| // Copyright 2018 Google Inc. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package android |
| |
| import ( |
| "crypto/sha256" |
| "fmt" |
| "path/filepath" |
| "sort" |
| "strings" |
| "testing" |
| |
| "github.com/google/blueprint" |
| "github.com/google/blueprint/proptools" |
| "google.golang.org/protobuf/encoding/prototext" |
| "google.golang.org/protobuf/proto" |
| |
| "android/soong/cmd/sbox/sbox_proto" |
| "android/soong/remoteexec" |
| "android/soong/response" |
| "android/soong/shared" |
| ) |
| |
| const sboxSandboxBaseDir = "__SBOX_SANDBOX_DIR__" |
| const sboxOutSubDir = "out" |
| const sboxToolsSubDir = "tools" |
| const sboxOutDir = sboxSandboxBaseDir + "/" + sboxOutSubDir |
| |
| // RuleBuilder provides an alternative to ModuleContext.Rule and ModuleContext.Build to add a command line to the build |
| // graph. |
| type RuleBuilder struct { |
| pctx PackageContext |
| ctx BuilderContext |
| |
| commands []*RuleBuilderCommand |
| installs RuleBuilderInstalls |
| temporariesSet map[WritablePath]bool |
| restat bool |
| sbox bool |
| highmem bool |
| remoteable RemoteRuleSupports |
| rbeParams *remoteexec.REParams |
| outDir WritablePath |
| sboxOutSubDir string |
| sboxTools bool |
| sboxInputs bool |
| sboxManifestPath WritablePath |
| missingDeps []string |
| } |
| |
| // NewRuleBuilder returns a newly created RuleBuilder. |
| func NewRuleBuilder(pctx PackageContext, ctx BuilderContext) *RuleBuilder { |
| return &RuleBuilder{ |
| pctx: pctx, |
| ctx: ctx, |
| temporariesSet: make(map[WritablePath]bool), |
| sboxOutSubDir: sboxOutSubDir, |
| } |
| } |
| |
| // SetSboxOutDirDirAsEmpty sets the out subdirectory to an empty string |
| // This is useful for sandboxing actions that change the execution root to a path in out/ (e.g mixed builds) |
| // For such actions, SetSboxOutDirDirAsEmpty ensures that the path does not become $SBOX_SANDBOX_DIR/out/out/bazel/output/execroot/__main__/... |
| func (rb *RuleBuilder) SetSboxOutDirDirAsEmpty() *RuleBuilder { |
| rb.sboxOutSubDir = "" |
| return rb |
| } |
| |
| // RuleBuilderInstall is a tuple of install from and to locations. |
| type RuleBuilderInstall struct { |
| From Path |
| To string |
| } |
| |
| type RuleBuilderInstalls []RuleBuilderInstall |
| |
| // String returns the RuleBuilderInstalls in the form used by $(call copy-many-files) in Make, a space separated |
| // list of from:to tuples. |
| func (installs RuleBuilderInstalls) String() string { |
| sb := strings.Builder{} |
| for i, install := range installs { |
| if i != 0 { |
| sb.WriteRune(' ') |
| } |
| sb.WriteString(install.From.String()) |
| sb.WriteRune(':') |
| sb.WriteString(install.To) |
| } |
| return sb.String() |
| } |
| |
| // MissingDeps adds modules to the list of missing dependencies. If MissingDeps |
| // is called with a non-empty input, any call to Build will result in a rule |
| // that will print an error listing the missing dependencies and fail. |
| // MissingDeps should only be called if Config.AllowMissingDependencies() is |
| // true. |
| func (r *RuleBuilder) MissingDeps(missingDeps []string) { |
| r.missingDeps = append(r.missingDeps, missingDeps...) |
| } |
| |
| // Restat marks the rule as a restat rule, which will be passed to ModuleContext.Rule in BuildParams.Restat. |
| func (r *RuleBuilder) Restat() *RuleBuilder { |
| r.restat = true |
| return r |
| } |
| |
| // HighMem marks the rule as a high memory rule, which will limit how many run in parallel with other high memory |
| // rules. |
| func (r *RuleBuilder) HighMem() *RuleBuilder { |
| r.highmem = true |
| return r |
| } |
| |
| // Remoteable marks the rule as supporting remote execution. |
| func (r *RuleBuilder) Remoteable(supports RemoteRuleSupports) *RuleBuilder { |
| r.remoteable = supports |
| return r |
| } |
| |
| // Rewrapper marks the rule as running inside rewrapper using the given params in order to support |
| // running on RBE. During RuleBuilder.Build the params will be combined with the inputs, outputs |
| // and tools known to RuleBuilder to prepend an appropriate rewrapper command line to the rule's |
| // command line. |
| func (r *RuleBuilder) Rewrapper(params *remoteexec.REParams) *RuleBuilder { |
| if !r.sboxInputs { |
| panic(fmt.Errorf("RuleBuilder.Rewrapper must be called after RuleBuilder.SandboxInputs")) |
| } |
| r.rbeParams = params |
| return r |
| } |
| |
| // Sbox marks the rule as needing to be wrapped by sbox. The outputDir should point to the output |
| // directory that sbox will wipe. It should not be written to by any other rule. manifestPath should |
| // point to a location where sbox's manifest will be written and must be outside outputDir. sbox |
| // will ensure that all outputs have been written, and will discard any output files that were not |
| // specified. |
| func (r *RuleBuilder) Sbox(outputDir WritablePath, manifestPath WritablePath) *RuleBuilder { |
| if r.sbox { |
| panic("Sbox() may not be called more than once") |
| } |
| if len(r.commands) > 0 { |
| panic("Sbox() may not be called after Command()") |
| } |
| r.sbox = true |
| r.outDir = outputDir |
| r.sboxManifestPath = manifestPath |
| return r |
| } |
| |
| // SandboxTools enables tool sandboxing for the rule by copying any referenced tools into the |
| // sandbox. |
| func (r *RuleBuilder) SandboxTools() *RuleBuilder { |
| if !r.sbox { |
| panic("SandboxTools() must be called after Sbox()") |
| } |
| if len(r.commands) > 0 { |
| panic("SandboxTools() may not be called after Command()") |
| } |
| r.sboxTools = true |
| return r |
| } |
| |
| // SandboxInputs enables input sandboxing for the rule by copying any referenced inputs into the |
| // sandbox. It also implies SandboxTools(). |
| // |
| // Sandboxing inputs requires RuleBuilder to be aware of all references to input paths. Paths |
| // that are passed to RuleBuilder outside of the methods that expect inputs, for example |
| // FlagWithArg, must use RuleBuilderCommand.PathForInput to translate the path to one that matches |
| // the sandbox layout. |
| func (r *RuleBuilder) SandboxInputs() *RuleBuilder { |
| if !r.sbox { |
| panic("SandboxInputs() must be called after Sbox()") |
| } |
| if len(r.commands) > 0 { |
| panic("SandboxInputs() may not be called after Command()") |
| } |
| r.sboxTools = true |
| r.sboxInputs = true |
| return r |
| } |
| |
| // Install associates an output of the rule with an install location, which can be retrieved later using |
| // RuleBuilder.Installs. |
| func (r *RuleBuilder) Install(from Path, to string) { |
| r.installs = append(r.installs, RuleBuilderInstall{from, to}) |
| } |
| |
