|  | // Copyright 2017 Google Inc. All rights reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | package main | 
|  |  | 
|  | import ( | 
|  | "bytes" | 
|  | "crypto/sha1" | 
|  | "encoding/hex" | 
|  | "errors" | 
|  | "flag" | 
|  | "fmt" | 
|  | "io" | 
|  | "io/ioutil" | 
|  | "os" | 
|  | "os/exec" | 
|  | "path/filepath" | 
|  | "strconv" | 
|  | "strings" | 
|  | "time" | 
|  |  | 
|  | "android/soong/cmd/sbox/sbox_proto" | 
|  | "android/soong/makedeps" | 
|  | "android/soong/response" | 
|  |  | 
|  | "google.golang.org/protobuf/encoding/prototext" | 
|  | ) | 
|  |  | 
|  | var ( | 
|  | sandboxesRoot  string | 
|  | outputDir      string | 
|  | manifestFile   string | 
|  | keepOutDir     bool | 
|  | writeIfChanged bool | 
|  | ) | 
|  |  | 
|  | const ( | 
|  | depFilePlaceholder    = "__SBOX_DEPFILE__" | 
|  | sandboxDirPlaceholder = "__SBOX_SANDBOX_DIR__" | 
|  | ) | 
|  |  | 
|  | func init() { | 
|  | flag.StringVar(&sandboxesRoot, "sandbox-path", "", | 
|  | "root of temp directory to put the sandbox into") | 
|  | flag.StringVar(&outputDir, "output-dir", "", | 
|  | "directory which will contain all output files and only output files") | 
|  | flag.StringVar(&manifestFile, "manifest", "", | 
|  | "textproto manifest describing the sandboxed command(s)") | 
|  | flag.BoolVar(&keepOutDir, "keep-out-dir", false, | 
|  | "whether to keep the sandbox directory when done") | 
|  | flag.BoolVar(&writeIfChanged, "write-if-changed", false, | 
|  | "only write the output files if they have changed") | 
|  | } | 
|  |  | 
|  | func usageViolation(violation string) { | 
|  | if violation != "" { | 
|  | fmt.Fprintf(os.Stderr, "Usage error: %s.\n\n", violation) | 
|  | } | 
|  |  | 
|  | fmt.Fprintf(os.Stderr, | 
|  | "Usage: sbox --manifest <manifest> --sandbox-path <sandboxPath>\n") | 
|  |  | 
|  | flag.PrintDefaults() | 
|  |  | 
|  | os.Exit(1) | 
|  | } | 
|  |  | 
|  | func main() { | 
|  | flag.Usage = func() { | 
|  | usageViolation("") | 
|  | } | 
|  | flag.Parse() | 
|  |  | 
|  | error := run() | 
|  | if error != nil { | 
|  | fmt.Fprintln(os.Stderr, error) | 
|  | os.Exit(1) | 
|  | } | 
|  | } | 
|  |  | 
|  | func findAllFilesUnder(root string) (paths []string) { | 
|  | paths = []string{} | 
|  | filepath.Walk(root, func(path string, info os.FileInfo, err error) error { | 
|  | if !info.IsDir() { | 
|  | relPath, err := filepath.Rel(root, path) | 
|  | if err != nil { | 
|  | // couldn't find relative path from ancestor? | 
|  | panic(err) | 
|  | } | 
|  | paths = append(paths, relPath) | 
|  | } | 
|  | return nil | 
|  | }) | 
|  | return paths | 
|  | } | 
|  |  | 
|  | func run() error { | 
|  | if manifestFile == "" { | 
|  | usageViolation("--manifest <manifest> is required and must be non-empty") | 
|  | } | 
|  | if sandboxesRoot == "" { | 
|  | // In practice, the value of sandboxesRoot will mostly likely be at a fixed location relative to OUT_DIR, | 
|  | // and the sbox executable will most likely be at a fixed location relative to OUT_DIR too, so | 
|  | // the value of sandboxesRoot will most likely be at a fixed location relative to the sbox executable | 
|  | // However, Soong also needs to be able to separately remove the sandbox directory on startup (if it has anything left in it) | 
|  | // and by passing it as a parameter we don't need to duplicate its value | 
|  | usageViolation("--sandbox-path <sandboxPath> is required and must be non-empty") | 
|  | } | 
|  |  | 
|  | manifest, err := readManifest(manifestFile) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | if len(manifest.Commands) == 0 { | 
|  | return fmt.Errorf("at least one commands entry is required in %q", manifestFile) | 
|  | } | 
|  |  | 
|  | // setup sandbox directory | 
|  | err = os.MkdirAll(sandboxesRoot, 0777) | 
|  | if err != nil { | 
|  | return fmt.Errorf("failed to create %q: %w", sandboxesRoot, err) | 
|  | } | 
|  |  | 
|  | // This tool assumes that there are no two concurrent runs with the same | 
