|  | package android | 
|  |  | 
|  | import ( | 
|  | "encoding/json" | 
|  | "os" | 
|  | "path/filepath" | 
|  | "reflect" | 
|  | "strings" | 
|  | "testing" | 
|  |  | 
|  | "android/soong/bazel" | 
|  | "android/soong/bazel/cquery" | 
|  | analysis_v2_proto "prebuilts/bazel/common/proto/analysis_v2" | 
|  |  | 
|  | "github.com/google/blueprint/metrics" | 
|  | "google.golang.org/protobuf/proto" | 
|  | ) | 
|  |  | 
|  | var testConfig = TestConfig("out", nil, "", nil) | 
|  |  | 
|  | type testInvokeBazelContext struct{} | 
|  |  | 
|  | type mockBazelRunner struct { | 
|  | testHelper *testing.T | 
|  | // Stores mock behavior. If an issueBazelCommand request is made for command | 
|  | // k, and {k:v} is present in this map, then the mock will return v. | 
|  | bazelCommandResults map[bazelCommand]string | 
|  | // Requests actually made of the mockBazelRunner with issueBazelCommand, | 
|  | // keyed by the command they represent. | 
|  | bazelCommandRequests map[bazelCommand]bazel.CmdRequest | 
|  | } | 
|  |  | 
|  | func (r *mockBazelRunner) bazelCommandForRequest(cmdRequest bazel.CmdRequest) bazelCommand { | 
|  | for _, arg := range cmdRequest.Argv { | 
|  | for _, cmdType := range allBazelCommands { | 
|  | if arg == cmdType.command { | 
|  | return cmdType | 
|  | } | 
|  | } | 
|  | } | 
|  | r.testHelper.Fatalf("Unrecognized bazel request: %s", cmdRequest) | 
|  | return cqueryCmd | 
|  | } | 
|  |  | 
|  | func (r *mockBazelRunner) issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (string, string, error) { | 
|  | command := r.bazelCommandForRequest(cmdRequest) | 
|  | r.bazelCommandRequests[command] = cmdRequest | 
|  | return r.bazelCommandResults[command], "", nil | 
|  | } | 
|  |  | 
|  | func (t *testInvokeBazelContext) GetEventHandler() *metrics.EventHandler { | 
|  | return &metrics.EventHandler{} | 
|  | } | 
|  |  | 
|  | func TestRequestResultsAfterInvokeBazel(t *testing.T) { | 
|  | label_foo := "@//foo:foo" | 
|  | label_bar := "@//foo:bar" | 
|  | apexKey := ApexConfigKey{ | 
|  | WithinApex:     true, | 
|  | ApexSdkVersion: "29", | 
|  | ApiDomain:      "myapex", | 
|  | } | 
|  | cfg_foo := configKey{"arm64_armv8-a", Android, apexKey} | 
|  | cfg_bar := configKey{arch: "arm64_armv8-a", osType: Android} | 
|  | cmd_results := []string{ | 
|  | `@//foo:foo|arm64_armv8-a|android|within_apex|29|myapex>>out/foo/foo.txt`, | 
|  | `@//foo:bar|arm64_armv8-a|android>>out/foo/bar.txt`, | 
|  | } | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{cqueryCmd: strings.Join(cmd_results, "\n")}) | 
|  |  | 
|  | bazelContext.QueueBazelRequest(label_foo, cquery.GetOutputFiles, cfg_foo) | 
|  | bazelContext.QueueBazelRequest(label_bar, cquery.GetOutputFiles, cfg_bar) | 
|  | err := bazelContext.InvokeBazel(testConfig, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("Did not expect error invoking Bazel, but got %s", err) | 
|  | } | 
|  | verifyCqueryResult(t, bazelContext, label_foo, cfg_foo, "out/foo/foo.txt") | 
|  | verifyCqueryResult(t, bazelContext, label_bar, cfg_bar, "out/foo/bar.txt") | 
|  | } | 
|  |  | 
|  | func verifyCqueryResult(t *testing.T, ctx *mixedBuildBazelContext, label string, cfg configKey, result string) { | 
|  | g, err := ctx.GetOutputFiles(label, cfg) | 
|  | if err != nil { | 
|  | t.Errorf("Expected cquery results after running InvokeBazel(), but got err %v", err) | 
|  | } else if w := []string{result}; !reflect.DeepEqual(w, g) { | 
|  | t.Errorf("Expected output %s, got %s", w, g) | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestInvokeBazelWritesBazelFiles(t *testing.T) { | 
|  | bazelContext, baseDir := testBazelContext(t, map[bazelCommand]string{}) | 
|  | err := bazelContext.InvokeBazel(testConfig, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("Did not expect error invoking Bazel, but got %s", err) | 
|  | } | 
|  | if _, err := os.Stat(filepath.Join(baseDir, "soong_injection", "mixed_builds", "main.bzl")); os.IsNotExist(err) { | 
|  | t.Errorf("Expected main.bzl to exist, but it does not") | 
|  | } else if err != nil { | 
|  | t.Errorf("Unexpected error stating main.bzl %s", err) | 
|  | } | 
|  |  | 
|  | if _, err := os.Stat(filepath.Join(baseDir, "soong_injection", "mixed_builds", "BUILD.bazel")); os.IsNotExist(err) { | 
|  | t.Errorf("Expected BUILD.bazel to exist, but it does not") | 
|  | } else if err != nil { | 
|  | t.Errorf("Unexpected error stating BUILD.bazel %s", err) | 
|  | } | 
|  |  | 
|  | if _, err := os.Stat(filepath.Join(baseDir, "soong_injection", "WORKSPACE.bazel")); os.IsNotExist(err) { | 
|  | t.Errorf("Expected WORKSPACE.bazel to exist, but it does not") | 
|  | } else if err != nil { | 
|  | t.Errorf("Unexpected error stating WORKSPACE.bazel %s", err) | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestInvokeBazelPopulatesBuildStatements(t *testing.T) { | 
|  | type testCase struct { | 
|  | input   string | 
|  | command string | 
|  | } | 
|  |  | 
|  | var testCases = []testCase{ | 
|  | {` | 
|  | { | 
|  | "artifacts": [ | 
|  | { "id": 1, "path_fragment_id": 1 }, | 
|  | { "id": 2, "path_fragment_id": 2 }], | 
|  | "actions": [{ | 
|  | "target_Id": 1, | 
|  | "action_Key": "x", | 
|  | "mnemonic": "x", | 
|  | "arguments": ["touch", "foo"], | 
|  | "input_dep_set_ids": [1], | 
|  | "output_Ids": [1], | 
|  | "primary_output_id": 1 | 
|  | }], | 
|  | "dep_set_of_files": [ | 
|  | { "id": 1, "direct_artifact_ids": [1, 2] }], | 
|  | "path_fragments": [ | 
|  | { "id": 1, "label": "one" }, | 
|  | { "id": 2, "label": "two" }] | 
|  | }`, | 
|  | "cd 'test/exec_root' && rm -rf 'one' && touch foo", | 
|  | }, {` | 
|  | { | 
|  | "artifacts": [ | 
|  | { "id": 1, "path_fragment_id": 10 }, | 
|  | { "id": 2, "path_fragment_id": 20 }], | 
|  | "actions": [{ | 
|  | "target_Id": 100, | 
|  | "action_Key": "x", | 
|  | "mnemonic": "x", | 
|  | "arguments": ["bogus", "command"], | 
|  | "output_Ids": [1, 2], | 
|  | "primary_output_id": 1 | 
|  | }], | 
|  | "path_fragments": [ | 
|  | { "id": 10, "label": "one", "parent_id": 30 }, | 
|  | { "id": 20, "label": "one.d", "parent_id": 30 }, | 
|  | { "id": 30, "label": "parent" }] | 
|  | }`, | 
|  | `cd 'test/exec_root' && rm -rf 'parent/one' && bogus command && sed -i'' -E 's@(^|\s|")bazel-out/@\1test/bazel_out/@g' 'parent/one.d'`, | 
|  | }, | 
|  | } | 
|  |  | 
|  | for i, testCase := range testCases { | 
|  | data, err := JsonToActionGraphContainer(testCase.input) | 
|  | if err != nil { | 
|  | t.Error(err) | 
|  | } | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{aqueryCmd: string(data)}) | 
|  |  | 
|  | err = bazelContext.InvokeBazel(testConfig, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("testCase #%d: did not expect error invoking Bazel, but got %s", i+1, err) | 
|  | } | 
|  |  | 
|  | got := bazelContext.BuildStatementsToRegister() | 
|  | if want := 1; len(got) != want { | 
|  | t.Fatalf("expected %d registered build statements, but got %#v", want, got) | 
|  | } | 
|  |  | 
|  | cmd := RuleBuilderCommand{} | 
|  | ctx := builderContextForTests{PathContextForTesting(TestConfig("out", nil, "", nil))} | 
|  | createCommand(&cmd, got[0], "test/exec_root", "test/bazel_out", ctx, map[string]bazel.AqueryDepset{}, "") | 
|  | if actual, expected := cmd.buf.String(), testCase.command; expected != actual { | 
|  | t.Errorf("expected: [%s], actual: [%s]", expected, actual) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestMixedBuildSandboxedAction(t *testing.T) { | 
|  | input := `{ | 
|  | "artifacts": [ | 
|  | { "id": 1, "path_fragment_id": 1 }, | 
|  | { "id": 2, "path_fragment_id": 2 }], | 
|  | "actions": [{ | 
|  | "target_Id": 1, | 
|  | "action_Key": "x", | 
|  | "mnemonic": "x", | 
|  | "arguments": ["touch", "foo"], | 
|  | "input_dep_set_ids": [1], | 
|  | "output_Ids": [1], | 
|  | "primary_output_id": 1 | 
|  | }], | 
|  | "dep_set_of_files": [ | 
|  | { "id": 1, "direct_artifact_ids": [1, 2] }], | 
|  | "path_fragments": [ | 
|  | { "id": 1, "label": "one" }, | 
|  | { "id": 2, "label": "two" }] | 
|  | }` | 
|  | data, err := JsonToActionGraphContainer(input) | 
|  | if err != nil { | 
|  | t.Error(err) | 
|  | } | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{aqueryCmd: string(data)}) | 
|  |  | 
|  | err = bazelContext.InvokeBazel(testConfig, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("TestMixedBuildSandboxedAction did not expect error invoking Bazel, but got %s", err) | 
|  | } | 
|  |  | 
|  | statement := bazelContext.BuildStatementsToRegister()[0] | 
|  | statement.ShouldRunInSbox = true | 
|  |  | 
|  | cmd := RuleBuilderCommand{} | 
|  | ctx := builderContextForTests{PathContextForTesting(TestConfig("out", nil, "", nil))} | 
|  | createCommand(&cmd, statement, "test/exec_root", "test/bazel_out", ctx, map[string]bazel.AqueryDepset{}, "") | 
|  | // Assert that the output is generated in an intermediate directory | 
|  | // fe05bcdcdc4928012781a5f1a2a77cbb5398e106 is the sha1 checksum of "one" | 
|  | if actual, expected := cmd.outputs[0].String(), "out/soong/mixed_build_sbox_intermediates/fe05bcdcdc4928012781a5f1a2a77cbb5398e106/test/exec_root/one"; expected != actual { | 
|  | t.Errorf("expected: [%s], actual: [%s]", expected, actual) | 
|  | } | 
|  |  | 
|  | // Assert the actual command remains unchanged inside the sandbox | 
|  | if actual, expected := cmd.buf.String(), "mkdir -p 'test/exec_root' && cd 'test/exec_root' && rm -rf 'one' && touch foo"; expected != actual { | 
|  | t.Errorf("expected: [%s], actual: [%s]", expected, actual) | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestCoverageFlagsAfterInvokeBazel(t *testing.T) { | 
|  | testConfig.productVariables.ClangCoverage = boolPtr(true) | 
|  |  | 
|  | testConfig.productVariables.NativeCoveragePaths = []string{"foo1", "foo2"} | 
|  | testConfig.productVariables.NativeCoverageExcludePaths = []string{"bar1", "bar2"} | 
|  | verifyAqueryContainsFlags(t, testConfig, "--collect_code_coverage", "--instrumentation_filter=+foo1,+foo2,-bar1,-bar2") | 
|  |  | 
|  | testConfig.productVariables.NativeCoveragePaths = []string{"foo1"} | 
|  | testConfig.productVariables.NativeCoverageExcludePaths = []string{"bar1"} | 
|  | verifyAqueryContainsFlags(t, testConfig, "--collect_code_coverage", "--instrumentation_filter=+foo1,-bar1") | 
|  |  | 
|  | testConfig.productVariables.NativeCoveragePaths = []string{"foo1"} | 
|  | testConfig.productVariables.NativeCoverageExcludePaths = nil | 
|  | verifyAqueryContainsFlags(t, testConfig, "--collect_code_coverage", "--instrumentation_filter=+foo1") | 
|  |  | 
|  | testConfig.productVariables.NativeCoveragePaths = nil | 
|  | testConfig.productVariables.NativeCoverageExcludePaths = []string{"bar1"} | 
|  | verifyAqueryContainsFlags(t, testConfig, "--collect_code_coverage", "--instrumentation_filter=-bar1") | 
|  |  | 
|  | testConfig.productVariables.NativeCoveragePaths = []string{"*"} | 
|  | testConfig.productVariables.NativeCoverageExcludePaths = nil | 
|  | verifyAqueryContainsFlags(t, testConfig, "--collect_code_coverage", "--instrumentation_filter=+.*") | 
|  |  | 
|  | testConfig.productVariables.ClangCoverage = boolPtr(false) | 
|  | verifyAqueryDoesNotContainSubstrings(t, testConfig, "collect_code_coverage", "instrumentation_filter") | 
|  | } | 
|  |  | 
|  | func TestBazelRequestsSorted(t *testing.T) { | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{}) | 
|  |  | 
|  | cfgKeyArm64Android := configKey{arch: "arm64_armv8-a", osType: Android} | 
|  | cfgKeyArm64Linux := configKey{arch: "arm64_armv8-a", osType: Linux} | 
|  | cfgKeyOtherAndroid := configKey{arch: "otherarch", osType: Android} | 
|  |  | 
|  | bazelContext.QueueBazelRequest("zzz", cquery.GetOutputFiles, cfgKeyArm64Android) | 
|  | bazelContext.QueueBazelRequest("ccc", cquery.GetApexInfo, cfgKeyArm64Android) | 
|  | bazelContext.QueueBazelRequest("duplicate", cquery.GetOutputFiles, cfgKeyArm64Android) | 
|  | bazelContext.QueueBazelRequest("duplicate", cquery.GetOutputFiles, cfgKeyArm64Android) | 
|  | bazelContext.QueueBazelRequest("xxx", cquery.GetOutputFiles, cfgKeyArm64Linux) | 
|  | bazelContext.QueueBazelRequest("aaa", cquery.GetOutputFiles, cfgKeyArm64Android) | 
|  | bazelContext.QueueBazelRequest("aaa", cquery.GetOutputFiles, cfgKeyOtherAndroid) | 
|  | bazelContext.QueueBazelRequest("bbb", cquery.GetOutputFiles, cfgKeyOtherAndroid) | 
|  |  | 
|  | if len(bazelContext.requests) != 7 { | 
|  | t.Error("Expected 7 request elements, but got", len(bazelContext.requests)) | 
|  | } | 
|  |  | 
|  | lastString := "" | 
|  | for _, val := range bazelContext.requests { | 
|  | thisString := val.String() | 
|  | if thisString <= lastString { | 
|  | t.Errorf("Requests are not ordered correctly. '%s' came before '%s'", lastString, thisString) | 
|  | } | 
|  | lastString = thisString | 
|  | } | 
|  | } | 
|  |  | 
|  | func TestIsModuleNameAllowed(t *testing.T) { | 
|  | libDisabled := "lib_disabled" | 
|  | libEnabled := "lib_enabled" | 
|  | libDclaWithinApex := "lib_dcla_within_apex" | 
|  | libDclaNonApex := "lib_dcla_non_apex" | 
|  | libNotConverted := "lib_not_converted" | 
|  |  | 
|  | disabledModules := map[string]bool{ | 
|  | libDisabled: true, | 
|  | } | 
|  | enabledModules := map[string]bool{ | 
|  | libEnabled: true, | 
|  | } | 
|  | dclaEnabledModules := map[string]bool{ | 
|  | libDclaWithinApex: true, | 
|  | libDclaNonApex:    true, | 
|  | } | 
|  |  | 
|  | bazelContext := &mixedBuildBazelContext{ | 
|  | bazelEnabledModules:     enabledModules, | 
|  | bazelDisabledModules:    disabledModules, | 
|  | bazelDclaEnabledModules: dclaEnabledModules, | 
|  | } | 
|  |  | 
|  | if bazelContext.IsModuleNameAllowed(libDisabled, true) { | 
|  | t.Fatalf("%s shouldn't be allowed for mixed build", libDisabled) | 
|  | } | 
|  |  | 
|  | if !bazelContext.IsModuleNameAllowed(libEnabled, true) { | 
|  | t.Fatalf("%s should be allowed for mixed build", libEnabled) | 
|  | } | 
|  |  | 
|  | if !bazelContext.IsModuleNameAllowed(libDclaWithinApex, true) { | 