| // Command returns a new RuleBuilderCommand for the rule. The commands will be ordered in the rule by when they were |
| // created by this method. That can be mutated through their methods in any order, as long as the mutations do not |
| // race with any call to Build. |
| func (r *RuleBuilder) Command() *RuleBuilderCommand { |
| command := &RuleBuilderCommand{ |
| rule: r, |
| } |
| r.commands = append(r.commands, command) |
| return command |
| } |
| |
| // Temporary marks an output of a command as an intermediate file that will be used as an input to another command |
| // in the same rule, and should not be listed in Outputs. |
| func (r *RuleBuilder) Temporary(path WritablePath) { |
| r.temporariesSet[path] = true |
| } |
| |
| // DeleteTemporaryFiles adds a command to the rule that deletes any outputs that have been marked using Temporary |
| // when the rule runs. DeleteTemporaryFiles should be called after all calls to Temporary. |
| func (r *RuleBuilder) DeleteTemporaryFiles() { |
| var temporariesList WritablePaths |
| |
| for intermediate := range r.temporariesSet { |
| temporariesList = append(temporariesList, intermediate) |
| } |
| |
| sort.Slice(temporariesList, func(i, j int) bool { |
| return temporariesList[i].String() < temporariesList[j].String() |
| }) |
| |
| r.Command().Text("rm").Flag("-f").Outputs(temporariesList) |
| } |
| |
| // Inputs returns the list of paths that were passed to the RuleBuilderCommand methods that take |
| // input paths, such as RuleBuilderCommand.Input, RuleBuilderCommand.Implicit, or |
| // RuleBuilderCommand.FlagWithInput. Inputs to a command that are also outputs of another command |
| // in the same RuleBuilder are filtered out. The list is sorted and duplicates removed. |
| func (r *RuleBuilder) Inputs() Paths { |
| outputs := r.outputSet() |
| depFiles := r.depFileSet() |
| |
| inputs := make(map[string]Path) |
| for _, c := range r.commands { |
| for _, input := range append(c.inputs, c.implicits...) { |
| inputStr := input.String() |
| if _, isOutput := outputs[inputStr]; !isOutput { |
| if _, isDepFile := depFiles[inputStr]; !isDepFile { |
| inputs[input.String()] = input |
| } |
| } |
| } |
| } |
| |
| var inputList Paths |
| for _, input := range inputs { |
| inputList = append(inputList, input) |
| } |
| |
| sort.Slice(inputList, func(i, j int) bool { |
| return inputList[i].String() < inputList[j].String() |
| }) |
| |
| return inputList |
| } |
| |
| // OrderOnlys returns the list of paths that were passed to the RuleBuilderCommand.OrderOnly or |
| // RuleBuilderCommand.OrderOnlys. The list is sorted and duplicates removed. |
| func (r *RuleBuilder) OrderOnlys() Paths { |
| orderOnlys := make(map[string]Path) |
| for _, c := range r.commands { |
| for _, orderOnly := range c.orderOnlys { |
| orderOnlys[orderOnly.String()] = orderOnly |
| } |
| } |
| |
| var orderOnlyList Paths |
| for _, orderOnly := range orderOnlys { |
| orderOnlyList = append(orderOnlyList, orderOnly) |
| } |
| |
| sort.Slice(orderOnlyList, func(i, j int) bool { |
| return orderOnlyList[i].String() < orderOnlyList[j].String() |
| }) |
| |
| return orderOnlyList |
| } |
| |
| // Validations returns the list of paths that were passed to RuleBuilderCommand.Validation or |
| // RuleBuilderCommand.Validations. The list is sorted and duplicates removed. |
| func (r *RuleBuilder) Validations() Paths { |
| validations := make(map[string]Path) |
| for _, c := range r.commands { |
| for _, validation := range c.validations { |
| validations[validation.String()] = validation |
| } |
| } |
| |
| var validationList Paths |
| for _, validation := range validations { |
| validationList = append(validationList, validation) |
| } |
| |
| sort.Slice(validationList, func(i, j int) bool { |
| return validationList[i].String() < validationList[j].String() |
| }) |
| |
| return validationList |
| } |
| |
| func (r *RuleBuilder) outputSet() map[string]WritablePath { |
| outputs := make(map[string]WritablePath) |
| for _, c := range r.commands { |
| for _, output := range c.outputs { |
| outputs[output.String()] = output |
| } |
| } |
| return outputs |
| } |
| |
| // Outputs returns the list of paths that were passed to the RuleBuilderCommand methods that take |
| // output paths, such as RuleBuilderCommand.Output, RuleBuilderCommand.ImplicitOutput, or |
| // RuleBuilderCommand.FlagWithInput. The list is sorted and duplicates removed. |
| func (r *RuleBuilder) Outputs() WritablePaths { |
| outputs := r.outputSet() |
| |
| var outputList WritablePaths |
| for _, output := range outputs { |
| if !r.temporariesSet[output] { |
| outputList = append(outputList, output) |
| } |
| } |
| |
| sort.Slice(outputList, func(i, j int) bool { |
| return outputList[i].String() < outputList[j].String() |
| }) |
| |
| return outputList |
| } |
| |
| func (r *RuleBuilder) symlinkOutputSet() map[string]WritablePath { |
| symlinkOutputs := make(map[string]WritablePath) |
| for _, c := range r.commands { |
| for _, symlinkOutput := range c.symlinkOutputs { |
| symlinkOutputs[symlinkOutput.String()] = symlinkOutput |
| } |
| } |
| return symlinkOutputs |
| } |
| |
| // SymlinkOutputs returns the list of paths that the executor (Ninja) would |
| // verify, after build edge completion, that: |
| // |
| // 1) Created output symlinks match the list of paths in this list exactly (no more, no fewer) |
| // 2) Created output files are *not* declared in this list. |
| // |
| // These symlink outputs are expected to be a subset of outputs or implicit |
| // outputs, or they would fail validation at build param construction time |
| // later, to support other non-rule-builder approaches for constructing |
| // statements. |
| func (r *RuleBuilder) SymlinkOutputs() WritablePaths { |
| symlinkOutputs := r.symlinkOutputSet() |
| |
| var symlinkOutputList WritablePaths |
| for _, symlinkOutput := range symlinkOutputs { |
| symlinkOutputList = append(symlinkOutputList, symlinkOutput) |
| } |
| |
| sort.Slice(symlinkOutputList, func(i, j int) bool { |
| return symlinkOutputList[i].String() < symlinkOutputList[j].String() |
| }) |
| |
| return symlinkOutputList |
| } |
| |
| func (r *RuleBuilder) depFileSet() map[string]WritablePath { |
| depFiles := make(map[string]WritablePath) |
| for _, c := range r.commands { |
| for _, depFile := range c.depFiles { |
| depFiles[depFile.String()] = depFile |
| } |
| } |
| return depFiles |
| } |
| |
| // DepFiles returns the list of paths that were passed to the RuleBuilderCommand methods that take depfile paths, such |
| // as RuleBuilderCommand.DepFile or RuleBuilderCommand.FlagWithDepFile. |
| func (r *RuleBuilder) DepFiles() WritablePaths { |