|  | // manifestFile. It should therefore be safe to use the hash of the | 
|  | // manifestFile as the temporary directory name. We do this because it | 
|  | // makes the temporary directory name deterministic. There are some | 
|  | // tools that embed the name of the temporary output in the output, and | 
|  | // they otherwise cause non-determinism, which then poisons actions | 
|  | // depending on this one. | 
|  | hash := sha1.New() | 
|  | hash.Write([]byte(manifestFile)) | 
|  | tempDir := filepath.Join(sandboxesRoot, "sbox", hex.EncodeToString(hash.Sum(nil))) | 
|  |  | 
|  | err = os.RemoveAll(tempDir) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | err = os.MkdirAll(tempDir, 0777) | 
|  | if err != nil { | 
|  | return fmt.Errorf("failed to create temporary dir in %q: %w", sandboxesRoot, err) | 
|  | } | 
|  |  | 
|  | // In the common case, the following line of code is what removes the sandbox | 
|  | // If a fatal error occurs (such as if our Go process is killed unexpectedly), | 
|  | // then at the beginning of the next build, Soong will wipe the temporary | 
|  | // directory. | 
|  | defer func() { | 
|  | // in some cases we decline to remove the temp dir, to facilitate debugging | 
|  | if !keepOutDir { | 
|  | os.RemoveAll(tempDir) | 
|  | } | 
|  | }() | 
|  |  | 
|  | // If there is more than one command in the manifest use a separate directory for each one. | 
|  | useSubDir := len(manifest.Commands) > 1 | 
|  | var commandDepFiles []string | 
|  |  | 
|  | for i, command := range manifest.Commands { | 
|  | localTempDir := tempDir | 
|  | if useSubDir { | 
|  | localTempDir = filepath.Join(localTempDir, strconv.Itoa(i)) | 
|  | } | 
|  | depFile, err := runCommand(command, localTempDir, i) | 
|  | if err != nil { | 
|  | // Running the command failed, keep the temporary output directory around in | 
|  | // case a user wants to inspect it for debugging purposes.  Soong will delete | 
|  | // it at the beginning of the next build anyway. | 
|  | keepOutDir = true | 
|  | return err | 
|  | } | 
|  | if depFile != "" { | 
|  | commandDepFiles = append(commandDepFiles, depFile) | 
|  | } | 
|  | } | 
|  |  | 
|  | outputDepFile := manifest.GetOutputDepfile() | 
|  | if len(commandDepFiles) > 0 && outputDepFile == "" { | 
|  | return fmt.Errorf("Sandboxed commands used %s but output depfile is not set in manifest file", | 
|  | depFilePlaceholder) | 
|  | } | 
|  |  | 
|  | if outputDepFile != "" { | 
|  | // Merge the depfiles from each command in the manifest to a single output depfile. | 
|  | err = rewriteDepFiles(commandDepFiles, outputDepFile) | 
|  | if err != nil { | 
|  | return fmt.Errorf("failed merging depfiles: %w", err) | 
|  | } | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // createCommandScript will create and return an exec.Cmd that runs rawCommand. | 
|  | // | 
|  | // rawCommand is executed via a script in the sandbox. | 
|  | // scriptPath is the temporary where the script is created. | 
|  | // scriptPathInSandbox is the path to the script in the sbox environment. | 
|  | // | 
|  | // returns an exec.Cmd that can be ran from within sbox context if no error, or nil if error. | 
|  | // caller must ensure script is cleaned up if function succeeds. | 
|  | func createCommandScript(rawCommand, scriptPath, scriptPathInSandbox string) (*exec.Cmd, error) { | 
|  | err := os.WriteFile(scriptPath, []byte(rawCommand), 0644) | 
|  | if err != nil { | 
|  | return nil, fmt.Errorf("failed to write command %s... to %s", | 
|  | rawCommand[0:40], scriptPath) | 
|  | } | 
|  | return exec.Command("bash", scriptPathInSandbox), nil | 
|  | } | 
|  |  | 
|  | // readManifest reads an sbox manifest from a textproto file. | 
|  | func readManifest(file string) (*sbox_proto.Manifest, error) { | 
|  | manifestData, err := ioutil.ReadFile(file) | 
|  | if err != nil { | 
|  | return nil, fmt.Errorf("error reading manifest %q: %w", file, err) | 
|  | } | 
|  |  | 
|  | manifest := sbox_proto.Manifest{} | 
|  |  | 
