_WORKSPACE") |
| } else { |
| missingEnvVars = append(missingEnvVars, "BAZEL_WORKSPACE") |
| } |
| if len(c.Getenv("BAZEL_METRICS_DIR")) > 1 { |
| p.metricsDir = c.Getenv("BAZEL_METRICS_DIR") |
| } else { |
| missingEnvVars = append(missingEnvVars, "BAZEL_METRICS_DIR") |
| } |
| if len(missingEnvVars) > 0 { |
| return nil, errors.New(fmt.Sprintf("missing required env vars to use bazel: %s", missingEnvVars)) |
| } else { |
| return &p, nil |
| } |
| } |
| |
| func (p *bazelPaths) BazelMetricsDir() string { |
| return p.metricsDir |
| } |
| |
| func (context *bazelContext) BazelEnabled() bool { |
| return true |
| } |
| |
| func pwdPrefix() string { |
| // Darwin doesn't have /proc |
| if runtime.GOOS != "darwin" { |
| return "PWD=/proc/self/cwd" |
| } |
| return "" |
| } |
| |
| type bazelCommand struct { |
| command string |
| // query or label |
| expression string |
| } |
| |
| type mockBazelRunner struct { |
| bazelCommandResults map[bazelCommand]string |
| commands []bazelCommand |
| extraFlags []string |
| } |
| |
| func (r *mockBazelRunner) issueBazelCommand(_ *bazelPaths, _ bazel.RunName, |
| command bazelCommand, extraFlags ...string) (string, string, error) { |
| r.commands = append(r.commands, command) |
| r.extraFlags = append(r.extraFlags, strings.Join(extraFlags, " ")) |
| if ret, ok := r.bazelCommandResults[command]; ok { |
| return ret, "", nil |
| } |
| return "", "", nil |
| } |
| |
| type builtinBazelRunner struct{} |
| |
| // Issues the given bazel command with given build label and additional flags. |
| // Returns (stdout, stderr, error). The first and second return values are strings |
| // containing the stdout and stderr of the run command, and an error is returned if |
| // the invocation returned an error code. |
| func (r *builtinBazelRunner) issueBazelCommand(paths *bazelPaths, runName bazel.RunName, command bazelCommand, |
| extraFlags ...string) (string, string, error) { |
| cmdFlags := []string{ |
| "--output_base=" + absolutePath(paths.outputBase), |
| command.command, |
| command.expression, |
| // TODO(asmundak): is it needed in every build? |
| "--profile=" + shared.BazelMetricsFilename(paths, runName), |
| |
| // Set default platforms to canonicalized values for mixed builds requests. |
| // If these are set in the bazelrc, they will have values that are |
| // non-canonicalized to @sourceroot labels, and thus be invalid when |
| // referenced from the buildroot. |
| // |
| // The actual platform values here may be overridden by configuration |
| // transitions from the buildroot. |
| fmt.Sprintf("--platforms=%s", "//build/bazel/platforms:android_target"), |
| fmt.Sprintf("--extra_toolchains=%s", "//prebuilts/clang/host/linux-x86:all"), |
| |
| // This should be parameterized on the host OS, but let's restrict to linux |
| // to keep things simple for now. |
| fmt.Sprintf("--host_platform=%s", "//build/bazel/platforms:linux_x86_64"), |
| |
| // Explicitly disable downloading rules (such as canonical C++ and Java rules) from the network. |
| "--experimental_repository_disable_download", |
| |
| // Suppress noise |
| "--ui_event_filters=-INFO", |
| "--noshow_progress"} |
| cmdFlags = append(cmdFlags, extraFlags...) |
| |
| bazelCmd := exec.Command(paths.bazelPath, cmdFlags...) |
| bazelCmd.Dir = absolutePath(paths.syntheticWorkspaceDir()) |
| extraEnv := []string{ |
| "HOME=" + paths.homeDir, |
| pwdPrefix(), |
| "BUILD_DIR=" + absolutePath(paths.soongOutDir), |
| // Make OUT_DIR absolute here so tools/bazel.sh uses the correct |
| // OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out. |
| "OUT_DIR=" + absolutePath(paths.outDir()), |
| // Disables local host detection of gcc; toolchain information is defined |
| // explicitly in BUILD files. |
| "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1", |
| } |
| bazelCmd.Env = append(os.Environ(), extraEnv...) |
| stderr := &bytes.Buffer{} |
| bazelCmd.Stderr = stderr |
| |
| if output, err := bazelCmd.Output(); err != nil { |
| return "", string(stderr.Bytes()), |
| fmt.Errorf("bazel command failed. command: [%s], env: [%s], error [%s]", bazelCmd, bazelCmd.Env, stderr) |
| } else { |