| var depFiles WritablePaths |
| |
| for _, c := range r.commands { |
| for _, depFile := range c.depFiles { |
| depFiles = append(depFiles, depFile) |
| } |
| } |
| |
| return depFiles |
| } |
| |
| // Installs returns the list of tuples passed to Install. |
| func (r *RuleBuilder) Installs() RuleBuilderInstalls { |
| return append(RuleBuilderInstalls(nil), r.installs...) |
| } |
| |
| func (r *RuleBuilder) toolsSet() map[string]Path { |
| tools := make(map[string]Path) |
| for _, c := range r.commands { |
| for _, tool := range c.tools { |
| tools[tool.String()] = tool |
| } |
| } |
| |
| return tools |
| } |
| |
| // Tools returns the list of paths that were passed to the RuleBuilderCommand.Tool method. The |
| // list is sorted and duplicates removed. |
| func (r *RuleBuilder) Tools() Paths { |
| toolsSet := r.toolsSet() |
| |
| var toolsList Paths |
| for _, tool := range toolsSet { |
| toolsList = append(toolsList, tool) |
| } |
| |
| sort.Slice(toolsList, func(i, j int) bool { |
| return toolsList[i].String() < toolsList[j].String() |
| }) |
| |
| return toolsList |
| } |
| |
| // RspFileInputs returns the list of paths that were passed to the RuleBuilderCommand.FlagWithRspFileInputList method. |
| func (r *RuleBuilder) RspFileInputs() Paths { |
| var rspFileInputs Paths |
| for _, c := range r.commands { |
| for _, rspFile := range c.rspFiles { |
| rspFileInputs = append(rspFileInputs, rspFile.paths...) |
| } |
| } |
| |
| return rspFileInputs |
| } |
| |
| func (r *RuleBuilder) rspFiles() []rspFileAndPaths { |
| var rspFiles []rspFileAndPaths |
| for _, c := range r.commands { |
| rspFiles = append(rspFiles, c.rspFiles...) |
| } |
| |
| return rspFiles |
| } |
| |
| // Commands returns a slice containing the built command line for each call to RuleBuilder.Command. |
| func (r *RuleBuilder) Commands() []string { |
| var commands []string |
| for _, c := range r.commands { |
| commands = append(commands, c.String()) |
| } |
| return commands |
| } |
| |
| // BuilderContext is a subset of ModuleContext and SingletonContext. |
| type BuilderContext interface { |
| PathContext |
| Rule(PackageContext, string, blueprint.RuleParams, ...string) blueprint.Rule |
| Build(PackageContext, BuildParams) |
| } |
| |
| var _ BuilderContext = ModuleContext(nil) |
| var _ BuilderContext = SingletonContext(nil) |
| |
| func (r *RuleBuilder) depFileMergerCmd(depFiles WritablePaths) *RuleBuilderCommand { |
| return r.Command(). |
| builtToolWithoutDeps("dep_fixer"). |
| Inputs(depFiles.Paths()) |
| } |
| |
| // BuildWithNinjaVars adds the built command line to the build graph, with dependencies on Inputs and Tools, and output files for |
| // Outputs. This function will not escape Ninja variables, so it may be used to write sandbox manifests using Ninja variables. |
| func (r *RuleBuilder) BuildWithUnescapedNinjaVars(name string, desc string) { |
| r.build(name, desc, false) |
| } |
| |
| // Build adds the built command line to the build graph, with dependencies on Inputs and Tools, and output files for |
| // Outputs. |
| func (r *RuleBuilder) Build(name string, desc string) { |
| r.build(name, desc, true) |
| } |
| |
| func (r *RuleBuilder) build(name string, desc string, ninjaEscapeCommandString bool) { |
| name = ninjaNameEscape(name) |
| |
| if len(r.missingDeps) > 0 { |
| r.ctx.Build(r.pctx, BuildParams{ |
| Rule: ErrorRule, |
| Outputs: r.Outputs(), |
| Description: desc, |
| Args: map[string]string{ |
| "error": "missing dependencies: " + strings.Join(r.missingDeps, ", "), |
| }, |
| }) |
| return |
| } |
| |
| var depFile WritablePath |
| var depFormat blueprint.Deps |
| if depFiles := r.DepFiles(); len(depFiles) > 0 { |
| depFile = depFiles[0] |
| depFormat = blueprint.DepsGCC |
| if len(depFiles) > 1 { |
| // Add a command locally that merges all depfiles together into the first depfile. |
| r.depFileMergerCmd(depFiles) |
| |
| if r.sbox { |
| // Check for Rel() errors, as all depfiles should be in the output dir. Errors |
| // will be reported to the ctx. |
| for _, path := range depFiles[1:] { |
| Rel(r.ctx, r.outDir.String(), path.String()) |
| } |
| } |
| } |
| } |
| |
| tools := r.Tools() |
| commands := r.Commands() |
| outputs := r.Outputs() |
| inputs := r.Inputs() |
| rspFiles := r.rspFiles() |
| |
| if len(commands) == 0 { |
| return |
| } |
| if len(outputs) == 0 { |
| panic("No outputs specified from any Commands") |
| } |
| |
| commandString := strings.Join(commands, " && ") |
| |
| if r.sbox { |
| // If running the command inside sbox, write the rule data out to an sbox |
| // manifest.textproto. |
| manifest := sbox_proto.Manifest{} |
| command := sbox_proto.Command{} |
| manifest.Commands = append(manifest.Commands, &command) |
| command.Command = proto.String(commandString) |
| |
| if depFile != nil { |
| manifest.OutputDepfile = proto.String(depFile.String()) |
| } |
| |
| // If sandboxing tools is enabled, add copy rules to the manifest to copy each tool |
| // into the sbox directory. |
| if r.sboxTools { |
| for _, tool := range tools { |
| command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ |
| From: proto.String(tool.String()), |
| To: proto.String(sboxPathForToolRel(r.ctx, tool)), |
| }) |
| } |
| for _, c := range r.commands { |
| for _, tool := range c.packagedTools { |
| command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ |
| From: proto.String(tool.srcPath.String()), |
| To: proto.String(sboxPathForPackagedToolRel(tool)), |
| Executable: proto.Bool(tool.executable), |
| }) |
| tools = append(tools, tool.srcPath) |
| } |
| } |
| } |
| |
| // If sandboxing inputs is enabled, add copy rules to the manifest to copy each input |
| // into the sbox directory. |
| if r.sboxInputs { |
| for _, input := range inputs { |
| command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ |
| From: proto.String(input.String()), |
| To: proto.String(r.sboxPathForInputRel(input)), |
| }) |
| } |
| |
| // If using rsp files copy them and their contents into the sbox directory with |
| // the appropriate path mappings. |
| for _, rspFile := range rspFiles { |
| command.RspFiles = append(command.RspFiles, &sbox_proto.RspFile{ |
| File: proto.String(rspFile.file.String()), |
| // These have to match the logic in sboxPathForInputRel |
| PathMappings: []*sbox_proto.PathMapping{ |
| { |
| From: proto.String(r.outDir.String()), |
| To: proto.String(sboxOutSubDir), |
| }, |
| { |
| From: proto.String(PathForOutput(r.ctx).String()), |
| To: proto.String(sboxOutSubDir), |
| }, |
| }, |
| }) |
| } |
| |
| command.Chdir = proto.Bool(true) |
| } |
| |
| // Add copy rules to the manifest to copy each output file from the sbox directory. |
