Allow actions to read BUILD_BROKEN_INCORRECT_PARTITION_IMAGES
To maintain good backwards compatibility with the legacy partition building behavior, allow actions to read BUILD_BROKEN_INCORRECT_PARTITION_IMAGES so that we don't have to rerun analysis. Bug: 205632228 Test: Presubmits Change-Id: I2b55c0143cbdaf010e6b5fd0c3d51d6930a94eff
This commit is contained in:
parent
ff8fb5c6cc
commit
ded796030b
3 changed files with 16 additions and 10 deletions
|
@ -438,16 +438,17 @@ type ProductVariables struct {
|
|||
|
||||
ShippingApiLevel *string `json:",omitempty"`
|
||||
|
||||
BuildBrokenPluginValidation []string `json:",omitempty"`
|
||||
BuildBrokenClangAsFlags bool `json:",omitempty"`
|
||||
BuildBrokenClangCFlags bool `json:",omitempty"`
|
||||
BuildBrokenClangProperty bool `json:",omitempty"`
|
||||
GenruleSandboxing *bool `json:",omitempty"`
|
||||
BuildBrokenEnforceSyspropOwner bool `json:",omitempty"`
|
||||
BuildBrokenTrebleSyspropNeverallow bool `json:",omitempty"`
|
||||
BuildBrokenUsesSoongPython2Modules bool `json:",omitempty"`
|
||||
BuildBrokenVendorPropertyNamespace bool `json:",omitempty"`
|
||||
BuildBrokenInputDirModules []string `json:",omitempty"`
|
||||
BuildBrokenPluginValidation []string `json:",omitempty"`
|
||||
BuildBrokenClangAsFlags bool `json:",omitempty"`
|
||||
BuildBrokenClangCFlags bool `json:",omitempty"`
|
||||
BuildBrokenClangProperty bool `json:",omitempty"`
|
||||
GenruleSandboxing *bool `json:",omitempty"`
|
||||
BuildBrokenEnforceSyspropOwner bool `json:",omitempty"`
|
||||
BuildBrokenTrebleSyspropNeverallow bool `json:",omitempty"`
|
||||
BuildBrokenUsesSoongPython2Modules bool `json:",omitempty"`
|
||||
BuildBrokenVendorPropertyNamespace bool `json:",omitempty"`
|
||||
BuildBrokenIncorrectPartitionImages bool `json:",omitempty"`
|
||||
BuildBrokenInputDirModules []string `json:",omitempty"`
|
||||
|
||||
BuildWarningBadOptionalUsesLibsAllowlist []string `json:",omitempty"`
|
||||
|
||||
|
|
|
@ -261,6 +261,7 @@ func platformMappingSingleProduct(
|
|||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:apex_global_min_sdk_version_override=%s\n", proptools.String(productVariables.ApexGlobalMinSdkVersionOverride)))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:binder32bit=%t\n", proptools.Bool(productVariables.Binder32bit)))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:build_from_text_stub=%t\n", proptools.Bool(productVariables.Build_from_text_stub)))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:build_broken_incorrect_partition_images=%t\n", productVariables.BuildBrokenIncorrectPartitionImages))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:build_id=%s\n", proptools.String(productVariables.BuildId)))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:build_version_tags=%s\n", strings.Join(productVariables.BuildVersionTags, ",")))
|
||||
result.WriteString(fmt.Sprintf(" --//build/bazel/product_config:cfi_exclude_paths=%s\n", strings.Join(productVariables.CFIExcludePaths, ",")))
|
||||
|
|
|
@ -194,6 +194,10 @@ func runNinjaForBuild(ctx Context, config Config) {
|
|||
|
||||
// LLVM compiler wrapper options
|
||||
"TOOLCHAIN_RUSAGE_OUTPUT",
|
||||
|
||||
// We don't want this build broken flag to cause reanalysis, so allow it through to the
|
||||
// actions.
|
||||
"BUILD_BROKEN_INCORRECT_PARTITION_IMAGES",
|
||||
}, config.BuildBrokenNinjaUsesEnvVars()...)...)
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue