959 lines
31 KiB
Go
959 lines
31 KiB
Go
// Copyright 2020 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package android
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"sync"
|
|
|
|
"android/soong/bazel/cquery"
|
|
"android/soong/shared"
|
|
"github.com/google/blueprint"
|
|
|
|
"android/soong/bazel"
|
|
)
|
|
|
|
func init() {
|
|
RegisterMixedBuildsMutator(InitRegistrationContext)
|
|
}
|
|
|
|
func RegisterMixedBuildsMutator(ctx RegistrationContext) {
|
|
ctx.PostDepsMutators(func(ctx RegisterMutatorsContext) {
|
|
ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel()
|
|
})
|
|
}
|
|
|
|
func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) {
|
|
if m := ctx.Module(); m.Enabled() {
|
|
if mixedBuildMod, ok := m.(MixedBuildBuildable); ok {
|
|
if mixedBuildMod.IsMixedBuildSupported(ctx) && MixedBuildsEnabled(ctx) {
|
|
mixedBuildMod.QueueBazelCall(ctx)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
type cqueryRequest interface {
|
|
// Name returns a string name for this request type. Such request type names must be unique,
|
|
// and must only consist of alphanumeric characters.
|
|
Name() string
|
|
|
|
// StarlarkFunctionBody returns a starlark function body to process this request type.
|
|
// The returned string is the body of a Starlark function which obtains
|
|
// all request-relevant information about a target and returns a string containing
|
|
// this information.
|
|
// The function should have the following properties:
|
|
// - `target` is the only parameter to this function (a configured target).
|
|
// - The return value must be a string.
|
|
// - The function body should not be indented outside of its own scope.
|
|
StarlarkFunctionBody() string
|
|
}
|
|
|
|
// Portion of cquery map key to describe target configuration.
|
|
type configKey struct {
|
|
arch string
|
|
osType OsType
|
|
}
|
|
|
|
// Map key to describe bazel cquery requests.
|
|
type cqueryKey struct {
|
|
label string
|
|
requestType cqueryRequest
|
|
configKey configKey
|
|
}
|
|
|
|
// BazelContext is a context object useful for interacting with Bazel during
|
|
// the course of a build. Use of Bazel to evaluate part of the build graph
|
|
// is referred to as a "mixed build". (Some modules are managed by Soong,
|
|
// some are managed by Bazel). To facilitate interop between these build
|
|
// subgraphs, Soong may make requests to Bazel and evaluate their responses
|
|
// so that Soong modules may accurately depend on Bazel targets.
|
|
type BazelContext interface {
|
|
// Add a cquery request to the bazel request queue. All queued requests
|
|
// will be sent to Bazel on a subsequent invocation of InvokeBazel.
|
|
QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey)
|
|
|
|
// ** Cquery Results Retrieval Functions
|
|
// The below functions pertain to retrieving cquery results from a prior
|
|
// InvokeBazel function call and parsing the results.
|
|
|
|
// Returns result files built by building the given bazel target label.
|
|
GetOutputFiles(label string, cfgKey configKey) ([]string, error)
|
|
|
|
// Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order).
|
|
GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error)
|
|
|
|
// Returns the executable binary resultant from building together the python sources
|
|
// TODO(b/232976601): Remove.
|
|
GetPythonBinary(label string, cfgKey configKey) (string, error)
|
|
|
|
// ** end Cquery Results Retrieval Functions
|
|
|
|
// Issues commands to Bazel to receive results for all cquery requests
|
|
// queued in the BazelContext.
|
|
InvokeBazel(config Config) error
|
|
|
|
// Returns true if bazel is enabled for the given configuration.
|
|
BazelEnabled() bool
|
|
|
|
// Returns the bazel output base (the root directory for all bazel intermediate outputs).
|
|
OutputBase() string
|
|
|
|
// Returns build statements which should get registered to reflect Bazel's outputs.
|
|
BuildStatementsToRegister() []bazel.BuildStatement
|
|
|
|
// Returns the depsets defined in Bazel's aquery response.
|
|
AqueryDepsets() []bazel.AqueryDepset
|
|
}
|
|
|
|
type bazelRunner interface {
|
|
issueBazelCommand(paths *bazelPaths, runName bazel.RunName, command bazelCommand, extraFlags ...string) (string, string, error)
|
|
}
|
|
|
|
type bazelPaths struct {
|
|
homeDir string
|
|
bazelPath string
|
|
outputBase string
|
|
workspaceDir string
|
|
soongOutDir string
|
|
metricsDir string
|
|
}
|
|
|
|
// A context object which tracks queued requests that need to be made to Bazel,
|
|
// and their results after the requests have been made.