|  | t.Fatalf("%s should be allowed for mixed build", libDclaWithinApex) | 
|  | } | 
|  |  | 
|  | if bazelContext.IsModuleNameAllowed(libDclaNonApex, false) { | 
|  | t.Fatalf("%s shouldn't be allowed for mixed build", libDclaNonApex) | 
|  | } | 
|  |  | 
|  | if bazelContext.IsModuleNameAllowed(libNotConverted, true) { | 
|  | t.Fatalf("%s shouldn't be allowed for mixed build", libNotConverted) | 
|  | } | 
|  | } | 
|  |  | 
|  | func verifyAqueryContainsFlags(t *testing.T, config Config, expected ...string) { | 
|  | t.Helper() | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{}) | 
|  |  | 
|  | err := bazelContext.InvokeBazel(config, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("Did not expect error invoking Bazel, but got %s", err) | 
|  | } | 
|  |  | 
|  | sliceContains := func(slice []string, x string) bool { | 
|  | for _, s := range slice { | 
|  | if s == x { | 
|  | return true | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | aqueryArgv := bazelContext.bazelRunner.(*mockBazelRunner).bazelCommandRequests[aqueryCmd].Argv | 
|  |  | 
|  | for _, expectedFlag := range expected { | 
|  | if !sliceContains(aqueryArgv, expectedFlag) { | 
|  | t.Errorf("aquery does not contain expected flag %#v. Argv was: %#v", expectedFlag, aqueryArgv) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | func verifyAqueryDoesNotContainSubstrings(t *testing.T, config Config, substrings ...string) { | 
|  | t.Helper() | 
|  | bazelContext, _ := testBazelContext(t, map[bazelCommand]string{}) | 
|  |  | 
|  | err := bazelContext.InvokeBazel(config, &testInvokeBazelContext{}) | 
|  | if err != nil { | 
|  | t.Fatalf("Did not expect error invoking Bazel, but got %s", err) | 
|  | } | 
|  |  | 
|  | sliceContainsSubstring := func(slice []string, substring string) bool { | 
|  | for _, s := range slice { | 
|  | if strings.Contains(s, substring) { | 
|  | return true | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | aqueryArgv := bazelContext.bazelRunner.(*mockBazelRunner).bazelCommandRequests[aqueryCmd].Argv | 
|  |  | 
|  | for _, substring := range substrings { | 
|  | if sliceContainsSubstring(aqueryArgv, substring) { | 
|  | t.Errorf("aquery contains unexpected substring %#v. Argv was: %#v", substring, aqueryArgv) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | func testBazelContext(t *testing.T, bazelCommandResults map[bazelCommand]string) (*mixedBuildBazelContext, string) { | 
|  | t.Helper() | 
|  | p := bazelPaths{ | 
|  | soongOutDir:  t.TempDir(), | 
|  | outputBase:   "outputbase", | 
|  | workspaceDir: "workspace_dir", | 
|  | } | 
|  | if _, exists := bazelCommandResults[aqueryCmd]; !exists { | 
|  | bazelCommandResults[aqueryCmd] = "" | 
|  | } | 
|  | runner := &mockBazelRunner{ | 
|  | testHelper:           t, | 
|  | bazelCommandResults:  bazelCommandResults, | 
|  | bazelCommandRequests: map[bazelCommand]bazel.CmdRequest{}, | 
|  | } | 
|  | return &mixedBuildBazelContext{ | 
|  | bazelRunner: runner, | 
|  | paths:       &p, | 
|  | }, p.soongOutDir | 
|  | } | 
|  |  | 
|  | // Transform the json format to ActionGraphContainer | 
|  | func JsonToActionGraphContainer(inputString string) ([]byte, error) { | 
|  | var aqueryProtoResult analysis_v2_proto.ActionGraphContainer | 
|  | err := json.Unmarshal([]byte(inputString), &aqueryProtoResult) | 
|  | if err != nil { | 
|  | return []byte(""), err | 
|  | } | 
|  | data, _ := proto.Marshal(&aqueryProtoResult) | 
|  | return data, err | 
|  | } |