| return string(output), string(stderr.Bytes()), nil |
| } |
| } |
| |
| func (context *bazelContext) mainBzlFileContents() []byte { |
| // TODO(cparsons): Define configuration transitions programmatically based |
| // on available archs. |
| contents := ` |
| ##################################################### |
| # This file is generated by soong_build. Do not edit. |
| ##################################################### |
| |
| def _config_node_transition_impl(settings, attr): |
| return { |
| "//command_line_option:platforms": "@//build/bazel/platforms:%s_%s" % (attr.os, attr.arch), |
| } |
| |
| _config_node_transition = transition( |
| implementation = _config_node_transition_impl, |
| inputs = [], |
| outputs = [ |
| "//command_line_option:platforms", |
| ], |
| ) |
| |
| def _passthrough_rule_impl(ctx): |
| return [DefaultInfo(files = depset(ctx.files.deps))] |
| |
| config_node = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "arch" : attr.string(mandatory = True), |
| "os" : attr.string(mandatory = True), |
| "deps" : attr.label_list(cfg = _config_node_transition, allow_files = True), |
| "_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"), |
| }, |
| ) |
| |
| |
| # Rule representing the root of the build, to depend on all Bazel targets that |
| # are required for the build. Building this target will build the entire Bazel |
| # build tree. |
| mixed_build_root = rule( |
| implementation = _passthrough_rule_impl, |
| attrs = { |
| "deps" : attr.label_list(), |
| }, |
| ) |
| |
| def _phony_root_impl(ctx): |
| return [] |
| |
| # Rule to depend on other targets but build nothing. |
| # This is useful as follows: building a target of this rule will generate |
| # symlink forests for all dependencies of the target, without executing any |
| # actions of the build. |
| phony_root = rule( |
| implementation = _phony_root_impl, |
| attrs = {"deps" : attr.label_list()}, |
| ) |
| ` |
| return []byte(contents) |
| } |
| |
| func (context *bazelContext) mainBuildFileContents() []byte { |
| // TODO(cparsons): Map label to attribute programmatically; don't use hard-coded |
| // architecture mapping. |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| load(":main.bzl", "config_node", "mixed_build_root", "phony_root") |
| |
| %s |
| |
| mixed_build_root(name = "buildroot", |
| deps = [%s], |
| ) |
| |
| phony_root(name = "phonyroot", |
| deps = [":buildroot"], |
| ) |
| ` |
| configNodeFormatString := ` |
| config_node(name = "%s", |
| arch = "%s", |
| os = "%s", |
| deps = [%s], |
| ) |
| ` |
| |
| configNodesSection := "" |
| |
| labelsByConfig := map[string][]string{} |
| for val := range context.requests { |
| labelString := fmt.Sprintf("\"@%s\"", val.label) |
| configString := getConfigString(val) |
| labelsByConfig[configString] = append(labelsByConfig[configString], labelString) |
| } |
| |
| allLabels := []string{} |
| for configString, labels := range labelsByConfig { |
| configTokens := strings.Split(configString, "|") |
| if len(configTokens) != 2 { |
| panic(fmt.Errorf("Unexpected config string format: %s", configString)) |
| } |
| archString := configTokens[0] |
| osString := configTokens[1] |
| targetString := fmt.Sprintf("%s_%s", osString, archString) |
| allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString)) |
| labelsString := strings.Join(labels, ",\n ") |
| configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, labelsString) |
| } |
| |
| return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n "))) |
| } |
| |
| func indent(original string) string { |
| result := "" |
| for _, line := range strings.Split(original, "\n") { |
| result += " " + line + "\n" |
| } |
| return result |
| } |
| |
| // Returns the file contents of the buildroot.cquery file that should be used for the cquery |
| // expression in order to obtain information about buildroot and its dependencies. |
| // The contents of this file depend on the bazelContext's requests; requests are enumerated |
| // and grouped by their request type. The data retrieved for each label depends on its |
| // request type. |
| func (context *bazelContext) cqueryStarlarkFileContents() []byte { |