|
|
type bazelContext struct {
|
|
bazelRunner
|
|
paths *bazelPaths
|
|
requests map[cqueryKey]bool // cquery requests that have not yet been issued to Bazel
|
|
requestMutex sync.Mutex // requests can be written in parallel
|
|
|
|
results map[cqueryKey]string // Results of cquery requests after Bazel invocations
|
|
|
|
// Build statements which should get registered to reflect Bazel's outputs.
|
|
buildStatements []bazel.BuildStatement
|
|
|
|
// Depsets which should be used for Bazel's build statements.
|
|
depsets []bazel.AqueryDepset
|
|
}
|
|
|
|
var _ BazelContext = &bazelContext{}
|
|
|
|
// A bazel context to use when Bazel is disabled.
|
|
type noopBazelContext struct{}
|
|
|
|
var _ BazelContext = noopBazelContext{}
|
|
|
|
// A bazel context to use for tests.
|
|
type MockBazelContext struct {
|
|
OutputBaseDir string
|
|
|
|
LabelToOutputFiles map[string][]string
|
|
LabelToCcInfo map[string]cquery.CcInfo
|
|
LabelToPythonBinary map[string]string
|
|
}
|
|
|
|
func (m MockBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m MockBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) {
|
|
result, _ := m.LabelToOutputFiles[label]
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) {
|
|
result, _ := m.LabelToCcInfo[label]
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) GetPythonBinary(label string, cfgKey configKey) (string, error) {
|
|
result, _ := m.LabelToPythonBinary[label]
|
|
return result, nil
|
|
}
|
|
|
|
func (m MockBazelContext) InvokeBazel(config Config) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m MockBazelContext) BazelEnabled() bool {
|
|
return true
|
|
}
|
|
|
|
func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir }
|
|
|
|
func (m MockBazelContext) BuildStatementsToRegister() []bazel.BuildStatement {
|
|
return []bazel.BuildStatement{}
|
|
}
|
|
|
|
func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return []bazel.AqueryDepset{}
|
|
}
|
|
|
|
var _ BazelContext = MockBazelContext{}
|
|
|
|
func (bazelCtx *bazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) {
|
|
key := cqueryKey{label, requestType, cfgKey}
|
|
bazelCtx.requestMutex.Lock()
|
|
defer bazelCtx.requestMutex.Unlock()
|
|
bazelCtx.requests[key] = true
|
|
}
|
|
|
|
func (bazelCtx *bazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) {
|
|
key := cqueryKey{label, cquery.GetOutputFiles, cfgKey}
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
bazelOutput := strings.TrimSpace(rawString)
|
|
return cquery.GetOutputFiles.ParseResult(bazelOutput), nil
|
|
}
|
|
return nil, fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (bazelCtx *bazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) {
|
|
key := cqueryKey{label, cquery.GetCcInfo, cfgKey}
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
bazelOutput := strings.TrimSpace(rawString)
|
|
return cquery.GetCcInfo.ParseResult(bazelOutput)
|
|
}
|
|
return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (bazelCtx *bazelContext) GetPythonBinary(label string, cfgKey configKey) (string, error) {
|
|
key := cqueryKey{label, cquery.GetPythonBinary, cfgKey}
|
|
if rawString, ok := bazelCtx.results[key]; ok {
|
|
bazelOutput := strings.TrimSpace(rawString)
|
|
return cquery.GetPythonBinary.ParseResult(bazelOutput), nil
|
|
}
|
|
return "", fmt.Errorf("no bazel response found for %v", key)
|
|
}
|
|
|
|
func (n noopBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) GetPythonBinary(label string, cfgKey configKey) (string, error) {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (n noopBazelContext) InvokeBazel(config Config) error {
|
|
panic("unimplemented")
|
|
}
|
|
|
|
func (m noopBazelContext) OutputBase() string {
|
|
return ""
|
|
}
|
|
|
|
func (n noopBazelContext) BazelEnabled() bool {
|
|
return false
|
|
}
|
|
|
|
func (m noopBazelContext) BuildStatementsToRegister() []bazel.BuildStatement {
|
|
return []bazel.BuildStatement{}
|
|
}
|
|
|
|
func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return []bazel.AqueryDepset{}
|
|
}
|
|
|
|
func NewBazelContext(c *config) (BazelContext, error) {
|
|
// TODO(cparsons): Assess USE_BAZEL=1 instead once "mixed Soong/Bazel builds"
|
|
// are production ready.