|  | err = prototext.Unmarshal(manifestData, &manifest) | 
|  | if err != nil { | 
|  | return nil, fmt.Errorf("error parsing manifest %q: %w", file, err) | 
|  | } | 
|  |  | 
|  | return &manifest, nil | 
|  | } | 
|  |  | 
|  | // runCommand runs a single command from a manifest.  If the command references the | 
|  | // __SBOX_DEPFILE__ placeholder it returns the name of the depfile that was used. | 
|  | func runCommand(command *sbox_proto.Command, tempDir string, commandIndex int) (depFile string, err error) { | 
|  | rawCommand := command.GetCommand() | 
|  | if rawCommand == "" { | 
|  | return "", fmt.Errorf("command is required") | 
|  | } | 
|  |  | 
|  | // Remove files from the output directory | 
|  | err = clearOutputDirectory(command.CopyAfter, outputDir, writeType(writeIfChanged)) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | pathToTempDirInSbox := tempDir | 
|  | if command.GetChdir() { | 
|  | pathToTempDirInSbox = "." | 
|  | } | 
|  |  | 
|  | err = os.MkdirAll(tempDir, 0777) | 
|  | if err != nil { | 
|  | return "", fmt.Errorf("failed to create %q: %w", tempDir, err) | 
|  | } | 
|  |  | 
|  | // Copy in any files specified by the manifest. | 
|  | err = copyFiles(command.CopyBefore, "", tempDir, requireFromExists, alwaysWrite) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  | err = copyRspFiles(command.RspFiles, tempDir, pathToTempDirInSbox) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | if strings.Contains(rawCommand, depFilePlaceholder) { | 
|  | depFile = filepath.Join(pathToTempDirInSbox, "deps.d") | 
|  | rawCommand = strings.Replace(rawCommand, depFilePlaceholder, depFile, -1) | 
|  | } | 
|  |  | 
|  | if strings.Contains(rawCommand, sandboxDirPlaceholder) { | 
|  | rawCommand = strings.Replace(rawCommand, sandboxDirPlaceholder, pathToTempDirInSbox, -1) | 
|  | } | 
|  |  | 
|  | // Emulate ninja's behavior of creating the directories for any output files before | 
|  | // running the command. | 
|  | err = makeOutputDirs(command.CopyAfter, tempDir) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | scriptName := fmt.Sprintf("sbox_command.%d.bash", commandIndex) | 
|  | scriptPath := joinPath(tempDir, scriptName) | 
|  | scriptPathInSandbox := joinPath(pathToTempDirInSbox, scriptName) | 
|  | cmd, err := createCommandScript(rawCommand, scriptPath, scriptPathInSandbox) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | buf := &bytes.Buffer{} | 
|  | cmd.Stdin = os.Stdin | 
|  | cmd.Stdout = buf | 
|  | cmd.Stderr = buf | 
|  |  | 
|  | if command.GetChdir() { | 
|  | cmd.Dir = tempDir | 
|  | path := os.Getenv("PATH") | 
|  | absPath, err := makeAbsPathEnv(path) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  | err = os.Setenv("PATH", absPath) | 
|  | if err != nil { | 
|  | return "", fmt.Errorf("Failed to update PATH: %w", err) | 
|  | } | 
|  | } | 
|  | err = cmd.Run() | 
|  |  | 
|  | if err != nil { | 
|  | // The command failed, do a best effort copy of output files out of the sandbox.  This is | 
|  | // especially useful for linters with baselines that print an error message on failure | 
|  | // with a command to copy the output lint errors to the new baseline.  Use a copy instead of | 
|  | // a move to leave the sandbox intact for manual inspection | 
|  | copyFiles(command.CopyAfter, tempDir, "", allowFromNotExists, writeType(writeIfChanged)) | 
|  | } | 
|  |  | 
|  | // If the command  was executed but failed with an error, print a debugging message before | 
|  | // the command's output so it doesn't scroll the real error message off the screen. | 
|  | if exit, ok := err.(*exec.ExitError); ok && !exit.Success() { | 
|  | fmt.Fprintf(os.Stderr, | 
|  | "The failing command was run inside an sbox sandbox in temporary directory\n"+ | 
|  | "%s\n"+ | 
|  | "The failing command line can be found in\n"+ | 
|  | "%s\n", | 
|  | tempDir, scriptPath) | 
|  | } | 
|  |  | 
|  | // Write the command's combined stdout/stderr. | 
|  | os.Stdout.Write(buf.Bytes()) | 
