20f2030e29
Now that aquery includes this information. Also added rm -f $out to some rules, because since they write files by shell redirection, if the file existed before and was executable, they wouldn't make the file non-executable and visa versa. Fixes: 297366783 Test: m bazel_sandwich Change-Id: Ie5b6c4275b162601f51deaec9912eea4be16988d
1591 lines
56 KiB
Go
1591 lines
56 KiB
Go
// Copyright 2020 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package android
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/sha1"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
"path/filepath"
|
|
"regexp"
|
|
"runtime"
|
|
"sort"
|
|
"strings"
|
|
"sync"
|
|
|
|
"android/soong/android/allowlists"
|
|
"android/soong/bazel/cquery"
|
|
"android/soong/shared"
|
|
"android/soong/starlark_import"
|
|
|
|
"github.com/google/blueprint"
|
|
"github.com/google/blueprint/metrics"
|
|
|
|
"android/soong/bazel"
|
|
)
|
|
|
|
var (
|
|
_ = pctx.HostBinToolVariable("bazelBuildRunfilesTool", "build-runfiles")
|
|
buildRunfilesRule = pctx.AndroidStaticRule("bazelBuildRunfiles", blueprint.RuleParams{
|
|
Command: "${bazelBuildRunfilesTool} ${in} ${outDir}",
|
|
Depfile: "",
|
|
Description: "",
|
|
CommandDeps: []string{"${bazelBuildRunfilesTool}"},
|
|
}, "outDir")
|
|
)
|
|
|
|
func registerMixedBuildsMutator(ctx RegisterMutatorsContext) {
|
|
ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel()
|
|
}
|
|
|
|
func RegisterMixedBuildsMutator(ctx RegistrationContext) {
|
|
ctx.FinalDepsMutators(registerMixedBuildsMutator)
|
|
}
|
|
|
|
func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) {
|
|
if m := ctx.Module(); m.Enabled() {
|
|
if mixedBuildMod, ok := m.(MixedBuildBuildable); ok {
|
|
mixedBuildEnabled := MixedBuildsEnabled(ctx)
|
|
queueMixedBuild := mixedBuildMod.IsMixedBuildSupported(ctx) && mixedBuildEnabled == MixedBuildEnabled
|
|
if queueMixedBuild {
|
|
mixedBuildMod.QueueBazelCall(ctx)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
type cqueryRequest interface {
|
|
// Name returns a string name for this request type. Such request type names must be unique,
|
|
// and must only consist of alphanumeric characters.
|
|
Name() string
|
|
|
|
// StarlarkFunctionBody returns a starlark function body to process this request type.
|
|
// The returned string is the body of a Starlark function which obtains
|
|
// all request-relevant information about a target and returns a string containing
|
|
// this information.
|
|
// The function should have the following properties:
|
|
// - The arguments are `target` (a configured target) and `id_string` (the label + configuration).
|
|
// - The return value must be a string.
|
|
// - The function body should not be indented outside of its own scope.
|
|
StarlarkFunctionBody() string
|
|
}
|
|
|
|
// Portion of cquery map key to describe target configuration.
|
|
type configKey struct {
|
|
arch string
|
|
osType OsType
|
|
apexKey ApexConfigKey
|
|
}
|
|
|
|
type ApexConfigKey struct {
|
|
WithinApex bool
|
|
ApexSdkVersion string
|
|
ApiDomain string
|
|
}
|
|
|
|
func (c ApexConfigKey) String() string {
|
|
return fmt.Sprintf("%s_%s_%s", withinApexToString(c.WithinApex), c.ApexSdkVersion, c.ApiDomain)
|
|
}
|
|
|
|
func withinApexToString(withinApex bool) string {
|
|
if withinApex {
|
|
return "within_apex"
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (c configKey) String() string {
|
|
return fmt.Sprintf("%s::%s::%s", c.arch, c.osType, c.apexKey)
|
|
}
|
|
|
|
// Map key to describe bazel cquery requests.
|
|
type cqueryKey struct {
|
|
label string
|
|
requestType cqueryRequest
|
|
configKey configKey
|
|
}
|
|
|
|
func makeCqueryKey(label string, cqueryRequest cqueryRequest, cfgKey configKey) cqueryKey {
|
|
if strings.HasPrefix(label, "//") {
|
|
// Normalize Bazel labels to specify main repository explicitly.
|
|
label = "@" + label
|
|
}
|
|
return cqueryKey{label, cqueryRequest, cfgKey}
|
|
}
|
|
|
|
func (c cqueryKey) String() string {
|
|
return fmt.Sprintf("cquery(%s,%s,%s)", c.label, c.requestType.Name(), c.configKey)
|
|
}
|
|
|
|
type invokeBazelContext interface {
|
|
GetEventHandler() *metrics.EventHandler
|
|
}
|
|
|
|
// BazelContext is a context object useful for interacting with Bazel during
|
|
// the course of a build. Use of Bazel to evaluate part of the build graph
|
|
// is referred to as a "mixed build". (Some modules are managed by Soong,
|
|
// some are managed by Bazel). To facilitate interop between these build
|
|
// subgraphs, Soong may make requests to Bazel and evaluate their responses
|
|
// so that Soong modules may accurately depend on Bazel targets.
|
|
type BazelContext interface {
|
|
// Add a cquery request to the bazel request queue. All queued requests
|
|
// will be sent to Bazel on a subsequent invocation of InvokeBazel.
|
|
QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey)
|
|
|
|
// ** Cquery Results Retrieval Functions
|
|
// The below functions pertain to retrieving cquery results from a prior
|
|
// InvokeBazel function call and parsing the results.
|
|
|
|
// Returns result files built by building the given bazel target label.
|
|
GetOutputFiles(label string, cfgKey configKey) ([]string, error)
|
|
|
|
// Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order).
|
|
GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error)
|
|
|
|
// Returns the results of the GetApexInfo query (including output files)
|
|
GetApexInfo(label string, cfgkey configKey) (cquery.ApexInfo, error)
|
|
|
|
// Returns the results of the GetCcUnstrippedInfo query
|
|
GetCcUnstrippedInfo(label string, cfgkey configKey) (cquery.CcUnstrippedInfo, error)
|
|
|
|
// Returns the results of the GetPrebuiltFileInfo query
|
|
GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error)
|
|
|
|
// ** end Cquery Results Retrieval Functions
|
|
|
|
// Issues commands to Bazel to receive results for all cquery requests
|
|
// queued in the BazelContext. The ctx argument is optional and is only
|
|
// used for performance data collection
|
|
InvokeBazel(config Config, ctx invokeBazelContext) error
|
|
|
|
// Returns true if Bazel handling is enabled for the module with the given name.
|
|
// Note that this only implies "bazel mixed build" allowlisting. The caller
|
|
// should independently verify the module is eligible for Bazel handling
|
|
// (for example, that it is MixedBuildBuildable).
|
|
IsModuleNameAllowed(moduleName string, withinApex bool) bool
|
|
|
|
// Returns the bazel output base (the root directory for all bazel intermediate outputs).
|
|
OutputBase() string
|
|
|
|
// Returns build statements which should get registered to reflect Bazel's outputs.
|
|
BuildStatementsToRegister() []*bazel.BuildStatement
|
|
|
|
// Returns the depsets defined in Bazel's aquery response.
|
|
AqueryDepsets() []bazel.AqueryDepset
|
|
|
|
QueueBazelSandwichCqueryRequests(config Config) error
|
|
}
|
|
|
|
type bazelRunner interface {
|
|
issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (output string, errorMessage string, error error)
|
|
}
|
|
|
|
type bazelPaths struct {
|
|
homeDir string
|
|
bazelPath string
|
|
outputBase string
|
|
workspaceDir string
|
|
soongOutDir string
|
|
metricsDir string
|
|
bazelDepsFile string
|
|
}
|
|
|
|
// A context object which tracks queued requests that need to be made to Bazel,
|
|
// and their results after the requests have been made.
|
|
type mixedBuildBazelContext struct {
|
|
bazelRunner
|
|
paths *bazelPaths
|
|
// cquery requests that have not yet been issued to Bazel. This list is maintained
|
|
// in a sorted state, and is guaranteed to have no duplicates.
|
|
requests []cqueryKey
|
|
requestMutex sync.Mutex // requests can be written in parallel
|
|
|
|
results map[cqueryKey]string // Results of cquery requests after Bazel invocations
|
|
|
|
// Build statements which should get registered to reflect Bazel's outputs.