| // to the output directory after running the commands. |
| for _, output := range outputs { |
| rel := Rel(r.ctx, r.outDir.String(), output.String()) |
| command.CopyAfter = append(command.CopyAfter, &sbox_proto.Copy{ |
| From: proto.String(filepath.Join(r.sboxOutSubDir, rel)), |
| To: proto.String(output.String()), |
| }) |
| } |
| |
| // Outputs that were marked Temporary will not be checked that they are in the output |
| // directory by the loop above, check them here. |
| for path := range r.temporariesSet { |
| Rel(r.ctx, r.outDir.String(), path.String()) |
| } |
| |
| // Add a hash of the list of input files to the manifest so that the textproto file |
| // changes when the list of input files changes and causes the sbox rule that |
| // depends on it to rerun. |
| command.InputHash = proto.String(hashSrcFiles(inputs)) |
| |
| // Verify that the manifest textproto is not inside the sbox output directory, otherwise |
| // it will get deleted when the sbox rule clears its output directory. |
| _, manifestInOutDir := MaybeRel(r.ctx, r.outDir.String(), r.sboxManifestPath.String()) |
| if manifestInOutDir { |
| ReportPathErrorf(r.ctx, "sbox rule %q manifestPath %q must not be in outputDir %q", |
| name, r.sboxManifestPath.String(), r.outDir.String()) |
| } |
| |
| // Create a rule to write the manifest as textproto. |
| pbText, err := prototext.Marshal(&manifest) |
| if err != nil { |
| ReportPathErrorf(r.ctx, "sbox manifest failed to marshal: %q", err) |
| } |
| if ninjaEscapeCommandString { |
| WriteFileRule(r.ctx, r.sboxManifestPath, string(pbText)) |
| } else { |
| // We need to have a rule to write files that is |
| // defined on the RuleBuilder's pctx in order to |
| // write Ninja variables in the string. |
| // The WriteFileRule function above rule can only write |
| // raw strings because it is defined on the android |
| // package's pctx, and it can't access variables defined |
| // in another context. |
| r.ctx.Build(r.pctx, BuildParams{ |
| Rule: r.ctx.Rule(r.pctx, "unescapedWriteFile", blueprint.RuleParams{ |
| Command: `rm -rf ${out} && cat ${out}.rsp > ${out}`, |
| Rspfile: "${out}.rsp", |
| RspfileContent: "${content}", |
| Description: "write file", |
| }, "content"), |
| Output: r.sboxManifestPath, |
| Description: "write sbox manifest " + r.sboxManifestPath.Base(), |
| Args: map[string]string{ |
| "content": string(pbText), |
| }, |
| }) |
| } |
| |
| // Generate a new string to use as the command line of the sbox rule. This uses |
| // a RuleBuilderCommand as a convenience method of building the command line, then |
| // converts it to a string to replace commandString. |
| sboxCmd := &RuleBuilderCommand{ |
| rule: &RuleBuilder{ |
| ctx: r.ctx, |
| }, |
| } |
| sboxCmd.builtToolWithoutDeps("sbox"). |
| FlagWithArg("--sandbox-path ", shared.TempDirForOutDir(PathForOutput(r.ctx).String())). |
| FlagWithArg("--output-dir ", r.outDir.String()). |
| FlagWithInput("--manifest ", r.sboxManifestPath) |
| |
| if r.restat { |
| sboxCmd.Flag("--write-if-changed") |
| } |
| |
| // Replace the command string, and add the sbox tool and manifest textproto to the |
| // dependencies of the final sbox rule. |
| commandString = sboxCmd.buf.String() |
| tools = append(tools, sboxCmd.tools...) |
| inputs = append(inputs, sboxCmd.inputs...) |
| |
| if r.rbeParams != nil { |
| // RBE needs a list of input files to copy to the remote builder. For inputs already |
| // listed in an rsp file, pass the rsp file directly to rewrapper. For the rest, |
| // create a new rsp file to pass to rewrapper. |
| var remoteRspFiles Paths |
| var remoteInputs Paths |
| |
| remoteInputs = append(remoteInputs, inputs...) |
| remoteInputs = append(remoteInputs, tools...) |
| |
| for _, rspFile := range rspFiles { |
| remoteInputs = append(remoteInputs, rspFile.file) |
| remoteRspFiles = append(remoteRspFiles, rspFile.file) |
| } |
| |
| if len(remoteInputs) > 0 { |
| inputsListFile := r.sboxManifestPath.ReplaceExtension(r.ctx, "rbe_inputs.list") |
| writeRspFileRule(r.ctx, inputsListFile, remoteInputs) |
| remoteRspFiles = append(remoteRspFiles, inputsListFile) |
| // Add the new rsp file as an extra input to the rule. |
| inputs = append(inputs, inputsListFile) |
| } |
| |
| r.rbeParams.OutputFiles = outputs.Strings() |
| r.rbeParams.RSPFiles = remoteRspFiles.Strings() |
| rewrapperCommand := r.rbeParams.NoVarTemplate(r.ctx.Config().RBEWrapper()) |
| commandString = rewrapperCommand + " bash -c '" + strings.ReplaceAll(commandString, `'`, `'\''`) + "'" |
| } |
| } else { |
| // If not using sbox the rule will run the command directly, put the hash of the |
| // list of input files in a comment at the end of the command line to ensure ninja |
| // reruns the rule when the list of input files changes. |
| commandString += " # hash of input list: " + hashSrcFiles(inputs) |
| } |
| |
| // Ninja doesn't like multiple outputs when depfiles are enabled, move all but the first output to |
| // ImplicitOutputs. RuleBuilder doesn't use "$out", so the distinction between Outputs and |
| // ImplicitOutputs doesn't matter. |
| output := outputs[0] |
| implicitOutputs := outputs[1:] |
| |
| var rspFile, rspFileContent string |
| var rspFileInputs Paths |
| if len(rspFiles) > 0 { |
| // The first rsp files uses Ninja's rsp file support for the rule |
| rspFile = rspFiles[0].file.String() |
| // Use "$in" for rspFileContent to avoid duplicating the list of files in the dependency |
| // list and in the contents of the rsp file. Inputs to the rule that are not in the |
| // rsp file will be listed in Implicits instead of Inputs so they don't show up in "$in". |
| rspFileContent = "$in" |
| rspFileInputs = append(rspFileInputs, rspFiles[0].paths...) |
| |
| for _, rspFile := range rspFiles[1:] { |
| // Any additional rsp files need an extra rule to write the file. |
| writeRspFileRule(r.ctx, rspFile.file, rspFile.paths) |
| // The main rule needs to depend on the inputs listed in the extra rsp file. |
| inputs = append(inputs, rspFile.paths...) |
| // The main rule needs to depend on the extra rsp file. |
| inputs = append(inputs, rspFile.file) |
| } |
| } |
| |
| var pool blueprint.Pool |
| if r.ctx.Config().UseGoma() && r.remoteable.Goma { |
| // When USE_GOMA=true is set and the rule is supported by goma, allow jobs to run outside the local pool. |
| } else if r.ctx.Config().UseRBE() && r.remoteable.RBE { |
| // When USE_RBE=true is set and the rule is supported by RBE, use the remotePool. |
| pool = remotePool |
| } else if r.highmem { |
| pool = highmemPool |
| } else if r.ctx.Config().UseRemoteBuild() { |
| pool = localPool |