|
|
if !c.IsEnvTrue("USE_BAZEL_ANALYSIS") {
|
|
return noopBazelContext{}, nil
|
|
}
|
|
|
|
p, err := bazelPathsFromConfig(c)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &bazelContext{
|
|
bazelRunner: &builtinBazelRunner{},
|
|
paths: p,
|
|
requests: make(map[cqueryKey]bool),
|
|
}, nil
|
|
}
|
|
|
|
func bazelPathsFromConfig(c *config) (*bazelPaths, error) {
|
|
p := bazelPaths{
|
|
soongOutDir: c.soongOutDir,
|
|
}
|
|
missingEnvVars := []string{}
|
|
if len(c.Getenv("BAZEL_HOME")) > 1 {
|
|
p.homeDir = c.Getenv("BAZEL_HOME")
|
|
} else {
|
|
missingEnvVars = append(missingEnvVars, "BAZEL_HOME")
|
|
}
|
|
if len(c.Getenv("BAZEL_PATH")) > 1 {
|
|
p.bazelPath = c.Getenv("BAZEL_PATH")
|
|
} else {
|
|
missingEnvVars = append(missingEnvVars, "BAZEL_PATH")
|
|
}
|
|
if len(c.Getenv("BAZEL_OUTPUT_BASE")) > 1 {
|
|
p.outputBase = c.Getenv("BAZEL_OUTPUT_BASE")
|
|
} else {
|
|
missingEnvVars = append(missingEnvVars, "BAZEL_OUTPUT_BASE")
|
|
}
|
|
if len(c.Getenv("BAZEL_WORKSPACE")) > 1 {
|
|
p.workspaceDir = c.Getenv("BAZEL_WORKSPACE")
|
|
} else {
|
|
missingEnvVars = append(missingEnvVars, "BAZEL_WORKSPACE")
|
|
}
|
|
if len(c.Getenv("BAZEL_METRICS_DIR")) > 1 {
|
|
p.metricsDir = c.Getenv("BAZEL_METRICS_DIR")
|
|
} else {
|
|
missingEnvVars = append(missingEnvVars, "BAZEL_METRICS_DIR")
|
|
}
|
|
if len(missingEnvVars) > 0 {
|
|
return nil, errors.New(fmt.Sprintf("missing required env vars to use bazel: %s", missingEnvVars))
|
|
} else {
|
|
return &p, nil
|
|
}
|
|
}
|
|
|
|
func (p *bazelPaths) BazelMetricsDir() string {
|
|
return p.metricsDir
|
|
}
|
|
|
|
func (context *bazelContext) BazelEnabled() bool {
|
|
return true
|
|
}
|
|
|
|
func pwdPrefix() string {
|
|
// Darwin doesn't have /proc
|
|
if runtime.GOOS != "darwin" {
|
|
return "PWD=/proc/self/cwd"
|
|
}
|
|
return ""
|
|
}
|
|
|
|
type bazelCommand struct {
|
|
command string
|
|
// query or label
|
|
expression string
|
|
}
|
|
|
|
type mockBazelRunner struct {
|
|
bazelCommandResults map[bazelCommand]string
|
|
commands []bazelCommand
|
|
extraFlags []string
|
|
}
|
|
|
|
func (r *mockBazelRunner) issueBazelCommand(paths *bazelPaths,
|
|
runName bazel.RunName,
|
|
command bazelCommand,
|
|
extraFlags ...string) (string, string, error) {
|
|
r.commands = append(r.commands, command)
|
|
r.extraFlags = append(r.extraFlags, strings.Join(extraFlags, " "))
|
|
if ret, ok := r.bazelCommandResults[command]; ok {
|
|
return ret, "", nil
|
|
}
|
|
return "", "", nil
|
|
}
|
|
|
|
type builtinBazelRunner struct{}
|
|
|
|
// Issues the given bazel command with given build label and additional flags.
|
|
// Returns (stdout, stderr, error). The first and second return values are strings
|
|
// containing the stdout and stderr of the run command, and an error is returned if
|
|
// the invocation returned an error code.
|
|
func (r *builtinBazelRunner) issueBazelCommand(paths *bazelPaths, runName bazel.RunName, command bazelCommand,
|
|
extraFlags ...string) (string, string, error) {
|
|
cmdFlags := []string{
|
|
// --noautodetect_server_javabase has the practical consequence of preventing Bazel from
|
|
// attempting to download rules_java, which is incompatible with
|
|
// --experimental_repository_disable_download set further below.