|
|
buildStatements []*bazel.BuildStatement
|
|
|
|
// Depsets which should be used for Bazel's build statements.
|
|
depsets []bazel.AqueryDepset
|
|
|
|
// Per-module allowlist/denylist functionality to control whether analysis of
|
|
// modules are handled by Bazel. For modules which do not have a Bazel definition
|
|
// (or do not sufficiently support bazel handling via MixedBuildBuildable),
|
|
// this allowlist will have no effect, even if the module is explicitly allowlisted here.
|
|
// Per-module denylist to opt modules out of bazel handling.
|
|
bazelDisabledModules map[string]bool
|
|
// Per-module allowlist to opt modules in to bazel handling.
|
|
bazelEnabledModules map[string]bool
|
|
// DCLA modules are enabled when used in apex.
|
|
bazelDclaEnabledModules map[string]bool
|
|
|
|
targetProduct string
|
|
targetBuildVariant string
|
|
}
|
|
|
|
var _ BazelContext = &mixedBuildBazelContext{}
|
|
|
|
// A bazel context to use when Bazel is disabled.
|
|
type noopBazelContext struct{}
|
|
|
|
var _ BazelContext = noopBazelContext{}
|
|
|
|
// A bazel context to use for tests.
|
|
type MockBazelContext struct {
|
|
OutputBaseDir string
|
|
|
|
LabelToOutputFiles map[string][]string
|
|
LabelToCcInfo map[string]cquery.CcInfo
|
|
LabelToPythonBinary map[string]string
|
|
LabelToApexInfo map[string]cquery.ApexInfo
|
|
LabelToCcBinary map[string]cquery.CcUnstrippedInfo
|
|
LabelToPrebuiltFileInfo map[string]cquery.PrebuiltFileInfo
|
|
|
|
BazelRequests map[string]bool
|
|
}
|
|
|
|
func (m MockBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) {
|
|
key := BuildMockBazelContextRequestKey(label, requestType, cfgKey.arch, cfgKey.osType, cfgKey.apexKey)
|
|
if m.BazelRequests == nil {
|
|
m.BazelRequests = make(map[string]bool)
|
|
}
|
|
m.BazelRequests[key] = true
|
|
}
|
|
|
|
func (m MockBazelContext) QueueBazelSandwichCqueryRequests(config Config) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m MockBazelContext) GetOutputFiles(label string, _ configKey) ([]string, error) {
|
|
result, ok := m.LabelToOutputFiles[label]
|
|
if !ok {
|
|
return []string{}, fmt.Errorf("no target with label %q in LabelToOutputFiles", label)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) {
|
|
result, ok := m.LabelToCcInfo[label]
|
|
if !ok {
|
|
key := BuildMockBazelContextResultKey(label, cfgKey.arch, cfgKey.osType, cfgKey.apexKey)
|
|
result, ok = m.LabelToCcInfo[key]
|
|
if !ok {
|
|
return cquery.CcInfo{}, fmt.Errorf("no target with label %q in LabelToCcInfo", label)
|
|
}
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetApexInfo(label string, _ configKey) (cquery.ApexInfo, error) {
|
|
result, ok := m.LabelToApexInfo[label]
|
|
if !ok {
|
|
return cquery.ApexInfo{}, fmt.Errorf("no target with label %q in LabelToApexInfo", label)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetCcUnstrippedInfo(label string, _ configKey) (cquery.CcUnstrippedInfo, error) {
|
|
result, ok := m.LabelToCcBinary[label]
|
|
if !ok {
|
|
return cquery.CcUnstrippedInfo{}, fmt.Errorf("no target with label %q in LabelToCcBinary", label)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetPrebuiltFileInfo(label string, _ configKey) (cquery.PrebuiltFileInfo, error) {
|
|
result, ok := m.LabelToPrebuiltFileInfo[label]
|
|
if !ok {
|
|
return cquery.PrebuiltFileInfo{}, fmt.Errorf("no target with label %q in LabelToPrebuiltFileInfo", label)
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m MockBazelContext) IsModuleNameAllowed(_ string, _ bool) bool {
|
|
return true
|
|
}
|
|
|
|
func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir }
|
|
|
|
func (m MockBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement {
|
|
return []*bazel.BuildStatement{}
|
|
}
|
|
|
|
func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return []bazel.AqueryDepset{}
|
|
}
|
|
|
|
var _ BazelContext = MockBazelContext{}
|
|
|
|
func BuildMockBazelContextRequestKey(label string, request cqueryRequest, arch string, osType OsType, apexKey ApexConfigKey) string {
|
|
cfgKey := configKey{
|
|
arch: arch,
|
|
osType: osType,
|
|
apexKey: apexKey,
|
|
}
|
|
|
|
return strings.Join([]string{label, request.Name(), cfgKey.String()}, "_")
|
|
}
|
|
|
|
func BuildMockBazelContextResultKey(label string, arch string, osType OsType, apexKey ApexConfigKey) string {
|
|
cfgKey := configKey{
|
|
arch: arch,
|
|
osType: osType,
|
|
apexKey: apexKey,
|
|
}
|
|
|
|
return strings.Join([]string{label, cfgKey.String()}, "_")
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) {
|
|
key := makeCqueryKey(label, requestType, cfgKey)
|
|
bazelCtx.requestMutex.Lock()
|
|
defer bazelCtx.requestMutex.Unlock()
|
|
|
|
// Insert key into requests, maintaining the sort, and only if it's not duplicate.
|
|
keyString := key.String()
|
|
foundEqual := false
|
|
notLessThanKeyString := func(i int) bool {
|
|
s := bazelCtx.requests[i].String()
|
|
v := strings.Compare(s, keyString)
|
|
if v == 0 {
|
|
foundEqual = true
|
|
}
|
|
return v >= 0
|
|
}
|
|
targetIndex := sort.Search(len(bazelCtx.requests), notLessThanKeyString)
|
|
if foundEqual {
|
|
return
|
|
}
|
|
|
|
if targetIndex == len(bazelCtx.requests) {
|
|
bazelCtx.requests = append(bazelCtx.requests, key)
|
|
} else {
|
|
bazelCtx.requests = append(bazelCtx.requests[:targetIndex+1], bazelCtx.requests[targetIndex:]...)
|
|
bazelCtx.requests[targetIndex] = key
|
|
}
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) {
|
|
key := makeCqueryKey(label, cquery.GetOutputFiles, cfgKey)
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
bazelOutput := strings.TrimSpace(rawString)
|
|
|
|
return cquery.GetOutputFiles.ParseResult(bazelOutput), nil
|
|
}
|
|
return nil, fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) {
|
|
key := makeCqueryKey(label, cquery.GetCcInfo, cfgKey)
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
bazelOutput := strings.TrimSpace(rawString)
|
|
return cquery.GetCcInfo.ParseResult(bazelOutput)
|
|
}
|
|
return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) GetApexInfo(label string, cfgKey configKey) (cquery.ApexInfo, error) {
|
|
key := makeCqueryKey(label, cquery.GetApexInfo, cfgKey)
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
return cquery.GetApexInfo.ParseResult(strings.TrimSpace(rawString))
|
|
}
|
|
return cquery.ApexInfo{}, fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) GetCcUnstrippedInfo(label string, cfgKey configKey) (cquery.CcUnstrippedInfo, error) {
|
|
key := makeCqueryKey(label, cquery.GetCcUnstrippedInfo, cfgKey)
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
return cquery.GetCcUnstrippedInfo.ParseResult(strings.TrimSpace(rawString))
|
|
}
|
|
return cquery.CcUnstrippedInfo{}, fmt.Errorf("no bazel response for %s", key)
|
|
}
|
|
|
|
func (bazelCtx *mixedBuildBazelContext) GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) {
|
|
key := makeCqueryKey(label, cquery.GetPrebuiltFileInfo, cfgKey)
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
return cquery.GetPrebuiltFileInfo.ParseResult(strings.TrimSpace(rawString))
|
|
}
|
|
return cquery.PrebuiltFileInfo{}, fmt.Errorf("no bazel response for %s", key)
|
|
}
|
|
|
|
func (n noopBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) QueueBazelSandwichCqueryRequests(config Config) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetOutputFiles(_ string, _ configKey) ([]string, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetCcInfo(_ string, _ configKey) (cquery.CcInfo, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexInfo, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetCcUnstrippedInfo(_ string, _ configKey) (cquery.CcUnstrippedInfo, error) {
|
|
//TODO implement me
|
|
panic("implement me")
|
|
}
|
|
|
|
func (n noopBazelContext) GetPrebuiltFileInfo(_ string, _ configKey) (cquery.PrebuiltFileInfo, error) {
|
|
panic("implement me")
|
|
}
|
|
|
|
func (n noopBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m noopBazelContext) OutputBase() string {
|
|
return ""
|
|
}
|
|
|
|
func (n noopBazelContext) IsModuleNameAllowed(_ string, _ bool) bool {
|
|
return false
|
|
}
|
|
|
|
func (m noopBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement {
|
|
return []*bazel.BuildStatement{}
|
|
}
|
|
|
|
func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return []bazel.AqueryDepset{}
|
|
}
|
|
|
|
func AddToStringSet(set map[string]bool, items []string) {
|
|
for _, item := range items {
|
|
set[item] = true
|
|
}
|
|
}
|
|
|
|
func GetBazelEnabledAndDisabledModules(buildMode SoongBuildMode, forceEnabled map[string]struct{}) (map[string]bool, map[string]bool) {
|
|
disabledModules := map[string]bool{}
|
|
enabledModules := map[string]bool{}
|
|
|
|
switch buildMode {
|
|
case BazelProdMode:
|
|
AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList)
|
|
for enabledAdHocModule := range forceEnabled {
|
|
enabledModules[enabledAdHocModule] = true
|
|
}
|
|
case BazelStagingMode:
|
|
// Staging mode includes all prod modules plus all staging modules.