|  |  | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | err = validateOutputFiles(command.CopyAfter, tempDir, outputDir, rawCommand) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | // the created files match the declared files; now move them | 
|  | err = moveFiles(command.CopyAfter, tempDir, "", writeType(writeIfChanged)) | 
|  | if err != nil { | 
|  | return "", err | 
|  | } | 
|  |  | 
|  | return depFile, nil | 
|  | } | 
|  |  | 
|  | // makeOutputDirs creates directories in the sandbox dir for every file that has a rule to be copied | 
|  | // out of the sandbox.  This emulate's Ninja's behavior of creating directories for output files | 
|  | // so that the tools don't have to. | 
|  | func makeOutputDirs(copies []*sbox_proto.Copy, sandboxDir string) error { | 
|  | for _, copyPair := range copies { | 
|  | dir := joinPath(sandboxDir, filepath.Dir(copyPair.GetFrom())) | 
|  | err := os.MkdirAll(dir, 0777) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // validateOutputFiles verifies that all files that have a rule to be copied out of the sandbox | 
|  | // were created by the command. | 
|  | func validateOutputFiles(copies []*sbox_proto.Copy, sandboxDir, outputDir, rawCommand string) error { | 
|  | var missingOutputErrors []error | 
|  | var incorrectOutputDirectoryErrors []error | 
|  | for _, copyPair := range copies { | 
|  | fromPath := joinPath(sandboxDir, copyPair.GetFrom()) | 
|  | fileInfo, err := os.Stat(fromPath) | 
|  | if err != nil { | 
|  | missingOutputErrors = append(missingOutputErrors, fmt.Errorf("%s: does not exist", fromPath)) | 
|  | continue | 
|  | } | 
|  | if fileInfo.IsDir() { | 
|  | missingOutputErrors = append(missingOutputErrors, fmt.Errorf("%s: not a file", fromPath)) | 
|  | } | 
|  |  | 
|  | toPath := copyPair.GetTo() | 
|  | if rel, err := filepath.Rel(outputDir, toPath); err != nil { | 
|  | return err | 
|  | } else if strings.HasPrefix(rel, "../") { | 
|  | incorrectOutputDirectoryErrors = append(incorrectOutputDirectoryErrors, | 
|  | fmt.Errorf("%s is not under %s", toPath, outputDir)) | 
|  | } | 
|  | } | 
|  |  | 
|  | const maxErrors = 25 | 
|  |  | 
|  | if len(incorrectOutputDirectoryErrors) > 0 { | 
|  | errorMessage := "" | 
|  | more := 0 | 
|  | if len(incorrectOutputDirectoryErrors) > maxErrors { | 
|  | more = len(incorrectOutputDirectoryErrors) - maxErrors | 
|  | incorrectOutputDirectoryErrors = incorrectOutputDirectoryErrors[:maxErrors] | 
|  | } | 
|  |  | 
|  | for _, err := range incorrectOutputDirectoryErrors { | 
|  | errorMessage += err.Error() + "\n" | 
|  | } | 
|  | if more > 0 { | 
|  | errorMessage += fmt.Sprintf("...%v more", more) | 
|  | } | 
|  |  | 
|  | return errors.New(errorMessage) | 
|  | } | 
|  |  | 
|  | if len(missingOutputErrors) > 0 { | 
|  | // find all created files for making a more informative error message | 
|  | createdFiles := findAllFilesUnder(sandboxDir) | 
|  |  | 
|  | // build error message | 
|  | errorMessage := "mismatch between declared and actual outputs\n" | 
|  | errorMessage += "in sbox command(" + rawCommand + ")\n\n" | 
|  | errorMessage += "in sandbox " + sandboxDir + ",\n" | 
|  | errorMessage += fmt.Sprintf("failed to create %v files:\n", len(missingOutputErrors)) | 
|  | for _, missingOutputError := range missingOutputErrors { | 
|  | errorMessage += "  " + missingOutputError.Error() + "\n" | 
|  | } | 
|  | if len(createdFiles) < 1 { | 
|  | errorMessage += "created 0 files." | 
|  | } else { | 
|  | errorMessage += fmt.Sprintf("did create %v files:\n", len(createdFiles)) | 
|  | creationMessages := createdFiles | 
|  | if len(creationMessages) > maxErrors { | 
|  | creationMessages = creationMessages[:maxErrors] | 
|  | creationMessages = append(creationMessages, fmt.Sprintf("...%v more", len(createdFiles)-maxErrors)) | 
|  | } | 
|  | for _, creationMessage := range creationMessages { | 
|  | errorMessage += "  " + creationMessage + "\n" | 
|  | } | 
|  | } | 
|  |  | 
|  | return errors.New(errorMessage) | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | type existsType bool | 