|
|
// rules_java is also not needed until mixed builds start building java targets.
|
|
// TODO(b/197958133): Once rules_java is pulled into AOSP, remove this flag.
|
|
"--noautodetect_server_javabase",
|
|
"--output_base=" + absolutePath(paths.outputBase),
|
|
command.command,
|
|
}
|
|
cmdFlags = append(cmdFlags, command.expression)
|
|
cmdFlags = append(cmdFlags, "--profile="+shared.BazelMetricsFilename(paths, runName))
|
|
|
|
// Set default platforms to canonicalized values for mixed builds requests.
|
|
// If these are set in the bazelrc, they will have values that are
|
|
// non-canonicalized to @sourceroot labels, and thus be invalid when
|
|
// referenced from the buildroot.
|
|
//
|
|
// The actual platform values here may be overridden by configuration
|
|
// transitions from the buildroot.
|
|
cmdFlags = append(cmdFlags,
|
|
fmt.Sprintf("--platforms=%s", "//build/bazel/platforms:android_target"))
|
|
cmdFlags = append(cmdFlags,
|
|
fmt.Sprintf("--extra_toolchains=%s", "//prebuilts/clang/host/linux-x86:all"))
|
|
// This should be parameterized on the host OS, but let's restrict to linux
|
|
// to keep things simple for now.
|
|
cmdFlags = append(cmdFlags,
|
|
fmt.Sprintf("--host_platform=%s", "//build/bazel/platforms:linux_x86_64"))
|
|
|
|
// Explicitly disable downloading rules (such as canonical C++ and Java rules) from the network.
|
|
cmdFlags = append(cmdFlags, "--experimental_repository_disable_download")
|
|
cmdFlags = append(cmdFlags, extraFlags...)
|
|
|
|
bazelCmd := exec.Command(paths.bazelPath, cmdFlags...)
|
|
bazelCmd.Dir = absolutePath(paths.syntheticWorkspaceDir())
|
|
bazelCmd.Env = append(os.Environ(),
|
|
"HOME="+paths.homeDir,
|
|
pwdPrefix(),
|
|
"BUILD_DIR="+absolutePath(paths.soongOutDir),
|
|
// Make OUT_DIR absolute here so tools/bazel.sh uses the correct
|
|
// OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out.
|
|
"OUT_DIR="+absolutePath(paths.outDir()),
|
|
// Disables local host detection of gcc; toolchain information is defined
|
|
// explicitly in BUILD files.
|
|
"BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1")
|
|
stderr := &bytes.Buffer{}
|
|
bazelCmd.Stderr = stderr
|
|
|
|
if output, err := bazelCmd.Output(); err != nil {
|
|
return "", string(stderr.Bytes()),
|
|
fmt.Errorf("bazel command failed. command: [%s], env: [%s], error [%s]", bazelCmd, bazelCmd.Env, stderr)
|
|
} else {
|
|
return string(output), string(stderr.Bytes()), nil
|
|
}
|
|
}
|
|
|
|
func (context *bazelContext) mainBzlFileContents() []byte {
|
|
// TODO(cparsons): Define configuration transitions programmatically based
|
|
// on available archs.
|
|
contents := `
|
|
#####################################################
|
|
# This file is generated by soong_build. Do not edit.
|
|
#####################################################
|
|
|
|
def _config_node_transition_impl(settings, attr):
|
|
return {
|
|
"//command_line_option:platforms": "@//build/bazel/platforms:%s_%s" % (attr.os, attr.arch),
|
|
}
|
|
|
|
_config_node_transition = transition(
|
|
implementation = _config_node_transition_impl,
|
|
inputs = [],
|
|
outputs = [
|
|
"//command_line_option:platforms",
|
|
],
|
|
)
|
|
|
|
def _passthrough_rule_impl(ctx):
|
|
return [DefaultInfo(files = depset(ctx.files.deps))]
|
|
|
|
config_node = rule(
|
|
implementation = _passthrough_rule_impl,
|
|
attrs = {
|
|
"arch" : attr.string(mandatory = True),
|
|
"os" : attr.string(mandatory = True),
|
|
"deps" : attr.label_list(cfg = _config_node_transition, allow_files = True),
|
|
"_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"),
|
|
},
|
|
)