|
|
AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList)
|
|
AddToStringSet(enabledModules, allowlists.StagingMixedBuildsEnabledList)
|
|
for enabledAdHocModule := range forceEnabled {
|
|
enabledModules[enabledAdHocModule] = true
|
|
}
|
|
default:
|
|
panic("Expected BazelProdMode or BazelStagingMode")
|
|
}
|
|
return enabledModules, disabledModules
|
|
}
|
|
|
|
func GetBazelEnabledModules(buildMode SoongBuildMode) []string {
|
|
enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(buildMode, nil)
|
|
enabledList := make([]string, 0, len(enabledModules))
|
|
for module := range enabledModules {
|
|
if !disabledModules[module] {
|
|
enabledList = append(enabledList, module)
|
|
}
|
|
}
|
|
sort.Strings(enabledList)
|
|
return enabledList
|
|
}
|
|
|
|
func NewBazelContext(c *config) (BazelContext, error) {
|
|
if c.BuildMode != BazelProdMode && c.BuildMode != BazelStagingMode {
|
|
return noopBazelContext{}, nil
|
|
}
|
|
|
|
enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(c.BuildMode, c.BazelModulesForceEnabledByFlag())
|
|
|
|
paths := bazelPaths{
|
|
soongOutDir: c.soongOutDir,
|
|
}
|
|
var missing []string
|
|
vars := []struct {
|
|
name string
|
|
ptr *string
|
|
|
|
// True if the environment variable needs to be tracked so that changes to the variable
|
|
// cause the ninja file to be regenerated, false otherwise. False should only be set for
|
|
// environment variables that have no effect on the generated ninja file.
|
|
track bool
|
|
}{
|
|
{"BAZEL_HOME", &paths.homeDir, true},
|
|
{"BAZEL_PATH", &paths.bazelPath, true},
|
|
{"BAZEL_OUTPUT_BASE", &paths.outputBase, true},
|
|
{"BAZEL_WORKSPACE", &paths.workspaceDir, true},
|
|
{"BAZEL_METRICS_DIR", &paths.metricsDir, false},
|
|
{"BAZEL_DEPS_FILE", &paths.bazelDepsFile, true},
|
|
}
|
|
for _, v := range vars {
|
|
if v.track {
|
|
if s := c.Getenv(v.name); len(s) > 1 {
|
|
*v.ptr = s
|
|
continue
|
|
}
|
|
} else if s, ok := c.env[v.name]; ok {
|
|
*v.ptr = s
|
|
} else {
|
|
missing = append(missing, v.name)
|
|
}
|
|
}
|
|
if len(missing) > 0 {
|
|
return nil, fmt.Errorf("missing required env vars to use bazel: %s", missing)
|
|
}
|
|
|
|
targetBuildVariant := "user"
|
|
if c.Eng() {
|
|
targetBuildVariant = "eng"
|
|
} else if c.Debuggable() {
|
|
targetBuildVariant = "userdebug"
|
|
}
|
|
targetProduct := "unknown"
|
|
if c.HasDeviceProduct() {
|
|
targetProduct = c.DeviceProduct()
|
|
}
|
|
dclaMixedBuildsEnabledList := []string{}
|
|
if c.BuildMode == BazelProdMode {
|
|
dclaMixedBuildsEnabledList = allowlists.ProdDclaMixedBuildsEnabledList
|
|
} else if c.BuildMode == BazelStagingMode {
|
|
dclaMixedBuildsEnabledList = append(allowlists.ProdDclaMixedBuildsEnabledList,
|
|
allowlists.StagingDclaMixedBuildsEnabledList...)
|
|
}
|
|
dclaEnabledModules := map[string]bool{}
|
|
AddToStringSet(dclaEnabledModules, dclaMixedBuildsEnabledList)
|
|
return &mixedBuildBazelContext{
|
|
bazelRunner: &builtinBazelRunner{c.UseBazelProxy, absolutePath(c.outDir)},
|
|
paths: &paths,
|
|
bazelEnabledModules: enabledModules,
|
|
bazelDisabledModules: disabledModules,
|
|
bazelDclaEnabledModules: dclaEnabledModules,
|
|
targetProduct: targetProduct,
|
|
targetBuildVariant: targetBuildVariant,
|
|
}, nil
|
|
}
|
|
|
|
func (p *bazelPaths) BazelMetricsDir() string {
|
|
return p.metricsDir
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) IsModuleNameAllowed(moduleName string, withinApex bool) bool {
|
|
if context.bazelDisabledModules[moduleName] {
|
|
return false
|
|
}
|
|
if context.bazelEnabledModules[moduleName] {
|
|
return true
|
|
}
|
|
if withinApex && context.bazelDclaEnabledModules[moduleName] {
|
|
return true
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
func pwdPrefix() string {
|
|
// Darwin doesn't have /proc
|
|
if runtime.GOOS != "darwin" {
|
|
return "PWD=/proc/self/cwd"
|
|
}
|
|
return ""
|
|
}
|
|
|
|
type bazelCommand struct {
|
|
command string
|
|
// query or label
|
|
expression string
|
|
}
|
|
|
|
type builtinBazelRunner struct {
|
|
useBazelProxy bool
|
|
outDir string
|
|
}
|
|
|
|
// Issues the given bazel command with given build label and additional flags.
|
|
// Returns (stdout, stderr, error). The first and second return values are strings
|
|
// containing the stdout and stderr of the run command, and an error is returned if
|
|
// the invocation returned an error code.
|
|
func (r *builtinBazelRunner) issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (string, string, error) {
|
|
if r.useBazelProxy {
|
|
eventHandler.Begin("client_proxy")
|
|
defer eventHandler.End("client_proxy")
|
|
proxyClient := bazel.NewProxyClient(r.outDir)
|
|
resp, err := proxyClient.IssueCommand(cmdRequest)
|
|
|
|
if err != nil {
|
|
return "", "", err
|
|
}
|
|
if len(resp.ErrorString) > 0 {
|
|
return "", "", fmt.Errorf(resp.ErrorString)
|
|
}
|
|
return resp.Stdout, resp.Stderr, nil
|
|
} else {
|
|
eventHandler.Begin("bazel command")
|
|
defer eventHandler.End("bazel command")
|
|
|
|
stdout, stderr, err := bazel.ExecBazel(paths.bazelPath, absolutePath(paths.syntheticWorkspaceDir()), cmdRequest)
|
|
return string(stdout), string(stderr), err
|
|
}
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) createBazelCommand(config Config, runName bazel.RunName, command bazelCommand,
|
|
extraFlags ...string) bazel.CmdRequest {
|
|
if runtime.GOOS != "linux" && runtime.GOOS != "darwin" {
|
|
panic("Unknown GOOS: " + runtime.GOOS)
|
|
}
|
|
cmdFlags := []string{
|
|
"--output_base=" + absolutePath(context.paths.outputBase),
|
|
command.command,
|
|
command.expression,
|
|
"--profile=" + shared.BazelMetricsFilename(context.paths, runName),
|
|
|
|
"--host_platform=@soong_injection//product_config_platforms:mixed_builds_product-" + context.targetBuildVariant + "_" + runtime.GOOS + "_x86_64",
|
|
// Don't specify --platforms, because on some products/branches (like kernel-build-tools)
|
|
// the main platform for mixed_builds_product-variant doesn't exist because an arch isn't
|
|
// specified in product config. The derivative platforms that config_node transitions into
|
|
// will still work.