| requestTypeToCqueryIdEntries := map[cqueryRequest][]string{} |
| for val := range context.requests { |
| cqueryId := getCqueryId(val) |
| mapEntryString := fmt.Sprintf("%q : True", cqueryId) |
| requestTypeToCqueryIdEntries[val.requestType] = |
| append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString) |
| } |
| labelRegistrationMapSection := "" |
| functionDefSection := "" |
| mainSwitchSection := "" |
| |
| mapDeclarationFormatString := ` |
| %s = { |
| %s |
| } |
| ` |
| functionDefFormatString := ` |
| def %s(target): |
| %s |
| ` |
| mainSwitchSectionFormatString := ` |
| if id_string in %s: |
| return id_string + ">>" + %s(target) |
| ` |
| |
| for requestType := range requestTypeToCqueryIdEntries { |
| labelMapName := requestType.Name() + "_Labels" |
| functionName := requestType.Name() + "_Fn" |
| labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString, |
| labelMapName, |
| strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n ")) |
| functionDefSection += fmt.Sprintf(functionDefFormatString, |
| functionName, |
| indent(requestType.StarlarkFunctionBody())) |
| mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString, |
| labelMapName, functionName) |
| } |
| |
| formatString := ` |
| # This file is generated by soong_build. Do not edit. |
| |
| # Label Map Section |
| %s |
| |
| # Function Def Section |
| %s |
| |
| def get_arch(target): |
| # TODO(b/199363072): filegroups and file targets aren't associated with any |
| # specific platform architecture in mixed builds. This is consistent with how |
| # Soong treats filegroups, but it may not be the case with manually-written |
| # filegroup BUILD targets. |
| buildoptions = build_options(target) |
| if buildoptions == None: |
| # File targets do not have buildoptions. File targets aren't associated with |
| # any specific platform architecture in mixed builds, so use the host. |
| return "x86_64|linux" |
| platforms = build_options(target)["//command_line_option:platforms"] |
| if len(platforms) != 1: |
| # An individual configured target should have only one platform architecture. |
| # Note that it's fine for there to be multiple architectures for the same label, |
| # but each is its own configured target. |
| fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms)) |
| platform_name = build_options(target)["//command_line_option:platforms"][0].name |
| if platform_name == "host": |
| return "HOST" |
| elif platform_name.startswith("android_"): |
| return platform_name[len("android_"):] + "|" + platform_name[:len("android_")-1] |
| elif platform_name.startswith("linux_"): |
| return platform_name[len("linux_"):] + "|" + platform_name[:len("linux_")-1] |
| else: |
| fail("expected platform name of the form 'android_<arch>' or 'linux_<arch>', but was " + str(platforms)) |
| return "UNKNOWN" |
| |
| def json_for_file(key, file): |
| return '"' + key + '":"' + file.path + '"' |
| |
| def json_for_files(key, files): |
| return '"' + key + '":[' + ",".join(['"' + f.path + '"' for f in files]) + ']' |
| |
| def json_for_labels(key, ll): |
| return '"' + key + '":[' + ",".join(['"' + str(x) + '"' for x in ll]) + ']' |
| |
| def format(target): |
| id_string = str(target.label) + "|" + get_arch(target) |
| |
| # Main switch section |
| %s |
| # This target was not requested via cquery, and thus must be a dependency |
| # of a requested target. |
| return id_string + ">>NONE" |
| ` |
| |
| return []byte(fmt.Sprintf(formatString, labelRegistrationMapSection, functionDefSection, |
| mainSwitchSection)) |
| } |
| |
| // Returns a path containing build-related metadata required for interfacing |
| // with Bazel. Example: out/soong/bazel. |
| func (p *bazelPaths) intermediatesDir() string { |
| return filepath.Join(p.soongOutDir, "bazel") |
| } |
| |
| // Returns the path where the contents of the @soong_injection repository live. |
| // It is used by Soong to tell Bazel things it cannot over the command line. |
| func (p *bazelPaths) injectedFilesDir() string { |
| return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName) |
| } |
| |
| // Returns the path of the synthetic Bazel workspace that contains a symlink |