|
|
|
|
|
|
# Rule representing the root of the build, to depend on all Bazel targets that
|
|
# are required for the build. Building this target will build the entire Bazel
|
|
# build tree.
|
|
mixed_build_root = rule(
|
|
implementation = _passthrough_rule_impl,
|
|
attrs = {
|
|
"deps" : attr.label_list(),
|
|
},
|
|
)
|
|
|
|
def _phony_root_impl(ctx):
|
|
return []
|
|
|
|
# Rule to depend on other targets but build nothing.
|
|
# This is useful as follows: building a target of this rule will generate
|
|
# symlink forests for all dependencies of the target, without executing any
|
|
# actions of the build.
|
|
phony_root = rule(
|
|
implementation = _phony_root_impl,
|
|
attrs = {"deps" : attr.label_list()},
|
|
)
|
|
`
|
|
return []byte(contents)
|
|
}
|
|
|
|
func (context *bazelContext) mainBuildFileContents() []byte {
|
|
// TODO(cparsons): Map label to attribute programmatically; don't use hard-coded
|
|
// architecture mapping.
|
|
formatString := `
|
|
# This file is generated by soong_build. Do not edit.
|
|
load(":main.bzl", "config_node", "mixed_build_root", "phony_root")
|
|
|
|
%s
|
|
|
|
mixed_build_root(name = "buildroot",
|
|
deps = [%s],
|
|
)
|
|
|
|
phony_root(name = "phonyroot",
|
|
deps = [":buildroot"],
|
|
)
|
|
`
|
|
configNodeFormatString := `
|
|
config_node(name = "%s",
|
|
arch = "%s",
|
|
os = "%s",
|
|
deps = [%s],
|
|
)
|
|
`
|
|
|
|
configNodesSection := ""
|
|
|
|
labelsByConfig := map[string][]string{}
|
|
for val, _ := range context.requests {
|
|
labelString := fmt.Sprintf("\"@%s\"", val.label)
|
|
configString := getConfigString(val)
|
|
labelsByConfig[configString] = append(labelsByConfig[configString], labelString)
|
|
}
|
|
|
|
allLabels := []string{}
|
|
for configString, labels := range labelsByConfig {
|
|
configTokens := strings.Split(configString, "|")
|
|
if len(configTokens) != 2 {
|
|
panic(fmt.Errorf("Unexpected config string format: %s", configString))
|
|
}
|
|
archString := configTokens[0]
|
|
osString := configTokens[1]
|
|
targetString := fmt.Sprintf("%s_%s", osString, archString)
|
|
allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString))
|
|
labelsString := strings.Join(labels, ",\n ")
|
|
configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, labelsString)
|
|
}
|
|
|
|
return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n ")))
|
|
}
|
|
|
|
func indent(original string) string {
|
|
result := ""
|
|
for _, line := range strings.Split(original, "\n") {
|
|
result += " " + line + "\n"
|
|
}
|
|
return result
|
|
}
|
|
|
|
// Returns the file contents of the buildroot.cquery file that should be used for the cquery
|
|
// expression in order to obtain information about buildroot and its dependencies.
|
|
// The contents of this file depend on the bazelContext's requests; requests are enumerated
|
|
// and grouped by their request type. The data retrieved for each label depends on its
|
|
// request type.
|
|
func (context *bazelContext) cqueryStarlarkFileContents() []byte {
|
|
requestTypeToCqueryIdEntries := map[cqueryRequest][]string{}
|
|
for val, _ := range context.requests {
|
|
cqueryId := getCqueryId(val)
|
|
mapEntryString := fmt.Sprintf("%q : True", cqueryId)
|
|
requestTypeToCqueryIdEntries[val.requestType] =
|
|
append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString)
|
|
}
|
|
labelRegistrationMapSection := ""
|
|
functionDefSection := ""
|
|
mainSwitchSection := ""
|
|
|
|
mapDeclarationFormatString := `
|
|
%s = {
|
|
%s
|
|
}
|
|
`
|
|
functionDefFormatString := `
|
|
def %s(target):
|
|
%s
|
|
`
|
|
mainSwitchSectionFormatString := `
|
|
if id_string in %s:
|
|
return id_string + ">>" + %s(target)
|
|
`
|
|
|
|
for requestType := range requestTypeToCqueryIdEntries {
|
|
labelMapName := requestType.Name() + "_Labels"
|
|
functionName := requestType.Name() + "_Fn"
|
|
labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString,
|
|
labelMapName,
|
|
strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n "))
|
|
functionDefSection += fmt.Sprintf(functionDefFormatString,
|
|
functionName,
|
|
indent(requestType.StarlarkFunctionBody()))
|
|
mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString,
|
|
labelMapName, functionName)