|
|
|
|
// Suppress noise
|
|
"--ui_event_filters=-INFO",
|
|
"--noshow_progress",
|
|
"--norun_validations",
|
|
}
|
|
cmdFlags = append(cmdFlags, extraFlags...)
|
|
|
|
extraEnv := []string{
|
|
"HOME=" + context.paths.homeDir,
|
|
pwdPrefix(),
|
|
"BUILD_DIR=" + absolutePath(context.paths.soongOutDir),
|
|
// Make OUT_DIR absolute here so build/bazel/bin/bazel uses the correct
|
|
// OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out.
|
|
"OUT_DIR=" + absolutePath(context.paths.outDir()),
|
|
// Disables local host detection of gcc; toolchain information is defined
|
|
// explicitly in BUILD files.
|
|
"BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1",
|
|
}
|
|
capturedEnvVars, err := starlark_import.GetStarlarkValue[[]string]("captured_env_vars")
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
for _, envvar := range capturedEnvVars {
|
|
val := config.Getenv(envvar)
|
|
if val == "" {
|
|
continue
|
|
}
|
|
extraEnv = append(extraEnv, fmt.Sprintf("%s=%s", envvar, val))
|
|
}
|
|
envVars := append(os.Environ(), extraEnv...)
|
|
|
|
return bazel.CmdRequest{cmdFlags, envVars}
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) printableCqueryCommand(bazelCmd bazel.CmdRequest) string {
|
|
args := append([]string{context.paths.bazelPath}, bazelCmd.Argv...)
|
|
outputString := strings.Join(bazelCmd.Env, " ") + " \"" + strings.Join(args, "\" \"") + "\""
|
|
return outputString
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) mainBzlFileContents() []byte {
|
|
// TODO(cparsons): Define configuration transitions programmatically based
|
|
// on available archs.
|
|
contents := `
|
|
#####################################################
|
|
# This file is generated by soong_build. Do not edit.
|
|
#####################################################
|
|
def _config_node_transition_impl(settings, attr):
|
|
if attr.os == "android" and attr.arch == "target":
|
|
target = "mixed_builds_product-{VARIANT}"
|
|
else:
|
|
target = "mixed_builds_product-{VARIANT}_%s_%s" % (attr.os, attr.arch)
|
|
apex_name = ""
|
|
if attr.within_apex:
|
|
# //build/bazel/rules/apex:apex_name has to be set to a non_empty value,
|
|
# otherwise //build/bazel/rules/apex:non_apex will be true and the
|
|
# "-D__ANDROID_APEX__" compiler flag will be missing. Apex_name is used
|
|
# in some validation on bazel side which don't really apply in mixed
|
|
# build because soong will do the work, so we just set it to a fixed
|
|
# value here.
|
|
apex_name = "dcla_apex"
|
|
outputs = {
|
|
"//command_line_option:platforms": "@soong_injection//product_config_platforms:%s" % target,
|
|
"@//build/bazel/rules/apex:within_apex": attr.within_apex,
|
|
"@//build/bazel/rules/apex:min_sdk_version": attr.apex_sdk_version,
|
|
"@//build/bazel/rules/apex:apex_name": apex_name,
|
|
"@//build/bazel/rules/apex:api_domain": attr.api_domain,
|
|
}
|
|
|
|
return outputs
|
|
|
|
_config_node_transition = transition(
|
|
implementation = _config_node_transition_impl,
|
|
inputs = [],
|
|
outputs = [
|
|
"//command_line_option:platforms",
|
|
"@//build/bazel/rules/apex:within_apex",
|
|
"@//build/bazel/rules/apex:min_sdk_version",
|
|
"@//build/bazel/rules/apex:apex_name",
|
|
"@//build/bazel/rules/apex:api_domain",
|
|
],
|
|
)
|
|
|
|
def _passthrough_rule_impl(ctx):
|
|
return [DefaultInfo(files = depset(ctx.files.deps))]
|
|
|
|
config_node = rule(
|
|
implementation = _passthrough_rule_impl,
|
|
attrs = {
|
|
"arch" : attr.string(mandatory = True),
|
|
"os" : attr.string(mandatory = True),
|
|
"within_apex" : attr.bool(default = False),
|
|
"apex_sdk_version" : attr.string(mandatory = True),
|
|
"api_domain" : attr.string(mandatory = True),
|
|
"deps" : attr.label_list(cfg = _config_node_transition, allow_files = True),
|
|
"_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"),
|
|
},
|
|
)
|
|
|
|
|
|
# Rule representing the root of the build, to depend on all Bazel targets that
|
|
# are required for the build. Building this target will build the entire Bazel
|
|
# build tree.
|
|
mixed_build_root = rule(
|
|
implementation = _passthrough_rule_impl,
|
|
attrs = {
|
|
"deps" : attr.label_list(),
|
|
},
|
|
)
|
|
|
|
def _phony_root_impl(ctx):
|
|
return []
|
|
|
|
# Rule to depend on other targets but build nothing.
|
|
# This is useful as follows: building a target of this rule will generate
|
|
# symlink forests for all dependencies of the target, without executing any
|
|
# actions of the build.
|
|
phony_root = rule(
|
|
implementation = _phony_root_impl,
|
|
attrs = {"deps" : attr.label_list()},
|
|
)
|
|
`
|
|
|
|
productReplacer := strings.NewReplacer(
|
|
"{PRODUCT}", context.targetProduct,
|
|
"{VARIANT}", context.targetBuildVariant)
|
|
|
|
return []byte(productReplacer.Replace(contents))
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) mainBuildFileContents() []byte {
|
|
// TODO(cparsons): Map label to attribute programmatically; don't use hard-coded
|
|
// architecture mapping.
|
|
formatString := `
|
|
# This file is generated by soong_build. Do not edit.
|
|
load(":main.bzl", "config_node", "mixed_build_root", "phony_root")
|
|
|
|
%s
|
|
|
|
mixed_build_root(name = "buildroot",
|
|
deps = [%s],
|
|
testonly = True, # Unblocks testonly deps.
|
|
)
|
|
|
|
phony_root(name = "phonyroot",
|
|
deps = [":buildroot"],
|
|
testonly = True, # Unblocks testonly deps.
|
|
)
|
|
`
|
|
configNodeFormatString := `
|
|
config_node(name = "%s",
|
|
arch = "%s",
|
|
os = "%s",
|
|
within_apex = %s,
|
|
apex_sdk_version = "%s",
|
|
api_domain = "%s",
|
|
deps = [%s],
|
|
testonly = True, # Unblocks testonly deps.
|
|
)
|
|
`
|
|
|
|
configNodesSection := ""
|
|
|
|
labelsByConfig := map[string][]string{}
|
|
|
|
for _, val := range context.requests {
|
|
labelString := fmt.Sprintf("\"@%s\"", val.label)
|
|
configString := getConfigString(val)
|
|
labelsByConfig[configString] = append(labelsByConfig[configString], labelString)
|
|
}
|
|
|
|
// Configs need to be sorted to maintain determinism of the BUILD file.