|  |  | 
|  | const ( | 
|  | requireFromExists  existsType = false | 
|  | allowFromNotExists            = true | 
|  | ) | 
|  |  | 
|  | type writeType bool | 
|  |  | 
|  | const ( | 
|  | alwaysWrite        writeType = false | 
|  | onlyWriteIfChanged           = true | 
|  | ) | 
|  |  | 
|  | // copyFiles copies files in or out of the sandbox.  If exists is allowFromNotExists then errors | 
|  | // caused by a from path not existing are ignored.  If write is onlyWriteIfChanged then the output | 
|  | // file is compared to the input file and not written to if it is the same, avoiding updating | 
|  | // the timestamp. | 
|  | func copyFiles(copies []*sbox_proto.Copy, fromDir, toDir string, exists existsType, write writeType) error { | 
|  | for _, copyPair := range copies { | 
|  | fromPath := joinPath(fromDir, copyPair.GetFrom()) | 
|  | toPath := joinPath(toDir, copyPair.GetTo()) | 
|  | err := copyOneFile(fromPath, toPath, copyPair.GetExecutable(), exists, write) | 
|  | if err != nil { | 
|  | return fmt.Errorf("error copying %q to %q: %w", fromPath, toPath, err) | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // copyOneFile copies a file and its permissions.  If forceExecutable is true it adds u+x to the | 
|  | // permissions.  If exists is allowFromNotExists it returns nil if the from path doesn't exist. | 
|  | // If write is onlyWriteIfChanged then the output file is compared to the input file and not written to | 
|  | // if it is the same, avoiding updating the timestamp. | 
|  | func copyOneFile(from string, to string, forceExecutable bool, exists existsType, | 
|  | write writeType) error { | 
|  | err := os.MkdirAll(filepath.Dir(to), 0777) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | stat, err := os.Stat(from) | 
|  | if err != nil { | 
|  | if os.IsNotExist(err) && exists == allowFromNotExists { | 
|  | return nil | 
|  | } | 
|  | return err | 
|  | } | 
|  |  | 
|  | perm := stat.Mode() | 
|  | if forceExecutable { | 
|  | perm = perm | 0100 // u+x | 
|  | } | 
|  |  | 
|  | if write == onlyWriteIfChanged && filesHaveSameContents(from, to) { | 
|  | return nil | 
|  | } | 
|  |  | 
|  | in, err := os.Open(from) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | defer in.Close() | 
|  |  | 
|  | // Remove the target before copying.  In most cases the file won't exist, but if there are | 
|  | // duplicate copy rules for a file and the source file was read-only the second copy could | 
|  | // fail. | 
|  | err = os.Remove(to) | 
|  | if err != nil && !os.IsNotExist(err) { | 
|  | return err | 
|  | } | 
|  |  | 
|  | out, err := os.Create(to) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | defer func() { | 
|  | out.Close() | 
|  | if err != nil { | 
|  | os.Remove(to) | 
|  | } | 
|  | }() | 
|  |  | 
|  | _, err = io.Copy(out, in) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | if err = out.Close(); err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | if err = os.Chmod(to, perm); err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // copyRspFiles copies rsp files into the sandbox with path mappings, and also copies the files | 
|  | // listed into the sandbox. | 
|  | func copyRspFiles(rspFiles []*sbox_proto.RspFile, toDir, toDirInSandbox string) error { | 
|  | for _, rspFile := range rspFiles { | 
|  | err := copyOneRspFile(rspFile, toDir, toDirInSandbox) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // copyOneRspFiles copies an rsp file into the sandbox with path mappings, and also copies the files | 
|  | // listed into the sandbox. | 
|  | func copyOneRspFile(rspFile *sbox_proto.RspFile, toDir, toDirInSandbox string) error { | 
|  | in, err := os.Open(rspFile.GetFile()) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | defer in.Close() | 
|  |  | 
|  | files, err := response.ReadRspFile(in) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | for i, from := range files { | 
|  | // Convert the real path of the input file into the path inside the sandbox using the | 