| } |
| |
| if ninjaEscapeCommandString { |
| commandString = proptools.NinjaEscape(commandString) |
| } |
| |
| r.ctx.Build(r.pctx, BuildParams{ |
| Rule: r.ctx.Rule(r.pctx, name, blueprint.RuleParams{ |
| Command: commandString, |
| CommandDeps: proptools.NinjaEscapeList(tools.Strings()), |
| Restat: r.restat, |
| Rspfile: proptools.NinjaEscape(rspFile), |
| RspfileContent: rspFileContent, |
| Pool: pool, |
| }), |
| Inputs: rspFileInputs, |
| Implicits: inputs, |
| OrderOnly: r.OrderOnlys(), |
| Validations: r.Validations(), |
| Output: output, |
| ImplicitOutputs: implicitOutputs, |
| SymlinkOutputs: r.SymlinkOutputs(), |
| Depfile: depFile, |
| Deps: depFormat, |
| Description: desc, |
| }) |
| } |
| |
| // RuleBuilderCommand is a builder for a command in a command line. It can be mutated by its methods to add to the |
| // command and track dependencies. The methods mutate the RuleBuilderCommand in place, as well as return the |
| // RuleBuilderCommand, so they can be used chained or unchained. All methods that add text implicitly add a single |
| // space as a separator from the previous method. |
| type RuleBuilderCommand struct { |
| rule *RuleBuilder |
| |
| buf strings.Builder |
| inputs Paths |
| implicits Paths |
| orderOnlys Paths |
| validations Paths |
| outputs WritablePaths |
| symlinkOutputs WritablePaths |
| depFiles WritablePaths |
| tools Paths |
| packagedTools []PackagingSpec |
| rspFiles []rspFileAndPaths |
| } |
| |
| type rspFileAndPaths struct { |
| file WritablePath |
| paths Paths |
| } |
| |
| func checkPathNotNil(path Path) { |
| if path == nil { |
| panic("rule_builder paths cannot be nil") |
| } |
| } |
| |
| func (c *RuleBuilderCommand) addInput(path Path) string { |
| checkPathNotNil(path) |
| c.inputs = append(c.inputs, path) |
| return c.PathForInput(path) |
| } |
| |
| func (c *RuleBuilderCommand) addImplicit(path Path) { |
| checkPathNotNil(path) |
| c.implicits = append(c.implicits, path) |
| } |
| |
| func (c *RuleBuilderCommand) addOrderOnly(path Path) { |
| checkPathNotNil(path) |
| c.orderOnlys = append(c.orderOnlys, path) |
| } |
| |
| // PathForInput takes an input path and returns the appropriate path to use on the command line. If |
| // sbox was enabled via a call to RuleBuilder.Sbox() and the path was an output path it returns a |
| // path with the placeholder prefix used for outputs in sbox. If sbox is not enabled it returns the |
| // original path. |
| func (c *RuleBuilderCommand) PathForInput(path Path) string { |
| if c.rule.sbox { |
| rel, inSandbox := c.rule._sboxPathForInputRel(path) |
| if inSandbox { |
| rel = filepath.Join(sboxSandboxBaseDir, rel) |
| } |
| return rel |
| } |
| return path.String() |
| } |
| |
| // PathsForInputs takes a list of input paths and returns the appropriate paths to use on the |
| // command line. If sbox was enabled via a call to RuleBuilder.Sbox() a path was an output path, it |
| // returns the path with the placeholder prefix used for outputs in sbox. If sbox is not enabled it |
| // returns the original paths. |
| func (c *RuleBuilderCommand) PathsForInputs(paths Paths) []string { |
| ret := make([]string, len(paths)) |
| for i, path := range paths { |
| ret[i] = c.PathForInput(path) |
| } |
| return ret |
| } |
| |
| // PathForOutput takes an output path and returns the appropriate path to use on the command |
| // line. If sbox was enabled via a call to RuleBuilder.Sbox(), it returns a path with the |
| // placeholder prefix used for outputs in sbox. If sbox is not enabled it returns the |
| // original path. |
| func (c *RuleBuilderCommand) PathForOutput(path WritablePath) string { |
| if c.rule.sbox { |
| // Errors will be handled in RuleBuilder.Build where we have a context to report them |
| rel, _, _ := maybeRelErr(c.rule.outDir.String(), path.String()) |
| return filepath.Join(sboxOutDir, rel) |
| } |
| return path.String() |
| } |
| |
| func sboxPathForToolRel(ctx BuilderContext, path Path) string { |
| // Errors will be handled in RuleBuilder.Build where we have a context to report them |
| toolDir := pathForInstall(ctx, ctx.Config().BuildOS, ctx.Config().BuildArch, "") |
| relOutSoong, isRelOutSoong, _ := maybeRelErr(toolDir.String(), path.String()) |
| if isRelOutSoong { |
| // The tool is in the Soong output directory, it will be copied to __SBOX_OUT_DIR__/tools/out |
| return filepath.Join(sboxToolsSubDir, "out", relOutSoong) |
| } |
| // The tool is in the source directory, it will be copied to __SBOX_OUT_DIR__/tools/src |
| return filepath.Join(sboxToolsSubDir, "src", path.String()) |
| } |
| |
| func (r *RuleBuilder) _sboxPathForInputRel(path Path) (rel string, inSandbox bool) { |
| // Errors will be handled in RuleBuilder.Build where we have a context to report them |
| rel, isRelSboxOut, _ := maybeRelErr(r.outDir.String(), path.String()) |
| if isRelSboxOut { |
| return filepath.Join(sboxOutSubDir, rel), true |
| } |
| if r.sboxInputs { |
| // When sandboxing inputs all inputs have to be copied into the sandbox. Input files that |
| // are outputs of other rules could be an arbitrary absolute path if OUT_DIR is set, so they |
| // will be copied to relative paths under __SBOX_OUT_DIR__/out. |
| rel, isRelOut, _ := maybeRelErr(PathForOutput(r.ctx).String(), path.String()) |
| if isRelOut { |
| return filepath.Join(sboxOutSubDir, rel), true |
| } |
| } |
| return path.String(), false |
| } |
| |
| func (r *RuleBuilder) sboxPathForInputRel(path Path) string { |
| rel, _ := r._sboxPathForInputRel(path) |
| return rel |
| } |
| |
| func (r *RuleBuilder) sboxPathsForInputsRel(paths Paths) []string { |
| ret := make([]string, len(paths)) |
| for i, path := range paths { |
| ret[i] = r.sboxPathForInputRel(path) |
| } |
| return ret |
| } |
| |
| func sboxPathForPackagedToolRel(spec PackagingSpec) string { |
| return filepath.Join(sboxToolsSubDir, "out", spec.relPathInPackage) |
| } |
| |
| // PathForPackagedTool takes a PackageSpec for a tool and returns the corresponding path for the |
| // tool after copying it into the sandbox. This can be used on the RuleBuilder command line to |
| // reference the tool. |
| func (c *RuleBuilderCommand) PathForPackagedTool(spec PackagingSpec) string { |
| if !c.rule.sboxTools { |
| panic("PathForPackagedTool() requires SandboxTools()") |
| } |
| |
| return filepath.Join(sboxSandboxBaseDir, sboxPathForPackagedToolRel(spec)) |
| } |
| |
| // PathForTool takes a path to a tool, which may be an output file or a source file, and returns |
| // the corresponding path for the tool in the sbox sandbox if sbox is enabled, or the original path |
| // if it is not. This can be used on the RuleBuilder command line to reference the tool. |
