2020-12-10 23:19:18 +01:00
|
|
|
// Copyright 2020 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package bazel
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2020-12-23 18:02:11 +01:00
|
|
|
"fmt"
|
|
|
|
"path/filepath"
|
2021-11-04 23:58:12 +01:00
|
|
|
"regexp"
|
2020-12-10 23:19:18 +01:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/google/blueprint/proptools"
|
|
|
|
)
|
|
|
|
|
|
|
|
// artifact contains relevant portions of Bazel's aquery proto, Artifact.
|
|
|
|
// Represents a single artifact, whether it's a source file or a derived output file.
|
|
|
|
type artifact struct {
|
2020-12-23 18:02:11 +01:00
|
|
|
Id int
|
|
|
|
PathFragmentId int
|
|
|
|
}
|
|
|
|
|
|
|
|
type pathFragment struct {
|
|
|
|
Id int
|
|
|
|
Label string
|
|
|
|
ParentId int
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// KeyValuePair represents Bazel's aquery proto, KeyValuePair.
|
|
|
|
type KeyValuePair struct {
|
|
|
|
Key string
|
|
|
|
Value string
|
|
|
|
}
|
|
|
|
|
|
|
|
// depSetOfFiles contains relevant portions of Bazel's aquery proto, DepSetOfFiles.
|
|
|
|
// Represents a data structure containing one or more files. Depsets in Bazel are an efficient
|
|
|
|
// data structure for storing large numbers of file paths.
|
|
|
|
type depSetOfFiles struct {
|
2021-01-19 17:36:50 +01:00
|
|
|
Id int
|
|
|
|
DirectArtifactIds []int
|
|
|
|
TransitiveDepSetIds []int
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// action contains relevant portions of Bazel's aquery proto, Action.
|
|
|
|
// Represents a single command line invocation in the Bazel build graph.
|
|
|
|
type action struct {
|
|
|
|
Arguments []string
|
|
|
|
EnvironmentVariables []KeyValuePair
|
2020-12-23 18:02:11 +01:00
|
|
|
InputDepSetIds []int
|
2020-12-10 23:19:18 +01:00
|
|
|
Mnemonic string
|
2020-12-23 18:02:11 +01:00
|
|
|
OutputIds []int
|
2021-11-04 23:58:12 +01:00
|
|
|
TemplateContent string
|
|
|
|
Substitutions []KeyValuePair
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// actionGraphContainer contains relevant portions of Bazel's aquery proto, ActionGraphContainer.
|
|
|
|
// An aquery response from Bazel contains a single ActionGraphContainer proto.
|
|
|
|
type actionGraphContainer struct {
|
|
|
|
Artifacts []artifact
|
|
|
|
Actions []action
|
|
|
|
DepSetOfFiles []depSetOfFiles
|
2020-12-23 18:02:11 +01:00
|
|
|
PathFragments []pathFragment
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// BuildStatement contains information to register a build statement corresponding (one to one)
|
|
|
|
// with a Bazel action from Bazel's action graph.
|
|
|
|
type BuildStatement struct {
|
2021-06-08 21:04:11 +02:00
|
|
|
Command string
|
|
|
|
Depfile *string
|
|
|
|
OutputPaths []string
|
|
|
|
InputPaths []string
|
|
|
|
SymlinkPaths []string
|
|
|
|
Env []KeyValuePair
|
|
|
|
Mnemonic string
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
2021-05-18 18:31:25 +02:00
|
|
|
// A helper type for aquery processing which facilitates retrieval of path IDs from their
|
|
|
|
// less readable Bazel structures (depset and path fragment).
|
|
|
|
type aqueryArtifactHandler struct {
|
|
|
|
// Maps middleman artifact Id to input artifact depset ID.
|
|
|
|
// Middleman artifacts are treated as "substitute" artifacts for mixed builds. For example,
|
|
|
|
// if we find a middleman action which has outputs [foo, bar], and output [baz_middleman], then,
|
|
|
|
// for each other action which has input [baz_middleman], we add [foo, bar] to the inputs for
|
|
|
|
// that action instead.
