blob: 229818da00927228145891a3d0b90d8b416a5ae1 [file] [log] [blame]
// Copyright 2023 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package bazel
import (
"bytes"
"encoding/gob"
"fmt"
"net"
os_lib "os"
"os/exec"
"path/filepath"
"strings"
"time"
)
// Logs events of ProxyServer.
type ServerLogger interface {
Fatal(v ...interface{})
Fatalf(format string, v ...interface{})
Println(v ...interface{})
}
// CmdRequest is a request to the Bazel Proxy server.
type CmdRequest struct {
// Args to the Bazel command.
Argv []string
// Environment variables to pass to the Bazel invocation. Strings should be of
// the form "KEY=VALUE".
Env []string
}
// CmdResponse is a response from the Bazel Proxy server.
type CmdResponse struct {
Stdout string
Stderr string
ErrorString string
}
// ProxyClient is a client which can issue Bazel commands to the Bazel
// proxy server. Requests are issued (and responses received) via a unix socket.
// See ProxyServer for more details.
type ProxyClient struct {
outDir string
}
// ProxyServer is a server which runs as a background goroutine. Each
// request to the server describes a Bazel command which the server should run.
// The server then issues the Bazel command, and returns a response describing
// the stdout/stderr of the command.
// Client-server communication is done via a unix socket under the output
// directory.
// The server is intended to circumvent sandboxing for subprocesses of the
// build. The build orchestrator (soong_ui) can launch a server to exist outside
// of sandboxing, and sandboxed processes (such as soong_build) can issue
// bazel commands through this socket tunnel. This allows a sandboxed process
// to issue bazel requests to a bazel that resides outside of sandbox. This
// is particularly useful to maintain a persistent Bazel server which lives
// past the duration of a single build.
// The ProxyServer will only live as long as soong_ui does; the
// underlying Bazel server will live past the duration of the build.
type ProxyServer struct {
logger ServerLogger
outDir string
workspaceDir string
bazeliskVersion string
// The server goroutine will listen on this channel and stop handling requests
// once it is written to.
done chan struct{}
}
// NewProxyClient is a constructor for a ProxyClient.
func NewProxyClient(outDir string) *ProxyClient {
return &ProxyClient{
outDir: outDir,
}
}
func unixSocketPath(outDir string) string {
return filepath.Join(outDir, "bazelsocket.sock")
}
// IssueCommand issues a request to the Bazel Proxy Server to issue a Bazel
// request. Returns a response describing the output from the Bazel process
// (if the Bazel process had an error, then the response will include an error).
// Returns an error if there was an issue with the connection to the Bazel Proxy
// server.
func (b *ProxyClient) IssueCommand(req CmdRequest) (CmdResponse, error) {
var resp CmdResponse
var err error
// Check for connections every 1 second. This is chosen to be a relatively
// short timeout, because the proxy server should accept requests quite
// quickly.
d := net.Dialer{Timeout: 1 * time.Second}
var conn net.Conn
conn, err = d.Dial("unix", unixSocketPath(b.outDir))
if err != nil {
return resp, err
}
defer conn.Close()
enc := gob.NewEncoder(conn)
if err = enc.Encode(req); err != nil {
return resp, err
}
dec := gob.NewDecoder(conn)
err = dec.Decode(&resp)
return resp, err
}
// NewProxyServer is a constructor for a ProxyServer.
func NewProxyServer(logger ServerLogger, outDir string, workspaceDir string, bazeliskVersion string) *ProxyServer {
if len(bazeliskVersion) > 0 {
logger.Println("** Using Bazelisk for this build, due to env var USE_BAZEL_VERSION=" + bazeliskVersion + " **")
}
return &ProxyServer{
logger: logger,
outDir: outDir,
workspaceDir: workspaceDir,
done: make(chan struct{}),
bazeliskVersion: bazeliskVersion,
}
}
func ExecBazel(bazelPath string, workspaceDir string, request CmdRequest) (stdout []byte, stderr []byte, cmdErr error) {
bazelCmd := exec.Command(bazelPath, request.Argv...)
bazelCmd.Dir = workspaceDir
bazelCmd.Env = request.Env
stderrBuffer := &bytes.Buffer{}
bazelCmd.Stderr = stderrBuffer
if output, err := bazelCmd.Output(); err != nil {
cmdErr = fmt.Errorf("bazel command failed: %s\n---command---\n%s\n---env---\n%s\n---stderr---\n%s---",
err, bazelCmd, strings.Join(bazelCmd.Env, "\n"), stderrBuffer)
} else {
stdout = output
}
stderr = stderrBuffer.Bytes()
return
}
func (b *ProxyServer) handleRequest(conn net.Conn) error {
defer conn.Close()
dec := gob.NewDecoder(conn)
var req CmdRequest
if err := dec.Decode(&req); err != nil {
return fmt.Errorf("Error decoding request: %s", err)
}
if len(b.bazeliskVersion) > 0 {
req.Env = append(req.Env, "USE_BAZEL_VERSION="+b.bazeliskVersion)
}
stdout, stderr, cmdErr := ExecBazel("./build/bazel/bin/bazel", b.workspaceDir, req)
errorString := ""
if cmdErr != nil {
errorString = cmdErr.Error()
}
resp := CmdResponse{string(stdout), string(stderr), errorString}
enc := gob.NewEncoder(conn)
if err := enc.Encode(&resp); err != nil {
return fmt.Errorf("Error encoding response: %s", err)
}
return nil
}
func (b *ProxyServer) listenUntilClosed(listener net.Listener) error {
for {
// Check for connections every 1 second. This is a blocking operation, so
// if the server is closed, the goroutine will not fully close until this
// deadline is reached. Thus, this deadline is short (but not too short
// so that the routine churns).
listener.(*net.UnixListener).SetDeadline(time.Now().Add(time.Second))
conn, err := listener.Accept()
select {
case <-b.done:
return nil
default:
}
if err != nil {
if opErr, ok := err.(*net.OpError); ok && opErr.Timeout() {
// Timeout is normal and expected while waiting for client to establish
// a connection.
continue
} else {
b.logger.Fatalf("Listener error: %s", err)
}
}
err = b.handleRequest(conn)
if err != nil {
b.logger.Fatal(err)
}
}
}
// Start initializes the server unix socket and (in a separate goroutine)
// handles requests on the socket until the server is closed. Returns an error
// if a failure occurs during initialization. Will log any post-initialization
// errors to the server's logger.
func (b *ProxyServer) Start() error {
unixSocketAddr := unixSocketPath(b.outDir)
if err := os_lib.RemoveAll(unixSocketAddr); err != nil {
return fmt.Errorf("couldn't remove socket '%s': %s", unixSocketAddr, err)
}
listener, err := net.Listen("unix", unixSocketAddr)
if err != nil {
return fmt.Errorf("error listening on socket '%s': %s", unixSocketAddr, err)
}
go b.listenUntilClosed(listener)
return nil
}
// Close shuts down the server. This will stop the server from listening for
// additional requests.
func (b *ProxyServer) Close() {
b.done <- struct{}{}
}