| func (c *RuleBuilderCommand) PathForTool(path Path) string { |
| if c.rule.sbox && c.rule.sboxTools { |
| return filepath.Join(sboxSandboxBaseDir, sboxPathForToolRel(c.rule.ctx, path)) |
| } |
| return path.String() |
| } |
| |
| // PathsForTools takes a list of paths to tools, which may be output files or source files, and |
| // returns the corresponding paths for the tools in the sbox sandbox if sbox is enabled, or the |
| // original paths if it is not. This can be used on the RuleBuilder command line to reference the tool. |
| func (c *RuleBuilderCommand) PathsForTools(paths Paths) []string { |
| if c.rule.sbox && c.rule.sboxTools { |
| var ret []string |
| for _, path := range paths { |
| ret = append(ret, filepath.Join(sboxSandboxBaseDir, sboxPathForToolRel(c.rule.ctx, path))) |
| } |
| return ret |
| } |
| return paths.Strings() |
| } |
| |
| // PackagedTool adds the specified tool path to the command line. It can only be used with tool |
| // sandboxing enabled by SandboxTools(), and will copy the tool into the sandbox. |
| func (c *RuleBuilderCommand) PackagedTool(spec PackagingSpec) *RuleBuilderCommand { |
| if !c.rule.sboxTools { |
| panic("PackagedTool() requires SandboxTools()") |
| } |
| |
| c.packagedTools = append(c.packagedTools, spec) |
| c.Text(sboxPathForPackagedToolRel(spec)) |
| return c |
| } |
| |
| // ImplicitPackagedTool copies the specified tool into the sandbox without modifying the command |
| // line. It can only be used with tool sandboxing enabled by SandboxTools(). |
| func (c *RuleBuilderCommand) ImplicitPackagedTool(spec PackagingSpec) *RuleBuilderCommand { |
| if !c.rule.sboxTools { |
| panic("ImplicitPackagedTool() requires SandboxTools()") |
| } |
| |
| c.packagedTools = append(c.packagedTools, spec) |
| return c |
| } |
| |
| // ImplicitPackagedTools copies the specified tools into the sandbox without modifying the command |
| // line. It can only be used with tool sandboxing enabled by SandboxTools(). |
| func (c *RuleBuilderCommand) ImplicitPackagedTools(specs []PackagingSpec) *RuleBuilderCommand { |
| if !c.rule.sboxTools { |
| panic("ImplicitPackagedTools() requires SandboxTools()") |
| } |
| |
| c.packagedTools = append(c.packagedTools, specs...) |
| return c |
| } |
| |
| // Text adds the specified raw text to the command line. The text should not contain input or output paths or the |
| // rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) Text(text string) *RuleBuilderCommand { |
| if c.buf.Len() > 0 { |
| c.buf.WriteByte(' ') |
| } |
| c.buf.WriteString(text) |
| return c |
| } |
| |
| // Textf adds the specified formatted text to the command line. The text should not contain input or output paths or |
| // the rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) Textf(format string, a ...interface{}) *RuleBuilderCommand { |
| return c.Text(fmt.Sprintf(format, a...)) |
| } |
| |
| // Flag adds the specified raw text to the command line. The text should not contain input or output paths or the |
| // rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) Flag(flag string) *RuleBuilderCommand { |
| return c.Text(flag) |
| } |
| |
| // OptionalFlag adds the specified raw text to the command line if it is not nil. The text should not contain input or |
| // output paths or the rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) OptionalFlag(flag *string) *RuleBuilderCommand { |
| if flag != nil { |
| c.Text(*flag) |
| } |
| |
| return c |
| } |
| |
| // Flags adds the specified raw text to the command line. The text should not contain input or output paths or the |
| // rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) Flags(flags []string) *RuleBuilderCommand { |
| for _, flag := range flags { |
| c.Text(flag) |
| } |
| return c |
| } |
| |
| // FlagWithArg adds the specified flag and argument text to the command line, with no separator between them. The flag |
| // and argument should not contain input or output paths or the rule will not have them listed in its dependencies or |
| // outputs. |
| func (c *RuleBuilderCommand) FlagWithArg(flag, arg string) *RuleBuilderCommand { |
| return c.Text(flag + arg) |
| } |
| |
| // FlagForEachArg adds the specified flag joined with each argument to the command line. The result is identical to |
| // calling FlagWithArg for argument. |
| func (c *RuleBuilderCommand) FlagForEachArg(flag string, args []string) *RuleBuilderCommand { |
| for _, arg := range args { |
| c.FlagWithArg(flag, arg) |
| } |
| return c |
| } |
| |
| // FlagWithList adds the specified flag and list of arguments to the command line, with the arguments joined by sep |
| // and no separator between the flag and arguments. The flag and arguments should not contain input or output paths or |
| // the rule will not have them listed in its dependencies or outputs. |
| func (c *RuleBuilderCommand) FlagWithList(flag string, list []string, sep string) *RuleBuilderCommand { |
| return c.Text(flag + strings.Join(list, sep)) |
| } |
| |
| // Tool adds the specified tool path to the command line. The path will be also added to the dependencies returned by |
| // RuleBuilder.Tools. |
| func (c *RuleBuilderCommand) Tool(path Path) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.tools = append(c.tools, path) |
| return c.Text(c.PathForTool(path)) |
| } |
| |
| // Tool adds the specified tool path to the dependencies returned by RuleBuilder.Tools. |
| func (c *RuleBuilderCommand) ImplicitTool(path Path) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.tools = append(c.tools, path) |
| return c |
| } |
| |
| // Tool adds the specified tool path to the dependencies returned by RuleBuilder.Tools. |
| func (c *RuleBuilderCommand) ImplicitTools(paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.ImplicitTool(path) |
| } |
| return c |
| } |
| |
| // BuiltTool adds the specified tool path that was built using a host Soong module to the command line. The path will |
| // be also added to the dependencies returned by RuleBuilder.Tools. |
| // |
| // It is equivalent to: |
| // |
| // cmd.Tool(ctx.Config().HostToolPath(ctx, tool)) |
| func (c *RuleBuilderCommand) BuiltTool(tool string) *RuleBuilderCommand { |
| if c.rule.ctx.Config().UseHostMusl() { |
| // If the host is using musl, assume that the tool was built against musl libc and include |
| // libc_musl.so in the sandbox. |
| // TODO(ccross): if we supported adding new dependencies during GenerateAndroidBuildActions |
| // this could be a dependency + TransitivePackagingSpecs. |
| c.ImplicitTool(c.rule.ctx.Config().HostJNIToolPath(c.rule.ctx, "libc_musl")) |
| } |