|
|
|
|
middlemanIdToDepsetIds map[int][]int
|
|
|
|
// Maps depset Id to depset struct.
|
|
|
|
depsetIdToDepset map[int]depSetOfFiles
|
|
|
|
// depsetIdToArtifactIdsCache is a memoization of depset flattening, because flattening
|
|
|
|
// may be an expensive operation.
|
|
|
|
depsetIdToArtifactIdsCache map[int][]int
|
|
|
|
// Maps artifact Id to fully expanded path.
|
|
|
|
artifactIdToPath map[int]string
|
|
|
|
}
|
2020-12-10 23:19:18 +01:00
|
|
|
|
2021-11-04 23:58:12 +01:00
|
|
|
// The tokens should be substituted with the value specified here, instead of the
|
|
|
|
// one returned in 'substitutions' of TemplateExpand action.
|
|
|
|
var TemplateActionOverriddenTokens = map[string]string{
|
|
|
|
// Uses "python3" for %python_binary% instead of the value returned by aquery
|
|
|
|
// which is "py3wrapper.sh". See removePy3wrapperScript.
|
|
|
|
"%python_binary%": "python3",
|
|
|
|
}
|
|
|
|
|
|
|
|
// This pattern matches the MANIFEST file created for a py_binary target.
|
|
|
|
var manifestFilePattern = regexp.MustCompile(".*/.+\\.runfiles/MANIFEST$")
|
|
|
|
|
|
|
|
// The file name of py3wrapper.sh, which is used by py_binary targets.
|
|
|
|
var py3wrapperFileName = "/py3wrapper.sh"
|
|
|
|
|
2021-05-18 18:31:25 +02:00
|
|
|
func newAqueryHandler(aqueryResult actionGraphContainer) (*aqueryArtifactHandler, error) {
|
2020-12-23 18:02:11 +01:00
|
|
|
pathFragments := map[int]pathFragment{}
|
|
|
|
for _, pathFragment := range aqueryResult.PathFragments {
|
|
|
|
pathFragments[pathFragment.Id] = pathFragment
|
|
|
|
}
|
2021-05-18 18:31:25 +02:00
|
|
|
|
2020-12-23 18:02:11 +01:00
|
|
|
artifactIdToPath := map[int]string{}
|
2020-12-10 23:19:18 +01:00
|
|
|
for _, artifact := range aqueryResult.Artifacts {
|
2020-12-23 18:02:11 +01:00
|
|
|
artifactPath, err := expandPathFragment(artifact.PathFragmentId, pathFragments)
|
|
|
|
if err != nil {
|
2021-01-15 18:22:41 +01:00
|
|
|
return nil, err
|
2020-12-23 18:02:11 +01:00
|
|
|
}
|
|
|
|
artifactIdToPath[artifact.Id] = artifactPath
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
2021-01-19 17:36:50 +01:00
|
|
|
|
|
|
|
depsetIdToDepset := map[int]depSetOfFiles{}
|
2020-12-10 23:19:18 +01:00
|
|
|
for _, depset := range aqueryResult.DepSetOfFiles {
|
2021-01-19 17:36:50 +01:00
|
|
|
depsetIdToDepset[depset.Id] = depset
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
|
|
|
|
2021-02-22 22:13:50 +01:00
|
|
|
// Do a pass through all actions to identify which artifacts are middleman artifacts.