|
|
sortedConfigs := make([]string, 0, len(labelsByConfig))
|
|
for val := range labelsByConfig {
|
|
sortedConfigs = append(sortedConfigs, val)
|
|
}
|
|
sort.Slice(sortedConfigs, func(i, j int) bool { return sortedConfigs[i] < sortedConfigs[j] })
|
|
|
|
allLabels := []string{}
|
|
for _, configString := range sortedConfigs {
|
|
labels := labelsByConfig[configString]
|
|
configTokens := strings.Split(configString, "|")
|
|
if len(configTokens) < 2 {
|
|
panic(fmt.Errorf("Unexpected config string format: %s", configString))
|
|
}
|
|
archString := configTokens[0]
|
|
osString := configTokens[1]
|
|
withinApex := "False"
|
|
apexSdkVerString := ""
|
|
apiDomainString := ""
|
|
if osString == "android" {
|
|
// api domains are meaningful only for device variants
|
|
apiDomainString = "system"
|
|
}
|
|
targetString := fmt.Sprintf("%s_%s", osString, archString)
|
|
if len(configTokens) > 2 {
|
|
targetString += "_" + configTokens[2]
|
|
if configTokens[2] == withinApexToString(true) {
|
|
withinApex = "True"
|
|
}
|
|
}
|
|
if len(configTokens) > 3 {
|
|
targetString += "_" + configTokens[3]
|
|
apexSdkVerString = configTokens[3]
|
|
}
|
|
if len(configTokens) > 4 {
|
|
apiDomainString = configTokens[4]
|
|
targetString += "_" + apiDomainString
|
|
}
|
|
allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString))
|
|
labelsString := strings.Join(labels, ",\n ")
|
|
configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, withinApex, apexSdkVerString, apiDomainString,
|
|
labelsString)
|
|
}
|
|
|
|
return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n ")))
|
|
}
|
|
|
|
func indent(original string) string {
|
|
result := ""
|
|
for _, line := range strings.Split(original, "\n") {
|
|
result += " " + line + "\n"
|
|
}
|
|
return result
|
|
}
|
|
|
|
// Returns the file contents of the buildroot.cquery file that should be used for the cquery
|
|
// expression in order to obtain information about buildroot and its dependencies.
|
|
// The contents of this file depend on the mixedBuildBazelContext's requests; requests are enumerated
|
|
// and grouped by their request type. The data retrieved for each label depends on its
|
|
// request type.
|
|
func (context *mixedBuildBazelContext) cqueryStarlarkFileContents() []byte {
|
|
requestTypeToCqueryIdEntries := map[cqueryRequest][]string{}
|
|
requestTypes := []cqueryRequest{}
|
|
for _, val := range context.requests {
|
|
cqueryId := getCqueryId(val)
|
|
mapEntryString := fmt.Sprintf("%q : True", cqueryId)
|
|
if _, seenKey := requestTypeToCqueryIdEntries[val.requestType]; !seenKey {
|
|
requestTypes = append(requestTypes, val.requestType)
|
|
}
|
|
requestTypeToCqueryIdEntries[val.requestType] =
|
|
append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString)
|
|
}
|
|
labelRegistrationMapSection := ""
|
|
functionDefSection := ""
|
|
mainSwitchSection := ""
|
|
|
|
mapDeclarationFormatString := `
|
|
%s = {
|
|
%s
|
|
}
|
|
`
|
|
functionDefFormatString := `
|
|
def %s(target, id_string):
|
|
%s
|
|
`
|
|
mainSwitchSectionFormatString := `
|
|
if id_string in %s:
|
|
return id_string + ">>" + %s(target, id_string)
|
|
`
|
|
|
|
for _, requestType := range requestTypes {
|
|
labelMapName := requestType.Name() + "_Labels"
|
|
functionName := requestType.Name() + "_Fn"
|
|
labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString,
|
|
labelMapName,
|
|
strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n "))
|
|
functionDefSection += fmt.Sprintf(functionDefFormatString,
|
|
functionName,
|
|
indent(requestType.StarlarkFunctionBody()))
|
|
mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString,
|
|
labelMapName, functionName)
|
|
}
|
|
|
|
formatString := `
|
|
# This file is generated by soong_build. Do not edit.
|
|
|
|
{LABEL_REGISTRATION_MAP_SECTION}
|
|
|
|
{FUNCTION_DEF_SECTION}
|
|
|
|
def get_arch(target):
|
|
# TODO(b/199363072): filegroups and file targets aren't associated with any
|
|
# specific platform architecture in mixed builds. This is consistent with how
|
|
# Soong treats filegroups, but it may not be the case with manually-written
|
|
# filegroup BUILD targets.
|
|
buildoptions = build_options(target)
|
|
|
|
if buildoptions == None:
|
|
# File targets do not have buildoptions. File targets aren't associated with
|
|
# any specific platform architecture in mixed builds, so use the host.
|
|
return "x86_64|linux"
|
|
platforms = buildoptions["//command_line_option:platforms"]
|
|
if len(platforms) != 1:
|
|
# An individual configured target should have only one platform architecture.
|
|
# Note that it's fine for there to be multiple architectures for the same label,
|
|
# but each is its own configured target.
|
|
fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms))
|
|
platform_name = platforms[0].name
|
|
if platform_name == "host":
|
|
return "HOST"
|
|
if not platform_name.startswith("mixed_builds_product-{TARGET_BUILD_VARIANT}"):
|
|
fail("expected platform name of the form 'mixed_builds_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'mixed_builds_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms))
|
|
platform_name = platform_name.removeprefix("mixed_builds_product-{TARGET_BUILD_VARIANT}").removeprefix("_")
|
|
config_key = ""
|
|
if not platform_name:
|
|
config_key = "target|android"
|
|
elif platform_name.startswith("android_"):
|
|
config_key = platform_name.removeprefix("android_") + "|android"
|
|
elif platform_name.startswith("linux_"):
|
|
config_key = platform_name.removeprefix("linux_") + "|linux"
|
|
else:
|
|
fail("expected platform name of the form 'mixed_builds_product-{TARGET_BUILD_VARIANT}_android_<arch>' or 'mixed_builds_product-{TARGET_BUILD_VARIANT}_linux_<arch>', but was " + str(platforms))
|
|
|
|
within_apex = buildoptions.get("//build/bazel/rules/apex:within_apex")
|
|
apex_sdk_version = buildoptions.get("//build/bazel/rules/apex:min_sdk_version")
|
|
api_domain = buildoptions.get("//build/bazel/rules/apex:api_domain")
|
|
|
|
if within_apex:
|
|
config_key += "|within_apex"
|
|
if apex_sdk_version != None and len(apex_sdk_version) > 0:
|
|
config_key += "|" + apex_sdk_version
|
|
if api_domain != None and len(api_domain) > 0:
|
|
config_key += "|" + api_domain
|
|
|
|
return config_key
|
|
|
|
def format(target):
|
|
id_string = str(target.label) + "|" + get_arch(target)
|
|
|
|
# TODO(b/248106697): Remove once Bazel is updated to always normalize labels.
|
|
if id_string.startswith("//"):
|
|
id_string = "@" + id_string
|
|
|
|
{MAIN_SWITCH_SECTION}
|
|
|
|
# This target was not requested via cquery, and thus must be a dependency
|
|
# of a requested target.
|
|
return id_string + ">>NONE"
|
|
`
|
|
replacer := strings.NewReplacer(
|
|
"{TARGET_PRODUCT}", context.targetProduct,
|
|
"{TARGET_BUILD_VARIANT}", context.targetBuildVariant,
|
|
"{LABEL_REGISTRATION_MAP_SECTION}", labelRegistrationMapSection,
|
|
"{FUNCTION_DEF_SECTION}", functionDefSection,
|
|
"{MAIN_SWITCH_SECTION}", mainSwitchSection)
|
|
|
|
return []byte(replacer.Replace(formatString))
|
|
}
|
|
|
|
// Returns a path containing build-related metadata required for interfacing
|
|
// with Bazel. Example: out/soong/bazel.
|
|
func (p *bazelPaths) intermediatesDir() string {
|
|
return filepath.Join(p.soongOutDir, "bazel")
|
|
}
|
|
|
|
// Returns the path where the contents of the @soong_injection repository live.
|
|
// It is used by Soong to tell Bazel things it cannot over the command line.
|
|
func (p *bazelPaths) injectedFilesDir() string {
|
|
return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName)
|
|
}
|
|
|
|
// Returns the path of the synthetic Bazel workspace that contains a symlink
|
|
// forest composed the whole source tree and BUILD files generated by bp2build.
|
|
func (p *bazelPaths) syntheticWorkspaceDir() string {
|
|
return filepath.Join(p.soongOutDir, "workspace")
|
|
}
|
|
|
|
// Returns the path to the top level out dir ($OUT_DIR).