| // forest composed the whole source tree and BUILD files generated by bp2build. |
| func (p *bazelPaths) syntheticWorkspaceDir() string { |
| return filepath.Join(p.soongOutDir, "workspace") |
| } |
| |
| // Returns the path to the top level out dir ($OUT_DIR). |
| func (p *bazelPaths) outDir() string { |
| return filepath.Dir(p.soongOutDir) |
| } |
| |
| // Issues commands to Bazel to receive results for all cquery requests |
| // queued in the BazelContext. |
| func (context *bazelContext) InvokeBazel(config Config) error { |
| context.results = make(map[cqueryKey]string) |
| |
| var err error |
| |
| soongInjectionPath := absolutePath(context.paths.injectedFilesDir()) |
| mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds") |
| if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) { |
| err = os.MkdirAll(mixedBuildsPath, 0777) |
| } |
| if err != nil { |
| return err |
| } |
| if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" { |
| err = os.MkdirAll(metricsDir, 0777) |
| if err != nil { |
| return err |
| } |
| } |
| if err = ioutil.WriteFile(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666); err != nil { |
| return err |
| } |
| if err = ioutil.WriteFile(filepath.Join(mixedBuildsPath, "main.bzl"), context.mainBzlFileContents(), 0666); err != nil { |
| return err |
| } |
| if err = ioutil.WriteFile(filepath.Join(mixedBuildsPath, "BUILD.bazel"), context.mainBuildFileContents(), 0666); err != nil { |
| return err |
| } |
| cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery") |
| if err = ioutil.WriteFile(absolutePath(cqueryFileRelpath), context.cqueryStarlarkFileContents(), 0666); err != nil { |
| return err |
| } |
| |
| const buildrootLabel = "@soong_injection//mixed_builds:buildroot" |
| cqueryCmd := bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)} |
| cqueryOutput, cqueryErr, err := context.issueBazelCommand(context.paths, bazel.CqueryBuildRootRunName, cqueryCmd, |
| "--output=starlark", "--starlark:file="+absolutePath(cqueryFileRelpath)) |
| if err != nil { |
| _ = ioutil.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"), []byte(cqueryOutput), 0666) |
| } |
| if err != nil { |
| return err |
| } |
| |
| cqueryResults := map[string]string{} |
| for _, outputLine := range strings.Split(cqueryOutput, "\n") { |
| if strings.Contains(outputLine, ">>") { |
| splitLine := strings.SplitN(outputLine, ">>", 2) |
| cqueryResults[splitLine[0]] = splitLine[1] |
| } |
| } |
| for val := range context.requests { |
| if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok { |
| context.results[val] = cqueryResult |
| } else { |
| return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]", |
| getCqueryId(val), cqueryOutput, cqueryErr) |
| } |
| } |
| |
| // Issue an aquery command to retrieve action information about the bazel build tree. |
| // |
| // Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's |
| // proto sources, which would add a number of unnecessary dependencies. |
| extraFlags := []string{"--output=jsonproto", "--include_file_write_contents"} |
| if Bool(config.productVariables.ClangCoverage) { |
| extraFlags = append(extraFlags, "--collect_code_coverage") |
| paths := make([]string, 0, 2) |
| if p := config.productVariables.NativeCoveragePaths; len(p) > 0 { |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "+", ",")) |
| } |
| if p := config.productVariables.NativeCoverageExcludePaths; len(p) > 0 { |
| paths = append(paths, JoinWithPrefixAndSeparator(p, "-", ",")) |
| } |
| if len(paths) > 0 { |
| extraFlags = append(extraFlags, "--instrumentation_filter="+strings.Join(paths, ",")) |
| } |
| } |
| aqueryCmd := bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)} |
| if aqueryOutput, _, err := context.issueBazelCommand(context.paths, bazel.AqueryBuildRootRunName, aqueryCmd, |
| extraFlags...); err == nil { |
| context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput)) |
| } |
| if err != nil { |
| return err |
| } |
| |
| // Issue a build command of the phony root to generate symlink forests for dependencies of the |
| // Bazel build. This is necessary because aquery invocations do not generate this symlink forest, |