|
|
}
|
|
|
|
formatString := `
|
|
# This file is generated by soong_build. Do not edit.
|
|
|
|
# Label Map Section
|
|
%s
|
|
|
|
# Function Def Section
|
|
%s
|
|
|
|
def get_arch(target):
|
|
# TODO(b/199363072): filegroups and file targets aren't associated with any
|
|
# specific platform architecture in mixed builds. This is consistent with how
|
|
# Soong treats filegroups, but it may not be the case with manually-written
|
|
# filegroup BUILD targets.
|
|
buildoptions = build_options(target)
|
|
if buildoptions == None:
|
|
# File targets do not have buildoptions. File targets aren't associated with
|
|
# any specific platform architecture in mixed builds, so use the host.
|
|
return "x86_64|linux"
|
|
platforms = build_options(target)["//command_line_option:platforms"]
|
|
if len(platforms) != 1:
|
|
# An individual configured target should have only one platform architecture.
|
|
# Note that it's fine for there to be multiple architectures for the same label,
|
|
# but each is its own configured target.
|
|
fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms))
|
|
platform_name = build_options(target)["//command_line_option:platforms"][0].name
|
|
if platform_name == "host":
|
|
return "HOST"
|
|
elif platform_name.startswith("android_"):
|
|
return platform_name[len("android_"):] + "|" + platform_name[:len("android_")-1]
|
|
elif platform_name.startswith("linux_"):
|
|
return platform_name[len("linux_"):] + "|" + platform_name[:len("linux_")-1]
|
|
else:
|
|
fail("expected platform name of the form 'android_<arch>' or 'linux_<arch>', but was " + str(platforms))
|
|
return "UNKNOWN"
|
|
|
|
def format(target):
|
|
id_string = str(target.label) + "|" + get_arch(target)
|
|
|
|
# Main switch section
|
|
%s
|
|
# This target was not requested via cquery, and thus must be a dependency
|
|
# of a requested target.
|
|
return id_string + ">>NONE"
|
|
`
|
|
|
|
return []byte(fmt.Sprintf(formatString, labelRegistrationMapSection, functionDefSection,
|
|
mainSwitchSection))
|
|
}
|
|
|
|
// Returns a path containing build-related metadata required for interfacing
|
|
// with Bazel. Example: out/soong/bazel.
|
|
func (p *bazelPaths) intermediatesDir() string {
|
|
return filepath.Join(p.soongOutDir, "bazel")
|
|
}
|
|
|
|
// Returns the path where the contents of the @soong_injection repository live.
|
|
// It is used by Soong to tell Bazel things it cannot over the command line.
|
|
func (p *bazelPaths) injectedFilesDir() string {
|
|
return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName)
|
|
}
|
|
|
|
// Returns the path of the synthetic Bazel workspace that contains a symlink
|
|
// forest composed the whole source tree and BUILD files generated by bp2build.
|
|
func (p *bazelPaths) syntheticWorkspaceDir() string {
|
|
return filepath.Join(p.soongOutDir, "workspace")
|
|
}
|
|
|
|
// Returns the path to the top level out dir ($OUT_DIR).
|
|
func (p *bazelPaths) outDir() string {
|
|
return filepath.Dir(p.soongOutDir)
|
|
}
|
|
|
|
// Issues commands to Bazel to receive results for all cquery requests
|
|
// queued in the BazelContext.
|
|
func (context *bazelContext) InvokeBazel(config Config) error {
|
|
context.results = make(map[cqueryKey]string)
|
|
|
|
var cqueryOutput string
|
|
var cqueryErr string
|
|
var err error
|
|
|
|
soongInjectionPath := absolutePath(context.paths.injectedFilesDir())
|
|
mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds")
|
|
if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) {
|
|
err = os.MkdirAll(mixedBuildsPath, 0777)
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" {
|
|
err = os.MkdirAll(metricsDir, 0777)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
err = ioutil.WriteFile(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = ioutil.WriteFile(
|
|
filepath.Join(mixedBuildsPath, "main.bzl"),
|
|
context.mainBzlFileContents(), 0666)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = ioutil.WriteFile(
|
|
filepath.Join(mixedBuildsPath, "BUILD.bazel"),
|
|
context.mainBuildFileContents(), 0666)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery")
|
|
err = ioutil.WriteFile(
|
|
absolutePath(cqueryFileRelpath),
|
|
context.cqueryStarlarkFileContents(), 0666)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
buildrootLabel := "@soong_injection//mixed_builds:buildroot"
|
|
cqueryOutput, cqueryErr, err = context.issueBazelCommand(
|
|
context.paths,
|
|
bazel.CqueryBuildRootRunName,
|
|
bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)},
|
|
"--output=starlark",
|
|
"--starlark:file="+absolutePath(cqueryFileRelpath))
|
|
err = ioutil.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"),
|
|
[]byte(cqueryOutput), 0666)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cqueryResults := map[string]string{}
|
|
for _, outputLine := range strings.Split(cqueryOutput, "\n") {
|
|
if strings.Contains(outputLine, ">>") {
|
|
splitLine := strings.SplitN(outputLine, ">>", 2)
|
|
cqueryResults[splitLine[0]] = splitLine[1]
|
|
}
|
|
}
|
|
|
|
for val := range context.requests {
|
|
if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok {
|
|
context.results[val] = cqueryResult
|
|
} else {
|
|
return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]",
|
|
getCqueryId(val), cqueryOutput, cqueryErr)
|
|
}
|
|
}
|
|
|
|
// Issue an aquery command to retrieve action information about the bazel build tree.