|
|
func (p *bazelPaths) outDir() string {
|
|
return filepath.Dir(p.soongOutDir)
|
|
}
|
|
|
|
const buildrootLabel = "@soong_injection//mixed_builds:buildroot"
|
|
|
|
var (
|
|
cqueryCmd = bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)}
|
|
aqueryCmd = bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)}
|
|
buildCmd = bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"}
|
|
allBazelCommands = []bazelCommand{aqueryCmd, cqueryCmd, buildCmd}
|
|
)
|
|
|
|
func GetBazelSandwichCqueryRequests(config Config) ([]cqueryKey, error) {
|
|
result := make([]cqueryKey, 0, len(allowlists.BazelSandwichTargets))
|
|
labelRegex := regexp.MustCompile("^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$")
|
|
// Note that bazel "targets" are different from soong "targets", the bazel targets are
|
|
// synonymous with soong modules, and soong targets are a configuration a module is built in.
|
|
for _, target := range allowlists.BazelSandwichTargets {
|
|
match := labelRegex.FindStringSubmatch(target.Label)
|
|
if match == nil {
|
|
return nil, fmt.Errorf("invalid label, must match `^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$`: %s", target.Label)
|
|
}
|
|
if _, err := os.Stat(absolutePath(match[1])); err != nil {
|
|
if os.IsNotExist(err) {
|
|
// Ignore bazel sandwich targets that don't exist.
|
|
continue
|
|
} else {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
var soongTarget Target
|
|
if target.Host {
|
|
soongTarget = config.BuildOSTarget
|
|
} else {
|
|
soongTarget = config.AndroidCommonTarget
|
|
if soongTarget.Os.Class != Device {
|
|
// kernel-build-tools seems to set the AndroidCommonTarget to a linux host
|
|
// target for some reason, disable device builds in that case.
|
|
continue
|
|
}
|
|
}
|
|
|
|
result = append(result, cqueryKey{
|
|
label: target.Label,
|
|
requestType: cquery.GetOutputFiles,
|
|
configKey: configKey{
|
|
arch: soongTarget.Arch.String(),
|
|
osType: soongTarget.Os,
|
|
},
|
|
})
|
|
}
|
|
return result, nil
|
|
}
|
|
|
|
// QueueBazelSandwichCqueryRequests queues cquery requests for all the bazel labels in
|
|
// bazel_sandwich_targets. These will later be given phony targets so that they can be built on the
|
|
// command line.
|
|
func (context *mixedBuildBazelContext) QueueBazelSandwichCqueryRequests(config Config) error {
|
|
requests, err := GetBazelSandwichCqueryRequests(config)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, request := range requests {
|
|
context.QueueBazelRequest(request.label, request.requestType, request.configKey)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Issues commands to Bazel to receive results for all cquery requests
|
|
// queued in the BazelContext.
|
|
func (context *mixedBuildBazelContext) InvokeBazel(config Config, ctx invokeBazelContext) error {
|
|
eventHandler := ctx.GetEventHandler()
|
|
eventHandler.Begin("bazel")
|
|
defer eventHandler.End("bazel")
|
|
|
|
if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" {
|
|
if err := os.MkdirAll(metricsDir, 0777); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
context.results = make(map[cqueryKey]string)
|
|
if err := context.runCquery(config, ctx); err != nil {
|
|
return err
|
|
}
|
|
if err := context.runAquery(config, ctx); err != nil {
|
|
return err
|
|
}
|
|
if err := context.generateBazelSymlinks(config, ctx); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Clear requests.
|
|
context.requests = []cqueryKey{}
|
|
return nil
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) runCquery(config Config, ctx invokeBazelContext) error {
|
|
eventHandler := ctx.GetEventHandler()
|
|
eventHandler.Begin("cquery")
|
|
defer eventHandler.End("cquery")
|
|
soongInjectionPath := absolutePath(context.paths.injectedFilesDir())
|
|
mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds")
|
|
if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) {
|
|
err = os.MkdirAll(mixedBuildsPath, 0777)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := writeFileBytesIfChanged(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666); err != nil {
|
|
return err
|
|
}
|
|
if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "main.bzl"), context.mainBzlFileContents(), 0666); err != nil {
|
|
return err
|
|
}
|
|
if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "BUILD.bazel"), context.mainBuildFileContents(), 0666); err != nil {
|
|
return err
|
|
}
|
|
cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery")
|
|
if err := writeFileBytesIfChanged(absolutePath(cqueryFileRelpath), context.cqueryStarlarkFileContents(), 0666); err != nil {
|
|
return err
|
|
}
|
|
|
|
extraFlags := []string{"--output=starlark", "--starlark:file=" + absolutePath(cqueryFileRelpath)}
|
|
if Bool(config.productVariables.ClangCoverage) {
|
|
extraFlags = append(extraFlags, "--collect_code_coverage")
|
|
}
|
|
|
|
cqueryCmdRequest := context.createBazelCommand(config, bazel.CqueryBuildRootRunName, cqueryCmd, extraFlags...)
|
|
cqueryOutput, cqueryErrorMessage, cqueryErr := context.issueBazelCommand(cqueryCmdRequest, context.paths, eventHandler)
|
|
if cqueryErr != nil {
|
|
return cqueryErr
|
|
}
|
|
cqueryCommandPrint := fmt.Sprintf("cquery command line:\n %s \n\n\n", context.printableCqueryCommand(cqueryCmdRequest))
|
|
if err := os.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"), []byte(cqueryCommandPrint+cqueryOutput), 0666); err != nil {
|
|
return err
|
|
}
|
|
cqueryResults := map[string]string{}
|
|
for _, outputLine := range strings.Split(cqueryOutput, "\n") {
|
|
if strings.Contains(outputLine, ">>") {
|
|
splitLine := strings.SplitN(outputLine, ">>", 2)
|
|
cqueryResults[splitLine[0]] = splitLine[1]
|
|
}
|
|
}
|
|
for _, val := range context.requests {
|
|
if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok {
|
|
context.results[val] = cqueryResult
|
|
} else {
|
|
return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]",
|
|
getCqueryId(val), cqueryOutput, cqueryErrorMessage)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func writeFileBytesIfChanged(path string, contents []byte, perm os.FileMode) error {
|
|
oldContents, err := os.ReadFile(path)
|
|
if err != nil || !bytes.Equal(contents, oldContents) {
|
|
err = os.WriteFile(path, contents, perm)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) runAquery(config Config, ctx invokeBazelContext) error {
|
|
eventHandler := ctx.GetEventHandler()
|
|
eventHandler.Begin("aquery")
|
|
defer eventHandler.End("aquery")
|
|
// Issue an aquery command to retrieve action information about the bazel build tree.
|
|
//
|
|
// Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's
|
|
// proto sources, which would add a number of unnecessary dependencies.
|
|
extraFlags := []string{"--output=proto", "--include_file_write_contents"}
|
|
if Bool(config.productVariables.ClangCoverage) {
|
|
extraFlags = append(extraFlags, "--collect_code_coverage")
|
|
paths := make([]string, 0, 2)
|
|
if p := config.productVariables.NativeCoveragePaths; len(p) > 0 {
|
|
for i := range p {
|
|
// TODO(b/259404593) convert path wildcard to regex values
|
|
if p[i] == "*" {
|
|
p[i] = ".*"
|
|
}
|
|
}
|
|
paths = append(paths, JoinWithPrefixAndSeparator(p, "+", ","))
|
|
}
|
|
if p := config.productVariables.NativeCoverageExcludePaths; len(p) > 0 {
|
|
paths = append(paths, JoinWithPrefixAndSeparator(p, "-", ","))
|
|
}
|
|
if len(paths) > 0 {
|
|
extraFlags = append(extraFlags, "--instrumentation_filter="+strings.Join(paths, ","))
|
|
}
|
|
}
|
|
aqueryOutput, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.AqueryBuildRootRunName, aqueryCmd,
|
|
extraFlags...), context.paths, eventHandler)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput), eventHandler)
|
|
return err
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) generateBazelSymlinks(config Config, ctx invokeBazelContext) error {
|
|
eventHandler := ctx.GetEventHandler()
|
|
eventHandler.Begin("symlinks")
|
|
defer eventHandler.End("symlinks")
|
|
// Issue a build command of the phony root to generate symlink forests for dependencies of the
|
|
// Bazel build. This is necessary because aquery invocations do not generate this symlink forest,
|
|
// but some of symlinks may be required to resolve source dependencies of the build.