| // but some of symlinks may be required to resolve source dependencies of the build. |
| buildCmd := bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"} |
| if _, _, err = context.issueBazelCommand(context.paths, bazel.BazelBuildPhonyRootRunName, buildCmd); err != nil { |
| return err |
| } |
| |
| // Clear requests. |
| context.requests = map[cqueryKey]bool{} |
| return nil |
| } |
| |
| func (context *bazelContext) BuildStatementsToRegister() []bazel.BuildStatement { |
| return context.buildStatements |
| } |
| |
| func (context *bazelContext) AqueryDepsets() []bazel.AqueryDepset { |
| return context.depsets |
| } |
| |
| func (context *bazelContext) OutputBase() string { |
| return context.paths.outputBase |
| } |
| |
| // Singleton used for registering BUILD file ninja dependencies (needed |
| // for correctness of builds which use Bazel. |
| func BazelSingleton() Singleton { |
| return &bazelSingleton{} |
| } |
| |
| type bazelSingleton struct{} |
| |
| func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) { |
| // bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled. |
| if !ctx.Config().BazelContext.BazelEnabled() { |
| return |
| } |
| |
| // Add ninja file dependencies for files which all bazel invocations require. |
| bazelBuildList := absolutePath(filepath.Join( |
| filepath.Dir(ctx.Config().moduleListFile), "bazel.list")) |
| ctx.AddNinjaFileDeps(bazelBuildList) |
| |
| data, err := ioutil.ReadFile(bazelBuildList) |
| if err != nil { |
| ctx.Errorf(err.Error()) |
| } |
| files := strings.Split(strings.TrimSpace(string(data)), "\n") |
| for _, file := range files { |
| ctx.AddNinjaFileDeps(file) |
| } |
| |
| for _, depset := range ctx.Config().BazelContext.AqueryDepsets() { |
| var outputs []Path |
| for _, depsetDepHash := range depset.TransitiveDepSetHashes { |
| otherDepsetName := bazelDepsetName(depsetDepHash) |
| outputs = append(outputs, PathForPhony(ctx, otherDepsetName)) |
| } |
| for _, artifactPath := range depset.DirectArtifacts { |
| outputs = append(outputs, PathForBazelOut(ctx, artifactPath)) |
| } |
| thisDepsetName := bazelDepsetName(depset.ContentHash) |
| ctx.Build(pctx, BuildParams{ |
| Rule: blueprint.Phony, |
| Outputs: []WritablePath{PathForPhony(ctx, thisDepsetName)}, |
| Implicits: outputs, |
| }) |
| } |
| |
| executionRoot := path.Join(ctx.Config().BazelContext.OutputBase(), "execroot", "__main__") |
| bazelOutDir := path.Join(executionRoot, "bazel-out") |
| for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() { |
| if len(buildStatement.Command) > 0 { |
| rule := NewRuleBuilder(pctx, ctx) |
| createCommand(rule.Command(), buildStatement, executionRoot, bazelOutDir, ctx) |
| desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths) |
| rule.Build(fmt.Sprintf("bazel %d", index), desc) |
| continue |
| } |
| // Certain actions returned by aquery (for instance FileWrite) do not contain a command |
| // and thus require special treatment. If BuildStatement were an interface implementing |
| // buildRule(ctx) function, the code here would just call it. |
| // Unfortunately, the BuildStatement is defined in |
| // the 'bazel' package, which cannot depend on 'android' package where ctx is defined, |
| // because this would cause circular dependency. So, until we move aquery processing |
| // to the 'android' package, we need to handle special cases here. |
| if buildStatement.Mnemonic == "FileWrite" || buildStatement.Mnemonic == "SourceSymlinkManifest" { |
| // Pass file contents as the value of the rule's "content" argument. |
| // Escape newlines and $ in the contents (the action "writeBazelFile" restores "\\n" |
| // back to the newline, and Ninja reads $$ as $. |
| escaped := strings.ReplaceAll(strings.ReplaceAll(buildStatement.FileContents, "\n", "\\n"), |
| "$", "$$") |
| ctx.Build(pctx, BuildParams{ |
| Rule: writeBazelFile, |
| Output: PathForBazelOut(ctx, buildStatement.OutputPaths[0]), |
| Description: fmt.Sprintf("%s %s", buildStatement.Mnemonic, buildStatement.OutputPaths[0]), |
| Args: map[string]string{ |
| "content": escaped, |
| }, |
| }) |
| } else if buildStatement.Mnemonic == "SymlinkTree" { |