| return c.builtToolWithoutDeps(tool) |
| } |
| |
| // builtToolWithoutDeps is similar to BuiltTool, but doesn't add any dependencies. It is used |
| // internally by RuleBuilder for helper tools that are known to be compiled statically. |
| func (c *RuleBuilderCommand) builtToolWithoutDeps(tool string) *RuleBuilderCommand { |
| return c.Tool(c.rule.ctx.Config().HostToolPath(c.rule.ctx, tool)) |
| } |
| |
| // PrebuiltBuildTool adds the specified tool path from prebuils/build-tools. The path will be also added to the |
| // dependencies returned by RuleBuilder.Tools. |
| // |
| // It is equivalent to: |
| // |
| // cmd.Tool(ctx.Config().PrebuiltBuildTool(ctx, tool)) |
| func (c *RuleBuilderCommand) PrebuiltBuildTool(ctx PathContext, tool string) *RuleBuilderCommand { |
| return c.Tool(ctx.Config().PrebuiltBuildTool(ctx, tool)) |
| } |
| |
| // Input adds the specified input path to the command line. The path will also be added to the dependencies returned by |
| // RuleBuilder.Inputs. |
| func (c *RuleBuilderCommand) Input(path Path) *RuleBuilderCommand { |
| return c.Text(c.addInput(path)) |
| } |
| |
| // Inputs adds the specified input paths to the command line, separated by spaces. The paths will also be added to the |
| // dependencies returned by RuleBuilder.Inputs. |
| func (c *RuleBuilderCommand) Inputs(paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.Input(path) |
| } |
| return c |
| } |
| |
| // Implicit adds the specified input path to the dependencies returned by RuleBuilder.Inputs without modifying the |
| // command line. |
| func (c *RuleBuilderCommand) Implicit(path Path) *RuleBuilderCommand { |
| c.addImplicit(path) |
| return c |
| } |
| |
| // Implicits adds the specified input paths to the dependencies returned by RuleBuilder.Inputs without modifying the |
| // command line. |
| func (c *RuleBuilderCommand) Implicits(paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.addImplicit(path) |
| } |
| return c |
| } |
| |
| // GetImplicits returns the command's implicit inputs. |
| func (c *RuleBuilderCommand) GetImplicits() Paths { |
| return c.implicits |
| } |
| |
| // OrderOnly adds the specified input path to the dependencies returned by RuleBuilder.OrderOnlys |
| // without modifying the command line. |
| func (c *RuleBuilderCommand) OrderOnly(path Path) *RuleBuilderCommand { |
| c.addOrderOnly(path) |
| return c |
| } |
| |
| // OrderOnlys adds the specified input paths to the dependencies returned by RuleBuilder.OrderOnlys |
| // without modifying the command line. |
| func (c *RuleBuilderCommand) OrderOnlys(paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.addOrderOnly(path) |
| } |
| return c |
| } |
| |
| // Validation adds the specified input path to the validation dependencies by |
| // RuleBuilder.Validations without modifying the command line. |
| func (c *RuleBuilderCommand) Validation(path Path) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.validations = append(c.validations, path) |
| return c |
| } |
| |
| // Validations adds the specified input paths to the validation dependencies by |
| // RuleBuilder.Validations without modifying the command line. |
| func (c *RuleBuilderCommand) Validations(paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.Validation(path) |
| } |
| return c |
| } |
| |
| // Output adds the specified output path to the command line. The path will also be added to the outputs returned by |
| // RuleBuilder.Outputs. |
| func (c *RuleBuilderCommand) Output(path WritablePath) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.outputs = append(c.outputs, path) |
| return c.Text(c.PathForOutput(path)) |
| } |
| |
| // Outputs adds the specified output paths to the command line, separated by spaces. The paths will also be added to |
| // the outputs returned by RuleBuilder.Outputs. |
| func (c *RuleBuilderCommand) Outputs(paths WritablePaths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.Output(path) |
| } |
| return c |
| } |
| |
| // OutputDir adds the output directory to the command line. This is only available when used with RuleBuilder.Sbox, |
| // and will be the temporary output directory managed by sbox, not the final one. |
| func (c *RuleBuilderCommand) OutputDir() *RuleBuilderCommand { |
| if !c.rule.sbox { |
| panic("OutputDir only valid with Sbox") |
| } |
| return c.Text(sboxOutDir) |
| } |
| |
| // DepFile adds the specified depfile path to the paths returned by RuleBuilder.DepFiles and adds it to the command |
| // line, and causes RuleBuilder.Build file to set the depfile flag for ninja. If multiple depfiles are added to |
| // commands in a single RuleBuilder then RuleBuilder.Build will add an extra command to merge the depfiles together. |
| func (c *RuleBuilderCommand) DepFile(path WritablePath) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.depFiles = append(c.depFiles, path) |
| return c.Text(c.PathForOutput(path)) |
| } |
| |
| // ImplicitOutput adds the specified output path to the dependencies returned by RuleBuilder.Outputs without modifying |
| // the command line. |
| func (c *RuleBuilderCommand) ImplicitOutput(path WritablePath) *RuleBuilderCommand { |
| c.outputs = append(c.outputs, path) |
| return c |
| } |
| |
| // ImplicitOutputs adds the specified output paths to the dependencies returned by RuleBuilder.Outputs without modifying |
| // the command line. |
| func (c *RuleBuilderCommand) ImplicitOutputs(paths WritablePaths) *RuleBuilderCommand { |
| c.outputs = append(c.outputs, paths...) |
| return c |
| } |
| |
| // ImplicitSymlinkOutput declares the specified path as an implicit output that |
| // will be a symlink instead of a regular file. Does not modify the command |
| // line. |
| func (c *RuleBuilderCommand) ImplicitSymlinkOutput(path WritablePath) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.symlinkOutputs = append(c.symlinkOutputs, path) |
| return c.ImplicitOutput(path) |
| } |
| |
| // ImplicitSymlinkOutputs declares the specified paths as implicit outputs that |
| // will be a symlinks instead of regular files. Does not modify the command |
| // line. |
| func (c *RuleBuilderCommand) ImplicitSymlinkOutputs(paths WritablePaths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.ImplicitSymlinkOutput(path) |
| } |
| return c |
| } |
| |
| // SymlinkOutput declares the specified path as an output that will be a symlink |
| // instead of a regular file. Modifies the command line. |
| func (c *RuleBuilderCommand) SymlinkOutput(path WritablePath) *RuleBuilderCommand { |
| checkPathNotNil(path) |
| c.symlinkOutputs = append(c.symlinkOutputs, path) |
| return c.Output(path) |
| } |
| |