|
|
//
|
|
var aqueryOutput string
|
|
var coverageFlags []string
|
|
if Bool(config.productVariables.ClangCoverage) {
|
|
coverageFlags = append(coverageFlags, "--collect_code_coverage")
|
|
if len(config.productVariables.NativeCoveragePaths) > 0 ||
|
|
len(config.productVariables.NativeCoverageExcludePaths) > 0 {
|
|
includePaths := JoinWithPrefixAndSeparator(config.productVariables.NativeCoveragePaths, "+", ",")
|
|
excludePaths := JoinWithPrefixAndSeparator(config.productVariables.NativeCoverageExcludePaths, "-", ",")
|
|
if len(includePaths) > 0 && len(excludePaths) > 0 {
|
|
includePaths += ","
|
|
}
|
|
coverageFlags = append(coverageFlags, fmt.Sprintf(`--instrumentation_filter=%s`,
|
|
includePaths+excludePaths))
|
|
}
|
|
}
|
|
|
|
extraFlags := append([]string{"--output=jsonproto"}, coverageFlags...)
|
|
|
|
aqueryOutput, _, err = context.issueBazelCommand(
|
|
context.paths,
|
|
bazel.AqueryBuildRootRunName,
|
|
bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)},
|
|
// Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's
|
|
// proto sources, which would add a number of unnecessary dependencies.
|
|
extraFlags...)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Issue a build command of the phony root to generate symlink forests for dependencies of the
|
|
// Bazel build. This is necessary because aquery invocations do not generate this symlink forest,
|
|
// but some of symlinks may be required to resolve source dependencies of the build.
|
|
_, _, err = context.issueBazelCommand(
|
|
context.paths,
|
|
bazel.BazelBuildPhonyRootRunName,
|
|
bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"})
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Clear requests.
|
|
context.requests = map[cqueryKey]bool{}
|
|
return nil
|
|
}
|
|
|
|
func (context *bazelContext) BuildStatementsToRegister() []bazel.BuildStatement {
|
|
return context.buildStatements
|
|
}
|
|
|
|
func (context *bazelContext) AqueryDepsets() []bazel.AqueryDepset {
|
|
return context.depsets
|
|
}
|
|
|
|
func (context *bazelContext) OutputBase() string {
|
|
return context.paths.outputBase
|
|
}
|
|
|
|
// Singleton used for registering BUILD file ninja dependencies (needed
|
|
// for correctness of builds which use Bazel.
|
|
func BazelSingleton() Singleton {
|
|
return &bazelSingleton{}
|
|
}
|
|
|
|
type bazelSingleton struct{}
|
|
|
|
func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) {
|
|
// bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled.
|
|
if !ctx.Config().BazelContext.BazelEnabled() {
|
|
return
|
|
}
|
|
|
|
// Add ninja file dependencies for files which all bazel invocations require.