| // build-runfiles arguments are the manifest file and the target directory |
| // where it creates the symlink tree according to this manifest (and then |
| // writes the MANIFEST file to it). |
| outManifest := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) |
| outManifestPath := outManifest.String() |
| if !strings.HasSuffix(outManifestPath, "MANIFEST") { |
| panic("the base name of the symlink tree action should be MANIFEST, got " + outManifestPath) |
| } |
| outDir := filepath.Dir(outManifestPath) |
| ctx.Build(pctx, BuildParams{ |
| Rule: buildRunfilesRule, |
| Output: outManifest, |
| Inputs: []Path{PathForBazelOut(ctx, buildStatement.InputPaths[0])}, |
| Description: "symlink tree for " + outDir, |
| Args: map[string]string{ |
| "outDir": outDir, |
| }, |
| }) |
| } else { |
| panic(fmt.Sprintf("unhandled build statement: %v", buildStatement)) |
| } |
| } |
| } |
| |
| // Register bazel-owned build statements (obtained from the aquery invocation). |
| func createCommand(cmd *RuleBuilderCommand, buildStatement bazel.BuildStatement, executionRoot string, bazelOutDir string, ctx PathContext) { |
| // executionRoot is the action cwd. |
| cmd.Text(fmt.Sprintf("cd '%s' &&", executionRoot)) |
| |
| // Remove old outputs, as some actions might not rerun if the outputs are detected. |
| if len(buildStatement.OutputPaths) > 0 { |
| cmd.Text("rm -f") |
| for _, outputPath := range buildStatement.OutputPaths { |
| cmd.Text(fmt.Sprintf("'%s'", outputPath)) |
| } |
| cmd.Text("&&") |
| } |
| |
| for _, pair := range buildStatement.Env { |
| // Set per-action env variables, if any. |
| cmd.Flag(pair.Key + "=" + pair.Value) |
| } |
| |
| // The actual Bazel action. |
| cmd.Text(buildStatement.Command) |
| |
| for _, outputPath := range buildStatement.OutputPaths { |
| cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath)) |
| } |
| for _, inputPath := range buildStatement.InputPaths { |
| cmd.Implicit(PathForBazelOut(ctx, inputPath)) |
| } |
| for _, inputDepsetHash := range buildStatement.InputDepsetHashes { |
| otherDepsetName := bazelDepsetName(inputDepsetHash) |
| cmd.Implicit(PathForPhony(ctx, otherDepsetName)) |
| } |
| |
| if depfile := buildStatement.Depfile; depfile != nil { |
| // The paths in depfile are relative to `executionRoot`. |
| // Hence, they need to be corrected by replacing "bazel-out" |
| // with the full `bazelOutDir`. |
| // Otherwise, implicit outputs and implicit inputs under "bazel-out/" |
| // would be deemed missing. |
| // (Note: The regexp uses a capture group because the version of sed |
| // does not support a look-behind pattern.) |
| replacement := fmt.Sprintf(`&& sed -i'' -E 's@(^|\s|")bazel-out/@\1%s/@g' '%s'`, |
| bazelOutDir, *depfile) |
| cmd.Text(replacement) |
| cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile)) |
| } |
| |
| for _, symlinkPath := range buildStatement.SymlinkPaths { |
| cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath)) |
| } |
| } |
| |
| func getCqueryId(key cqueryKey) string { |
| return key.label + "|" + getConfigString(key) |
| } |
| |
| func getConfigString(key cqueryKey) string { |
| arch := key.configKey.arch |
| if len(arch) == 0 || arch == "common" { |
| if key.configKey.osType.Class == Device { |
| // For the generic Android, the expected result is "target|android", which |
| // corresponds to the product_variable_config named "android_target" in |
| // build/bazel/platforms/BUILD.bazel. |
| arch = "target" |
| } else { |
| // Use host platform, which is currently hardcoded to be x86_64. |
| arch = "x86_64" |
| } |
| } |
| osName := key.configKey.osType.Name |
| if len(osName) == 0 || osName == "common_os" || osName == "linux_glibc" { |
| // Use host OS, which is currently hardcoded to be linux. |
| osName = "linux" |
| } |
| return arch + "|" + osName |
| } |
| |
| func GetConfigKey(ctx BaseModuleContext) configKey { |
| return configKey{ |
| // use string because Arch is not a valid key in go |
| arch: ctx.Arch().String(), |
| osType: ctx.Os(), |
| } |
| } |
| |
| func bazelDepsetName(contentHash string) string { |
| return fmt.Sprintf("bazel_depset_%s", contentHash) |
| } |