|
2021-05-18 18:31:25 +02:00
|
|
|
middlemanIdToDepsetIds := map[int][]int{}
|
2020-12-10 23:19:18 +01:00
|
|
|
for _, actionEntry := range aqueryResult.Actions {
|
2021-02-22 22:13:50 +01:00
|
|
|
if actionEntry.Mnemonic == "Middleman" {
|
|
|
|
for _, outputId := range actionEntry.OutputIds {
|
2021-05-18 18:31:25 +02:00
|
|
|
middlemanIdToDepsetIds[outputId] = actionEntry.InputDepSetIds
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return &aqueryArtifactHandler{
|
|
|
|
middlemanIdToDepsetIds: middlemanIdToDepsetIds,
|
|
|
|
depsetIdToDepset: depsetIdToDepset,
|
|
|
|
depsetIdToArtifactIdsCache: map[int][]int{},
|
|
|
|
artifactIdToPath: artifactIdToPath,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (a *aqueryArtifactHandler) getInputPaths(depsetIds []int) ([]string, error) {
|
|
|
|
inputPaths := []string{}
|
|
|
|
|
|
|
|
for _, inputDepSetId := range depsetIds {
|
|
|
|
inputArtifacts, err := a.artifactIdsFromDepsetId(inputDepSetId)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
for _, inputId := range inputArtifacts {
|
|
|
|
if middlemanInputDepsetIds, isMiddlemanArtifact := a.middlemanIdToDepsetIds[inputId]; isMiddlemanArtifact {
|
|
|
|
// Add all inputs from middleman actions which created middleman artifacts which are
|
|
|
|
// in the inputs for this action.
|
|
|
|
swappedInputPaths, err := a.getInputPaths(middlemanInputDepsetIds)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
inputPaths = append(inputPaths, swappedInputPaths...)
|
|
|
|
} else {
|
|
|
|
inputPath, exists := a.artifactIdToPath[inputId]
|
|
|
|
if !exists {
|
|
|
|
return nil, fmt.Errorf("undefined input artifactId %d", inputId)
|
|
|
|
}
|
|
|
|
inputPaths = append(inputPaths, inputPath)
|
2021-02-22 22:13:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-11-04 23:58:12 +01:00
|
|
|
|
|
|
|
// TODO(b/197135294): Clean up this custom runfiles handling logic when
|
|
|
|
// SourceSymlinkManifest and SymlinkTree actions are supported.
|
|
|
|
filteredInputPaths := filterOutPy3wrapperAndManifestFileFromInputPaths(inputPaths)
|
|
|
|
|
|
|
|
return filteredInputPaths, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// See go/python-binary-host-mixed-build for more details.
|
|
|
|
// 1) For py3wrapper.sh, there is no action for creating py3wrapper.sh in the aquery output of
|
|
|
|
// Bazel py_binary targets, so there is no Ninja build statements generated for creating it.
|
|
|
|
// 2) For MANIFEST file, SourceSymlinkManifest action is in aquery output of Bazel py_binary targets,
|
|
|
|
// but it doesn't contain sufficient information so no Ninja build statements are generated
|
|
|
|
// for creating it.
|
|
|
|
// So in mixed build mode, when these two are used as input of some Ninja build statement,
|
|
|
|
// since there is no build statement to create them, they should be removed from input paths.
|
|
|
|
func filterOutPy3wrapperAndManifestFileFromInputPaths(inputPaths []string) []string {
|
|
|
|
filteredInputPaths := []string{}
|
|
|
|
for _, path := range inputPaths {
|
|
|
|
if strings.HasSuffix(path, py3wrapperFileName) || manifestFilePattern.MatchString(path) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
filteredInputPaths = append(filteredInputPaths, path)
|
|
|
|
}
|
|
|
|
return filteredInputPaths
|
2021-05-18 18:31:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (a *aqueryArtifactHandler) artifactIdsFromDepsetId(depsetId int) ([]int, error) {
|
|
|
|
if result, exists := a.depsetIdToArtifactIdsCache[depsetId]; exists {
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
if depset, exists := a.depsetIdToDepset[depsetId]; exists {
|
|
|
|
result := depset.DirectArtifactIds
|
|
|
|
for _, childId := range depset.TransitiveDepSetIds {
|
|
|
|
childArtifactIds, err := a.artifactIdsFromDepsetId(childId)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
result = append(result, childArtifactIds...)