|
|
bazelBuildList := absolutePath(filepath.Join(
|
|
filepath.Dir(ctx.Config().moduleListFile), "bazel.list"))
|
|
ctx.AddNinjaFileDeps(bazelBuildList)
|
|
|
|
data, err := ioutil.ReadFile(bazelBuildList)
|
|
if err != nil {
|
|
ctx.Errorf(err.Error())
|
|
}
|
|
files := strings.Split(strings.TrimSpace(string(data)), "\n")
|
|
for _, file := range files {
|
|
ctx.AddNinjaFileDeps(file)
|
|
}
|
|
|
|
for _, depset := range ctx.Config().BazelContext.AqueryDepsets() {
|
|
var outputs []Path
|
|
for _, depsetDepHash := range depset.TransitiveDepSetHashes {
|
|
otherDepsetName := bazelDepsetName(depsetDepHash)
|
|
outputs = append(outputs, PathForPhony(ctx, otherDepsetName))
|
|
}
|
|
for _, artifactPath := range depset.DirectArtifacts {
|
|
outputs = append(outputs, PathForBazelOut(ctx, artifactPath))
|
|
}
|
|
thisDepsetName := bazelDepsetName(depset.ContentHash)
|
|
ctx.Build(pctx, BuildParams{
|
|
Rule: blueprint.Phony,
|
|
Outputs: []WritablePath{PathForPhony(ctx, thisDepsetName)},
|
|
Implicits: outputs,
|
|
})
|
|
}
|
|
|
|
// Register bazel-owned build statements (obtained from the aquery invocation).
|
|
for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() {
|
|
if len(buildStatement.Command) < 1 {
|
|
panic(fmt.Sprintf("unhandled build statement: %v", buildStatement))
|
|
}
|
|
rule := NewRuleBuilder(pctx, ctx)
|
|
cmd := rule.Command()
|
|
|
|
// cd into Bazel's execution root, which is the action cwd.
|
|
cmd.Text(fmt.Sprintf("cd %s/execroot/__main__ &&", ctx.Config().BazelContext.OutputBase()))
|
|
|
|
// Remove old outputs, as some actions might not rerun if the outputs are detected.
|
|
if len(buildStatement.OutputPaths) > 0 {
|
|
cmd.Text("rm -f")
|
|
for _, outputPath := range buildStatement.OutputPaths {
|
|
cmd.Text(outputPath)
|
|
}
|
|
cmd.Text("&&")
|
|
}
|
|
|
|
for _, pair := range buildStatement.Env {
|
|
// Set per-action env variables, if any.
|
|
cmd.Flag(pair.Key + "=" + pair.Value)
|
|
}
|
|
|
|
// The actual Bazel action.
|
|
cmd.Text(buildStatement.Command)
|
|
|
|
for _, outputPath := range buildStatement.OutputPaths {
|
|
cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath))
|
|
}
|
|
for _, inputPath := range buildStatement.InputPaths {
|
|
cmd.Implicit(PathForBazelOut(ctx, inputPath))
|
|
}
|
|
for _, inputDepsetHash := range buildStatement.InputDepsetHashes {
|
|
otherDepsetName := bazelDepsetName(inputDepsetHash)
|
|
cmd.Implicit(PathForPhony(ctx, otherDepsetName))
|
|
}
|
|
|
|
if depfile := buildStatement.Depfile; depfile != nil {
|
|
cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile))
|
|
}
|
|
|
|
for _, symlinkPath := range buildStatement.SymlinkPaths {
|
|
cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath))
|
|
}
|
|
|
|
// This is required to silence warnings pertaining to unexpected timestamps. Particularly,
|
|
// some Bazel builtins (such as files in the bazel_tools directory) have far-future
|
|
// timestamps. Without restat, Ninja would emit warnings that the input files of a
|
|
// build statement have later timestamps than the outputs.
|
|
rule.Restat()
|
|
|
|
desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths)
|
|
rule.Build(fmt.Sprintf("bazel %d", index), desc)
|
|
}
|
|
}
|
|
|
|
func getCqueryId(key cqueryKey) string {
|
|
return key.label + "|" + getConfigString(key)
|
|
}
|
|
|
|
func getConfigString(key cqueryKey) string {
|
|
arch := key.configKey.arch
|
|
if len(arch) == 0 || arch == "common" {
|
|
// Use host platform, which is currently hardcoded to be x86_64.
|
|
arch = "x86_64"
|
|
}
|
|
os := key.configKey.osType.Name
|
|
if len(os) == 0 || os == "common_os" || os == "linux_glibc" {
|
|
// Use host OS, which is currently hardcoded to be linux.
|
|
os = "linux"
|
|
}
|
|
return arch + "|" + os
|
|
}
|
|
|
|
func GetConfigKey(ctx BaseModuleContext) configKey {
|
|
return configKey{
|
|
// use string because Arch is not a valid key in go
|
|
arch: ctx.Arch().String(),
|
|
osType: ctx.Os(),
|
|
}
|
|
}
|
|
|
|
func bazelDepsetName(contentHash string) string {
|
|
return fmt.Sprintf("bazel_depset_%s", contentHash)
|
|
}
|