|
|
_, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.BazelBuildPhonyRootRunName, buildCmd), context.paths, eventHandler)
|
|
return err
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement {
|
|
return context.buildStatements
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return context.depsets
|
|
}
|
|
|
|
func (context *mixedBuildBazelContext) OutputBase() string {
|
|
return context.paths.outputBase
|
|
}
|
|
|
|
// Singleton used for registering BUILD file ninja dependencies (needed
|
|
// for correctness of builds which use Bazel.
|
|
func BazelSingleton() Singleton {
|
|
return &bazelSingleton{}
|
|
}
|
|
|
|
type bazelSingleton struct{}
|
|
|
|
func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) {
|
|
// bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled.
|
|
if !ctx.Config().IsMixedBuildsEnabled() {
|
|
return
|
|
}
|
|
|
|
// Add ninja file dependencies for files which all bazel invocations require.
|
|
bazelBuildList := absolutePath(filepath.Join(
|
|
filepath.Dir(ctx.Config().moduleListFile), "bazel.list"))
|
|
ctx.AddNinjaFileDeps(bazelBuildList)
|
|
|
|
data, err := os.ReadFile(bazelBuildList)
|
|
if err != nil {
|
|
ctx.Errorf(err.Error())
|
|
}
|
|
files := strings.Split(strings.TrimSpace(string(data)), "\n")
|
|
for _, file := range files {
|
|
ctx.AddNinjaFileDeps(file)
|
|
}
|
|
|
|
depsetHashToDepset := map[string]bazel.AqueryDepset{}
|
|
|
|
for _, depset := range ctx.Config().BazelContext.AqueryDepsets() {
|
|
depsetHashToDepset[depset.ContentHash] = depset
|
|
|
|
var outputs []Path
|
|
var orderOnlies []Path
|
|
for _, depsetDepHash := range depset.TransitiveDepSetHashes {
|
|
otherDepsetName := bazelDepsetName(depsetDepHash)
|
|
outputs = append(outputs, PathForPhony(ctx, otherDepsetName))
|
|
}
|
|
for _, artifactPath := range depset.DirectArtifacts {
|
|
pathInBazelOut := PathForBazelOut(ctx, artifactPath)
|
|
if artifactPath == "bazel-out/volatile-status.txt" {
|
|
// See https://bazel.build/docs/user-manual#workspace-status
|
|
orderOnlies = append(orderOnlies, pathInBazelOut)
|
|
} else {
|
|
outputs = append(outputs, pathInBazelOut)
|
|
}
|
|
}
|
|
thisDepsetName := bazelDepsetName(depset.ContentHash)
|
|
ctx.Build(pctx, BuildParams{
|
|
Rule: blueprint.Phony,
|
|
Outputs: []WritablePath{PathForPhony(ctx, thisDepsetName)},
|
|
Implicits: outputs,
|
|
OrderOnly: orderOnlies,
|
|
})
|
|
}
|
|
|
|
executionRoot := path.Join(ctx.Config().BazelContext.OutputBase(), "execroot", "__main__")
|
|
bazelOutDir := path.Join(executionRoot, "bazel-out")
|
|
rel, err := filepath.Rel(ctx.Config().OutDir(), executionRoot)
|
|
if err != nil {
|
|
ctx.Errorf("%s", err.Error())
|
|
}
|
|
dotdotsToOutRoot := strings.Repeat("../", strings.Count(rel, "/")+1)
|
|
for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() {
|
|
// nil build statements are a valid case where we do not create an action because it is
|
|
// unnecessary or handled by other processing
|
|
if buildStatement == nil {
|
|
continue
|
|
}
|
|
if len(buildStatement.Command) > 0 {
|
|
rule := NewRuleBuilder(pctx, ctx)
|
|
intermediateDir, intermediateDirHash := intermediatePathForSboxMixedBuildAction(ctx, buildStatement)
|
|
if buildStatement.ShouldRunInSbox {
|
|
// Create a rule to build the output inside a sandbox
|
|
// This will create two changes of working directory
|
|
// 1. From ANDROID_BUILD_TOP to sbox top
|
|
// 2. From sbox top to a a synthetic mixed build execution root relative to it
|
|
// Finally, the outputs will be copied to intermediateDir
|
|
rule.Sbox(intermediateDir,
|
|
PathForOutput(ctx, "mixed_build_sbox_intermediates", intermediateDirHash+".textproto")).
|
|
SandboxInputs().
|
|
// Since we will cd to mixed build execution root, set sbox's out subdir to empty
|
|
// Without this, we will try to copy from $SBOX_SANDBOX_DIR/out/out/bazel/output/execroot/__main__/...
|
|
SetSboxOutDirDirAsEmpty()
|
|
|
|
// Create another set of rules to copy files from the intermediate dir to mixed build execution root
|
|
for _, outputPath := range buildStatement.OutputPaths {
|
|
ctx.Build(pctx, BuildParams{
|
|
Rule: CpIfChanged,
|
|
Input: intermediateDir.Join(ctx, executionRoot, outputPath),
|
|
Output: PathForBazelOut(ctx, outputPath),
|
|
})
|
|
}
|
|
}
|
|
createCommand(rule.Command(), buildStatement, executionRoot, bazelOutDir, ctx, depsetHashToDepset, dotdotsToOutRoot)
|
|
|
|
desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths)
|
|
rule.Build(fmt.Sprintf("bazel %d", index), desc)
|
|
continue
|
|
}
|
|
// Certain actions returned by aquery (for instance FileWrite) do not contain a command
|
|
// and thus require special treatment. If BuildStatement were an interface implementing
|
|
// buildRule(ctx) function, the code here would just call it.
|
|
// Unfortunately, the BuildStatement is defined in
|
|
// the 'bazel' package, which cannot depend on 'android' package where ctx is defined,
|
|
// because this would cause circular dependency. So, until we move aquery processing
|
|
// to the 'android' package, we need to handle special cases here.
|
|
switch buildStatement.Mnemonic {
|
|
case "RepoMappingManifest":
|
|
// It appears RepoMappingManifest files currently have
|
|
// non-deterministic content. Just emit empty files for
|
|
// now because they're unused.
|
|
out := PathForBazelOut(ctx, buildStatement.OutputPaths[0])
|
|
WriteFileRuleVerbatim(ctx, out, "")
|
|
case "FileWrite", "SourceSymlinkManifest":
|
|
out := PathForBazelOut(ctx, buildStatement.OutputPaths[0])
|
|
if buildStatement.IsExecutable {
|
|
WriteExecutableFileRuleVerbatim(ctx, out, buildStatement.FileContents)
|
|
} else {
|
|
WriteFileRuleVerbatim(ctx, out, buildStatement.FileContents)
|
|
}
|
|
case "SymlinkTree":
|
|
// build-runfiles arguments are the manifest file and the target directory
|
|
// where it creates the symlink tree according to this manifest (and then
|
|
// writes the MANIFEST file to it).
|
|
outManifest := PathForBazelOut(ctx, buildStatement.OutputPaths[0])
|
|
outManifestPath := outManifest.String()
|
|
if !strings.HasSuffix(outManifestPath, "MANIFEST") {
|
|
panic("the base name of the symlink tree action should be MANIFEST, got " + outManifestPath)
|
|
}
|
|
outDir := filepath.Dir(outManifestPath)
|
|
ctx.Build(pctx, BuildParams{
|
|
Rule: buildRunfilesRule,
|
|
Output: outManifest,
|
|
Inputs: []Path{PathForBazelOut(ctx, buildStatement.InputPaths[0])},
|
|
Description: "symlink tree for " + outDir,
|
|
Args: map[string]string{
|
|
"outDir": outDir,
|
|
},
|
|
})
|
|
default:
|
|
panic(fmt.Sprintf("unhandled build statement: %v", buildStatement))
|
|
}
|
|
}
|
|
|
|
// Create phony targets for all the bazel sandwich output files
|
|
requests, err := GetBazelSandwichCqueryRequests(ctx.Config())
|
|
if err != nil {
|
|
ctx.Errorf(err.Error())
|
|
}
|
|
for _, request := range requests {
|
|
files, err := ctx.Config().BazelContext.GetOutputFiles(request.label, request.configKey)
|
|
if err != nil {
|
|
ctx.Errorf(err.Error())
|
|
}
|
|
filesAsPaths := make([]Path, 0, len(files))
|
|
for _, file := range files {
|
|
filesAsPaths = append(filesAsPaths, PathForBazelOut(ctx, file))
|
|
}
|
|
ctx.Phony("bazel_sandwich", filesAsPaths...)