|
|
|
|
}
|
|
|
|
a.depsetIdToArtifactIdsCache[depsetId] = result
|
|
|
|
return result, nil
|
|
|
|
} else {
|
|
|
|
return nil, fmt.Errorf("undefined input depsetId %d", depsetId)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// AqueryBuildStatements returns an array of BuildStatements which should be registered (and output
|
|
|
|
// to a ninja file) to correspond one-to-one with the given action graph json proto (from a bazel
|
|
|
|
// aquery invocation).
|
|
|
|
func AqueryBuildStatements(aqueryJsonProto []byte) ([]BuildStatement, error) {
|
|
|
|
buildStatements := []BuildStatement{}
|
|
|
|
|
|
|
|
var aqueryResult actionGraphContainer
|
|
|
|
err := json.Unmarshal(aqueryJsonProto, &aqueryResult)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
aqueryHandler, err := newAqueryHandler(aqueryResult)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-02-22 22:13:50 +01:00
|
|
|
|
|
|
|
for _, actionEntry := range aqueryResult.Actions {
|
|
|
|
if shouldSkipAction(actionEntry) {
|
|
|
|
continue
|
|
|
|
}
|
2020-12-10 23:19:18 +01:00
|
|
|
outputPaths := []string{}
|
2021-03-25 21:42:37 +01:00
|
|
|
var depfile *string
|
2020-12-10 23:19:18 +01:00
|
|
|
for _, outputId := range actionEntry.OutputIds {
|
2021-05-18 18:31:25 +02:00
|
|
|
outputPath, exists := aqueryHandler.artifactIdToPath[outputId]
|
2021-01-15 18:22:41 +01:00
|
|
|
if !exists {
|
|
|
|
return nil, fmt.Errorf("undefined outputId %d", outputId)
|
|
|
|
}
|
2021-03-25 21:42:37 +01:00
|
|
|
ext := filepath.Ext(outputPath)
|
|
|
|
if ext == ".d" {
|
|
|
|
if depfile != nil {
|
|
|
|
return nil, fmt.Errorf("found multiple potential depfiles %q, %q", *depfile, outputPath)
|
|
|
|
} else {
|
|
|
|
depfile = &outputPath
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
outputPaths = append(outputPaths, outputPath)
|
|
|
|
}
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
2021-05-18 18:31:25 +02:00
|
|
|
inputPaths, err := aqueryHandler.getInputPaths(actionEntry.InputDepSetIds)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
2021-05-18 18:31:25 +02:00
|
|
|
|
2020-12-10 23:19:18 +01:00
|
|
|
buildStatement := BuildStatement{
|
2021-11-16 23:01:11 +01:00
|
|
|
Command: strings.Join(proptools.ShellEscapeListIncludingSpaces(actionEntry.Arguments), " "),
|
2021-03-25 21:42:37 +01:00
|
|
|
Depfile: depfile,
|
2020-12-10 23:19:18 +01:00
|
|
|
OutputPaths: outputPaths,
|
|
|
|
InputPaths: inputPaths,
|
|
|
|
Env: actionEntry.EnvironmentVariables,
|
2021-06-08 21:04:11 +02:00
|
|
|
Mnemonic: actionEntry.Mnemonic,
|
|
|
|
}
|
|
|
|
|
|
|
|
if isSymlinkAction(actionEntry) {
|
|
|
|
if len(inputPaths) != 1 || len(outputPaths) != 1 {
|
|
|
|
return nil, fmt.Errorf("Expect 1 input and 1 output to symlink action, got: input %q, output %q", inputPaths, outputPaths)
|
|
|
|
}
|
|
|
|
out := outputPaths[0]
|
|
|
|
outDir := proptools.ShellEscapeIncludingSpaces(filepath.Dir(out))
|
|
|
|
out = proptools.ShellEscapeIncludingSpaces(out)
|
2021-11-04 15:56:13 +01:00
|
|
|
in := filepath.Join("$PWD", proptools.ShellEscapeIncludingSpaces(inputPaths[0]))
|
|
|
|
// Use absolute paths, because some soong actions don't play well with relative paths (for example, `cp -d`).
|
|
|
|
buildStatement.Command = fmt.Sprintf("mkdir -p %[1]s && rm -f %[2]s && ln -sf %[3]s %[2]s", outDir, out, in)
|
2021-06-08 21:04:11 +02:00
|
|
|
buildStatement.SymlinkPaths = outputPaths[:]
|
2021-11-04 23:58:12 +01:00
|
|
|
} else if isTemplateExpandAction(actionEntry) && len(actionEntry.Arguments) < 1 {
|
|
|
|
if len(outputPaths) != 1 {
|
|
|
|
return nil, fmt.Errorf("Expect 1 output to template expand action, got: output %q", outputPaths)
|
|
|
|
}
|
|
|
|
expandedTemplateContent := expandTemplateContent(actionEntry)
|
|
|
|
// The expandedTemplateContent is escaped for being used in double quotes and shell unescape,
|
|
|
|
// and the new line characters (\n) are also changed to \\n which avoids some Ninja escape on \n, which might
|
|
|
|
// change \n to space and mess up the format of Python programs.
|
|
|
|
// sed is used to convert \\n back to \n before saving to output file.
|
|
|
|
// See go/python-binary-host-mixed-build for more details.
|
|
|
|
command := fmt.Sprintf(`/bin/bash -c 'echo "%[1]s" | sed "s/\\\\n/\\n/g" > %[2]s && chmod a+x %[2]s'`,
|
|
|
|
escapeCommandlineArgument(expandedTemplateContent), outputPaths[0])
|
|
|
|
buildStatement.Command = command
|
|
|
|
} else if isPythonZipperAction(actionEntry) {
|
|
|
|
if len(inputPaths) < 1 || len(outputPaths) != 1 {
|
|
|
|
return nil, fmt.Errorf("Expect 1+ input and 1 output to python zipper action, got: input %q, output %q", inputPaths, outputPaths)
|
|
|
|
}
|
|
|
|
buildStatement.InputPaths, buildStatement.Command = removePy3wrapperScript(buildStatement)
|
|
|
|
buildStatement.Command = addCommandForPyBinaryRunfilesDir(buildStatement, inputPaths[0], outputPaths[0])
|
|
|
|
// Add the python zip file as input of the corresponding python binary stub script in Ninja build statements.
|
|
|
|
// In Ninja build statements, the outputs of dependents of a python binary have python binary stub script as input,
|
|
|
|
// which is not sufficient without the python zip file from which runfiles directory is created for py_binary.
|
|
|
|
//
|
|
|
|
// The following logic relies on that Bazel aquery output returns actions in the order that
|
|
|
|
// PythonZipper is after TemplateAction of creating Python binary stub script. If later Bazel doesn't return actions
|
|
|
|
// in that order, the following logic might not find the build statement generated for Python binary
|
|
|
|
// stub script and the build might fail. So the check of pyBinaryFound is added to help debug in case later Bazel might change aquery output.
|
|
|
|
// See go/python-binary-host-mixed-build for more details.
|
|
|
|
pythonZipFilePath := outputPaths[0]
|
|
|
|
pyBinaryFound := false
|
|
|
|
for i, _ := range buildStatements {
|
|
|
|
if len(buildStatements[i].OutputPaths) == 1 && buildStatements[i].OutputPaths[0]+".zip" == pythonZipFilePath {
|
|
|
|
buildStatements[i].InputPaths = append(buildStatements[i].InputPaths, pythonZipFilePath)
|
|
|
|
pyBinaryFound = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !pyBinaryFound {
|
|
|
|
return nil, fmt.Errorf("Could not find the correspondinging Python binary stub script of PythonZipper: %q", outputPaths)
|
|
|
|
}
|
2021-06-08 21:04:11 +02:00
|
|
|
} else if len(actionEntry.Arguments) < 1 {
|
2021-03-25 21:42:37 +01:00
|
|
|
return nil, fmt.Errorf("received action with no command: [%v]", buildStatement)
|
2021-02-22 22:13:50 +01:00
|
|
|
}
|
2020-12-10 23:19:18 +01:00
|
|
|
buildStatements = append(buildStatements, buildStatement)
|
|
|
|
}
|
|
|
|
|
2021-01-15 18:22:41 +01:00
|
|
|
return buildStatements, nil
|
2020-12-10 23:19:18 +01:00
|
|
|
}
|
2020-12-23 18:02:11 +01:00
|
|
|
|
2021-11-04 23:58:12 +01:00
|
|
|
// expandTemplateContent substitutes the tokens in a template.