| // SymlinkOutputsl declares the specified paths as outputs that will be symlinks |
| // instead of regular files. Modifies the command line. |
| func (c *RuleBuilderCommand) SymlinkOutputs(paths WritablePaths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.SymlinkOutput(path) |
| } |
| return c |
| } |
| |
| // ImplicitDepFile adds the specified depfile path to the paths returned by RuleBuilder.DepFiles without modifying |
| // the command line, and causes RuleBuilder.Build file to set the depfile flag for ninja. If multiple depfiles |
| // are added to commands in a single RuleBuilder then RuleBuilder.Build will add an extra command to merge the |
| // depfiles together. |
| func (c *RuleBuilderCommand) ImplicitDepFile(path WritablePath) *RuleBuilderCommand { |
| c.depFiles = append(c.depFiles, path) |
| return c |
| } |
| |
| // FlagWithInput adds the specified flag and input path to the command line, with no separator between them. The path |
| // will also be added to the dependencies returned by RuleBuilder.Inputs. |
| func (c *RuleBuilderCommand) FlagWithInput(flag string, path Path) *RuleBuilderCommand { |
| return c.Text(flag + c.addInput(path)) |
| } |
| |
| // FlagWithInputList adds the specified flag and input paths to the command line, with the inputs joined by sep |
| // and no separator between the flag and inputs. The input paths will also be added to the dependencies returned by |
| // RuleBuilder.Inputs. |
| func (c *RuleBuilderCommand) FlagWithInputList(flag string, paths Paths, sep string) *RuleBuilderCommand { |
| strs := make([]string, len(paths)) |
| for i, path := range paths { |
| strs[i] = c.addInput(path) |
| } |
| return c.FlagWithList(flag, strs, sep) |
| } |
| |
| // FlagForEachInput adds the specified flag joined with each input path to the command line. The input paths will also |
| // be added to the dependencies returned by RuleBuilder.Inputs. The result is identical to calling FlagWithInput for |
| // each input path. |
| func (c *RuleBuilderCommand) FlagForEachInput(flag string, paths Paths) *RuleBuilderCommand { |
| for _, path := range paths { |
| c.FlagWithInput(flag, path) |
| } |
| return c |
| } |
| |
| // FlagWithOutput adds the specified flag and output path to the command line, with no separator between them. The path |
| // will also be added to the outputs returned by RuleBuilder.Outputs. |
| func (c *RuleBuilderCommand) FlagWithOutput(flag string, path WritablePath) *RuleBuilderCommand { |
| c.outputs = append(c.outputs, path) |
| return c.Text(flag + c.PathForOutput(path)) |
| } |
| |
| // FlagWithDepFile adds the specified flag and depfile path to the command line, with no separator between them. The path |
| // will also be added to the outputs returned by RuleBuilder.Outputs. |
| func (c *RuleBuilderCommand) FlagWithDepFile(flag string, path WritablePath) *RuleBuilderCommand { |
| c.depFiles = append(c.depFiles, path) |
| return c.Text(flag + c.PathForOutput(path)) |
| } |
| |
| // FlagWithRspFileInputList adds the specified flag and path to an rspfile to the command line, with |
| // no separator between them. The paths will be written to the rspfile. If sbox is enabled, the |
| // rspfile must be outside the sbox directory. The first use of FlagWithRspFileInputList in any |
| // RuleBuilderCommand of a RuleBuilder will use Ninja's rsp file support for the rule, additional |
| // uses will result in an auxiliary rules to write the rspFile contents. |
| func (c *RuleBuilderCommand) FlagWithRspFileInputList(flag string, rspFile WritablePath, paths Paths) *RuleBuilderCommand { |
| // Use an empty slice if paths is nil, the non-nil slice is used as an indicator that the rsp file must be |
| // generated. |
| if paths == nil { |
| paths = Paths{} |
| } |
| |
| c.rspFiles = append(c.rspFiles, rspFileAndPaths{rspFile, paths}) |
| |
| if c.rule.sbox { |
| if _, isRel, _ := maybeRelErr(c.rule.outDir.String(), rspFile.String()); isRel { |
| panic(fmt.Errorf("FlagWithRspFileInputList rspfile %q must not be inside out dir %q", |
| rspFile.String(), c.rule.outDir.String())) |
| } |
| } |
| |
| c.FlagWithArg(flag, c.PathForInput(rspFile)) |
| return c |
| } |
| |
| // String returns the command line. |
| func (c *RuleBuilderCommand) String() string { |
| return c.buf.String() |
| } |
| |
| // RuleBuilderSboxProtoForTests takes the BuildParams for the manifest passed to RuleBuilder.Sbox() |
| // and returns sbox testproto generated by the RuleBuilder. |
| func RuleBuilderSboxProtoForTests(t *testing.T, ctx *TestContext, params TestingBuildParams) *sbox_proto.Manifest { |
| t.Helper() |
| content := ContentFromFileRuleForTests(t, ctx, params) |
| manifest := sbox_proto.Manifest{} |
| err := prototext.Unmarshal([]byte(content), &manifest) |
| if err != nil { |
| t.Fatalf("failed to unmarshal manifest: %s", err.Error()) |
| } |
| return &manifest |
| } |
| |
| func ninjaNameEscape(s string) string { |
| b := []byte(s) |
| escaped := false |
| for i, c := range b { |
| valid := (c >= 'a' && c <= 'z') || |
| (c >= 'A' && c <= 'Z') || |
| (c >= '0' && c <= '9') || |
| (c == '_') || |
| (c == '-') || |
| (c == '.') |
| if !valid { |
| b[i] = '_' |
| escaped = true |
| } |
| } |
| if escaped { |
| s = string(b) |
| } |
| return s |
| } |
| |
| // hashSrcFiles returns a hash of the list of source files. It is used to ensure the command line |
| // or the sbox textproto manifest change even if the input files are not listed on the command line. |
| func hashSrcFiles(srcFiles Paths) string { |
| h := sha256.New() |
| srcFileList := strings.Join(srcFiles.Strings(), "\n") |
| h.Write([]byte(srcFileList)) |
| return fmt.Sprintf("%x", h.Sum(nil)) |
| } |
| |
| // BuilderContextForTesting returns a BuilderContext for the given config that can be used for tests |
| // that need to call methods that take a BuilderContext. |
| func BuilderContextForTesting(config Config) BuilderContext { |
| pathCtx := PathContextForTesting(config) |
| return builderContextForTests{ |
| PathContext: pathCtx, |
| } |
| } |
| |
| type builderContextForTests struct { |
| PathContext |
| } |
| |
| func (builderContextForTests) Rule(PackageContext, string, blueprint.RuleParams, ...string) blueprint.Rule { |
| return nil |
| } |
| func (builderContextForTests) Build(PackageContext, BuildParams) {} |
| |
| func writeRspFileRule(ctx BuilderContext, rspFile WritablePath, paths Paths) { |
| buf := &strings.Builder{} |
| err := response.WriteRspFile(buf, paths.Strings()) |
| if err != nil { |
| // There should never be I/O errors writing to a bytes.Buffer. |
| panic(err) |
| } |
| WriteFileRule(ctx, rspFile, buf.String()) |
| } |