|
|
}
|
|
ctx.Phony("checkbuild", PathForPhony(ctx, "bazel_sandwich"))
|
|
}
|
|
|
|
// Returns a out dir path for a sandboxed mixed build action
|
|
func intermediatePathForSboxMixedBuildAction(ctx PathContext, statement *bazel.BuildStatement) (OutputPath, string) {
|
|
// An artifact can be generated by a single buildstatement.
|
|
// Use the hash of the first artifact to create a unique path
|
|
uniqueDir := sha1.New()
|
|
uniqueDir.Write([]byte(statement.OutputPaths[0]))
|
|
uniqueDirHashString := hex.EncodeToString(uniqueDir.Sum(nil))
|
|
return PathForOutput(ctx, "mixed_build_sbox_intermediates", uniqueDirHashString), uniqueDirHashString
|
|
}
|
|
|
|
// Register bazel-owned build statements (obtained from the aquery invocation).
|
|
func createCommand(cmd *RuleBuilderCommand, buildStatement *bazel.BuildStatement, executionRoot string, bazelOutDir string, ctx BuilderContext, depsetHashToDepset map[string]bazel.AqueryDepset, dotdotsToOutRoot string) {
|
|
// executionRoot is the action cwd.
|
|
if buildStatement.ShouldRunInSbox {
|
|
// mkdir -p ensures that the directory exists when run via sbox
|
|
cmd.Text(fmt.Sprintf("mkdir -p '%s' && cd '%s' &&", executionRoot, executionRoot))
|
|
} else {
|
|
cmd.Text(fmt.Sprintf("cd '%s' &&", executionRoot))
|
|
}
|
|
|
|
// Remove old outputs, as some actions might not rerun if the outputs are detected.
|
|
if len(buildStatement.OutputPaths) > 0 {
|
|
cmd.Text("rm -rf") // -r because outputs can be Bazel dir/tree artifacts.
|
|
for _, outputPath := range buildStatement.OutputPaths {
|
|
cmd.Text(fmt.Sprintf("'%s'", outputPath))
|
|
}
|
|
cmd.Text("&&")
|
|
}
|
|
|
|
for _, pair := range buildStatement.Env {
|
|
// Set per-action env variables, if any.
|
|
cmd.Flag(pair.Key + "=" + pair.Value)
|
|
}
|
|
|
|
command := buildStatement.Command
|
|
command = strings.ReplaceAll(command, "{DOTDOTS_TO_OUTPUT_ROOT}", dotdotsToOutRoot)
|
|
|
|
// The actual Bazel action.
|
|
if len(command) > 16*1024 {
|
|
commandFile := PathForBazelOut(ctx, buildStatement.OutputPaths[0]+".sh")
|
|
WriteFileRule(ctx, commandFile, command)
|
|
|
|
cmd.Text("bash").Text(buildStatement.OutputPaths[0] + ".sh").Implicit(commandFile)
|
|
} else {
|
|
cmd.Text(command)
|
|
}
|
|
|
|
for _, outputPath := range buildStatement.OutputPaths {
|
|
if buildStatement.ShouldRunInSbox {
|
|
// The full path has three components that get joined together
|
|
// 1. intermediate output dir that `sbox` will place the artifacts at
|
|
// 2. mixed build execution root
|
|
// 3. artifact path returned by aquery
|
|
intermediateDir, _ := intermediatePathForSboxMixedBuildAction(ctx, buildStatement)
|
|
cmd.ImplicitOutput(intermediateDir.Join(ctx, executionRoot, outputPath))
|
|
} else {
|
|
cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath))
|
|
}
|
|
}
|
|
for _, inputPath := range buildStatement.InputPaths {
|
|
cmd.Implicit(PathForBazelOut(ctx, inputPath))
|
|
}
|
|
for _, inputDepsetHash := range buildStatement.InputDepsetHashes {
|
|
if buildStatement.ShouldRunInSbox {
|
|
// Bazel depsets are phony targets that are used to group files.
|
|
// We need to copy the grouped files into the sandbox
|
|
ds, _ := depsetHashToDepset[inputDepsetHash]
|
|
cmd.Implicits(PathsForBazelOut(ctx, ds.DirectArtifacts))
|
|
} else {
|
|
otherDepsetName := bazelDepsetName(inputDepsetHash)
|
|
cmd.Implicit(PathForPhony(ctx, otherDepsetName))
|
|
}
|
|
}
|
|
for _, implicitPath := range buildStatement.ImplicitDeps {
|
|
cmd.Implicit(PathForArbitraryOutput(ctx, implicitPath))
|
|
}
|
|
|
|
if depfile := buildStatement.Depfile; depfile != nil {
|
|
// The paths in depfile are relative to `executionRoot`.
|
|
// Hence, they need to be corrected by replacing "bazel-out"
|
|
// with the full `bazelOutDir`.
|
|
// Otherwise, implicit outputs and implicit inputs under "bazel-out/"
|
|
// would be deemed missing.
|
|
// (Note: The regexp uses a capture group because the version of sed
|
|
// does not support a look-behind pattern.)
|
|
replacement := fmt.Sprintf(`&& sed -i'' -E 's@(^|\s|")bazel-out/@\1%s/@g' '%s'`,
|
|
bazelOutDir, *depfile)
|
|
cmd.Text(replacement)
|
|
cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile))
|
|
}
|
|
|
|
for _, symlinkPath := range buildStatement.SymlinkPaths {
|
|
cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath))
|
|
}
|
|
}
|
|
|
|
func getCqueryId(key cqueryKey) string {
|
|
return key.label + "|" + getConfigString(key)
|
|
}
|
|
|
|
func getConfigString(key cqueryKey) string {
|
|
arch := key.configKey.arch
|
|
if len(arch) == 0 || arch == "common" {
|
|
if key.configKey.osType.Class == Device {
|
|
// For the generic Android, the expected result is "target|android", which
|
|
// corresponds to the product_variable_config named "android_target" in
|
|
// build/bazel/platforms/BUILD.bazel.
|
|
arch = "target"
|
|
} else {
|
|
// Use host platform, which is currently hardcoded to be x86_64.
|
|
arch = "x86_64"
|
|
}
|
|
}
|
|
osName := key.configKey.osType.Name
|
|
if len(osName) == 0 || osName == "common_os" || osName == "linux_glibc" || osName == "linux_musl" {
|
|
// Use host OS, which is currently hardcoded to be linux.
|
|
osName = "linux"
|
|
}
|
|
keyString := arch + "|" + osName
|
|
if key.configKey.apexKey.WithinApex {
|
|
keyString += "|" + withinApexToString(key.configKey.apexKey.WithinApex)
|
|
}
|
|
|
|
if len(key.configKey.apexKey.ApexSdkVersion) > 0 {
|
|
keyString += "|" + key.configKey.apexKey.ApexSdkVersion
|
|
}
|
|
|
|
if len(key.configKey.apexKey.ApiDomain) > 0 {
|
|
keyString += "|" + key.configKey.apexKey.ApiDomain
|
|
}
|
|
|
|
return keyString
|
|
}
|
|
|
|
func GetConfigKey(ctx BaseModuleContext) configKey {
|
|
return configKey{
|
|
// use string because Arch is not a valid key in go
|
|
arch: ctx.Arch().String(),
|
|
osType: ctx.Os(),
|
|
}
|
|
}
|
|
|
|
func GetConfigKeyApexVariant(ctx BaseModuleContext, apexKey *ApexConfigKey) configKey {
|
|
configKey := GetConfigKey(ctx)
|
|
|
|
if apexKey != nil {
|
|
configKey.apexKey = ApexConfigKey{
|
|
WithinApex: apexKey.WithinApex,
|
|
ApexSdkVersion: apexKey.ApexSdkVersion,
|
|
ApiDomain: apexKey.ApiDomain,
|
|
}
|
|
}
|
|
|
|
return configKey
|
|
}
|
|
|
|
func bazelDepsetName(contentHash string) string {
|
|
return fmt.Sprintf("bazel_depset_%s", contentHash)
|
|
}
|