|
|
|
|
func expandTemplateContent(actionEntry action) string {
|
|
|
|
replacerString := []string{}
|
|
|
|
for _, pair := range actionEntry.Substitutions {
|
|
|
|
value := pair.Value
|
|
|
|
if val, ok := TemplateActionOverriddenTokens[pair.Key]; ok {
|
|
|
|
value = val
|
|
|
|
}
|
|
|
|
replacerString = append(replacerString, pair.Key, value)
|
|
|
|
}
|
|
|
|
replacer := strings.NewReplacer(replacerString...)
|
|
|
|
return replacer.Replace(actionEntry.TemplateContent)
|
|
|
|
}
|
|
|
|
|
|
|
|
func escapeCommandlineArgument(str string) string {
|
|
|
|
// \->\\, $->\$, `->\`, "->\", \n->\\n, '->'"'"'
|
|
|
|
replacer := strings.NewReplacer(
|
|
|
|
`\`, `\\`,
|
|
|
|
`$`, `\$`,
|
|
|
|
"`", "\\`",
|
|
|
|
`"`, `\"`,
|
|
|
|
"\n", "\\n",
|
|
|
|
`'`, `'"'"'`,
|
|
|
|
)
|
|
|
|
return replacer.Replace(str)
|
|
|
|
}
|
|
|
|
|
|
|
|
// removePy3wrapperScript removes py3wrapper.sh from the input paths and command of the action of
|
|
|
|
// creating python zip file in mixed build mode. py3wrapper.sh is returned as input by aquery but
|
|
|
|
// there is no action returned by aquery for creating it. So in mixed build "python3" is used
|
|
|
|
// as the PYTHON_BINARY in python binary stub script, and py3wrapper.sh is not needed and should be
|
|
|
|
// removed from input paths and command of creating python zip file.
|
|
|
|
// See go/python-binary-host-mixed-build for more details.
|
|
|
|
// TODO(b/205879240) remove this after py3wrapper.sh could be created in the mixed build mode.
|
|
|
|
func removePy3wrapperScript(bs BuildStatement) (newInputPaths []string, newCommand string) {
|
|
|
|
// Remove from inputs
|
|
|
|
filteredInputPaths := []string{}
|
|
|
|
for _, path := range bs.InputPaths {
|
|
|
|
if !strings.HasSuffix(path, py3wrapperFileName) {
|
|
|
|
filteredInputPaths = append(filteredInputPaths, path)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
newInputPaths = filteredInputPaths
|
|
|
|
|
|
|
|
// Remove from command line
|
|
|
|
var re = regexp.MustCompile(`\S*` + py3wrapperFileName)
|
|
|
|
newCommand = re.ReplaceAllString(bs.Command, "")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// addCommandForPyBinaryRunfilesDir adds commands creating python binary runfiles directory.
|
|
|
|
// runfiles directory is created by using MANIFEST file and MANIFEST file is the output of
|
|
|
|
// SourceSymlinkManifest action is in aquery output of Bazel py_binary targets,
|
|
|
|
// but since SourceSymlinkManifest doesn't contain sufficient information
|
|
|
|
// so MANIFEST file could not be created, which also blocks the creation of runfiles directory.
|
|
|
|
// See go/python-binary-host-mixed-build for more details.
|
|
|
|
// TODO(b/197135294) create runfiles directory from MANIFEST file once it can be created from SourceSymlinkManifest action.
|
|
|
|
func addCommandForPyBinaryRunfilesDir(bs BuildStatement, zipperCommandPath, zipFilePath string) string {
|
|
|
|
// Unzip the zip file, zipFilePath looks like <python_binary>.zip
|
|
|
|
runfilesDirName := zipFilePath[0:len(zipFilePath)-4] + ".runfiles"
|
|
|
|
command := fmt.Sprintf("%s x %s -d %s", zipperCommandPath, zipFilePath, runfilesDirName)
|
|
|
|
// Create a symbolic link in <python_binary>.runfiles/, which is the expected structure
|
|
|
|
// when running the python binary stub script.
|
|
|
|
command += fmt.Sprintf(" && ln -sf runfiles/__main__ %s", runfilesDirName)
|
|
|
|
return bs.Command + " && " + command
|
|
|
|
}
|
|
|
|
|
2021-06-08 21:04:11 +02:00
|
|
|
func isSymlinkAction(a action) bool {
|
|
|
|
return a.Mnemonic == "Symlink" || a.Mnemonic == "SolibSymlink"
|
|
|
|
}
|
|
|
|
|
2021-11-04 23:58:12 +01:00
|
|
|
func isTemplateExpandAction(a action) bool {
|
|
|
|
return a.Mnemonic == "TemplateExpand"
|
|
|
|
}
|
|
|
|
|
|
|
|
func isPythonZipperAction(a action) bool {
|
|
|
|
return a.Mnemonic == "PythonZipper"
|
|
|
|
}
|
|
|
|
|
2021-02-22 22:13:50 +01:00
|
|
|
func shouldSkipAction(a action) bool {
|
2021-06-08 21:04:11 +02:00
|
|
|
// TODO(b/180945121): Handle complex symlink actions.
|
|
|
|
if a.Mnemonic == "SymlinkTree" || a.Mnemonic == "SourceSymlinkManifest" {
|
2021-02-22 22:13:50 +01:00
|
|
|
return true
|
|
|
|
}
|
2021-05-18 18:31:25 +02:00
|
|
|
// Middleman actions are not handled like other actions; they are handled separately as a
|
|
|
|
// preparatory step so that their inputs may be relayed to actions depending on middleman
|
|
|
|
// artifacts.
|
2021-02-22 22:13:50 +01:00
|
|
|
if a.Mnemonic == "Middleman" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
// Skip "Fail" actions, which are placeholder actions designed to always fail.
|
|
|
|
if a.Mnemonic == "Fail" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
// TODO(b/180946980): Handle FileWrite. The aquery proto currently contains no information
|
|
|
|
// about the contents that are written.
|
|
|
|
if a.Mnemonic == "FileWrite" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-12-23 18:02:11 +01:00
|
|
|
func expandPathFragment(id int, pathFragmentsMap map[int]pathFragment) (string, error) {
|
|
|
|
labels := []string{}
|
|
|
|
currId := id
|
|
|
|
// Only positive IDs are valid for path fragments. An ID of zero indicates a terminal node.
|
|
|
|
for currId > 0 {
|
|
|
|
currFragment, ok := pathFragmentsMap[currId]
|
|
|
|
if !ok {
|
2021-01-15 18:22:41 +01:00
|
|
|
return "", fmt.Errorf("undefined path fragment id %d", currId)
|
2020-12-23 18:02:11 +01:00
|
|
|
}
|
|
|
|
labels = append([]string{currFragment.Label}, labels...)
|
2021-06-08 21:04:11 +02:00
|
|
|
if currId == currFragment.ParentId {
|
|
|
|
return "", fmt.Errorf("Fragment cannot refer to itself as parent %#v", currFragment)
|
|
|
|
}
|
2020-12-23 18:02:11 +01:00
|
|
|
currId = currFragment.ParentId
|
|
|
|
}
|
|
|
|
return filepath.Join(labels...), nil
|
|
|
|
}
|