|  | // path mappings. | 
|  | to := applyPathMappings(rspFile.PathMappings, from) | 
|  |  | 
|  | // Copy the file into the sandbox. | 
|  | err := copyOneFile(from, joinPath(toDir, to), false, requireFromExists, alwaysWrite) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | // Rewrite the name in the list of files to be relative to the sandbox directory. | 
|  | files[i] = joinPath(toDirInSandbox, to) | 
|  | } | 
|  |  | 
|  | // Convert the real path of the rsp file into the path inside the sandbox using the path | 
|  | // mappings. | 
|  | outRspFile := joinPath(toDir, applyPathMappings(rspFile.PathMappings, rspFile.GetFile())) | 
|  |  | 
|  | err = os.MkdirAll(filepath.Dir(outRspFile), 0777) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | out, err := os.Create(outRspFile) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | defer out.Close() | 
|  |  | 
|  | // Write the rsp file with converted paths into the sandbox. | 
|  | err = response.WriteRspFile(out, files) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // applyPathMappings takes a list of path mappings and a path, and returns the path with the first | 
|  | // matching path mapping applied.  If the path does not match any of the path mappings then it is | 
|  | // returned unmodified. | 
|  | func applyPathMappings(pathMappings []*sbox_proto.PathMapping, path string) string { | 
|  | for _, mapping := range pathMappings { | 
|  | if strings.HasPrefix(path, mapping.GetFrom()+"/") { | 
|  | return joinPath(mapping.GetTo()+"/", strings.TrimPrefix(path, mapping.GetFrom()+"/")) | 
|  | } | 
|  | } | 
|  | return path | 
|  | } | 
|  |  | 
|  | // moveFiles moves files specified by a set of copy rules.  It uses os.Rename, so it is restricted | 
|  | // to moving files where the source and destination are in the same filesystem.  This is OK for | 
|  | // sbox because the temporary directory is inside the out directory.  If write is onlyWriteIfChanged | 
|  | // then the output file is compared to the input file and not written to if it is the same, avoiding | 
|  | // updating the timestamp.  Otherwise it always updates the timestamp of the new file. | 
|  | func moveFiles(copies []*sbox_proto.Copy, fromDir, toDir string, write writeType) error { | 
|  | for _, copyPair := range copies { | 
|  | fromPath := joinPath(fromDir, copyPair.GetFrom()) | 
|  | toPath := joinPath(toDir, copyPair.GetTo()) | 
|  | err := os.MkdirAll(filepath.Dir(toPath), 0777) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | if write == onlyWriteIfChanged && filesHaveSameContents(fromPath, toPath) { | 
|  | continue | 
|  | } | 
|  |  | 
|  | err = os.Rename(fromPath, toPath) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | // Update the timestamp of the output file in case the tool wrote an old timestamp (for example, tar can extract | 
|  | // files with old timestamps). | 
|  | now := time.Now() | 
|  | err = os.Chtimes(toPath, now, now) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // clearOutputDirectory removes all files in the output directory if write is alwaysWrite, or | 
|  | // any files not listed in copies if write is onlyWriteIfChanged | 
|  | func clearOutputDirectory(copies []*sbox_proto.Copy, outputDir string, write writeType) error { | 
|  | if outputDir == "" { | 
|  | return fmt.Errorf("output directory must be set") | 
|  | } | 
|  |  | 
|  | if write == alwaysWrite { | 
|  | // When writing all the output files remove the whole output directory | 
|  | return os.RemoveAll(outputDir) | 
|  | } | 
|  |  | 
|  | outputFiles := make(map[string]bool, len(copies)) | 
|  | for _, copyPair := range copies { | 
|  | outputFiles[copyPair.GetTo()] = true | 
|  | } | 
|  |  | 
|  | existingFiles := findAllFilesUnder(outputDir) | 
|  | for _, existingFile := range existingFiles { | 
|  | fullExistingFile := filepath.Join(outputDir, existingFile) | 
|  | if !outputFiles[fullExistingFile] { | 
|  | err := os.Remove(fullExistingFile) | 
|  | if err != nil { | 
|  | return fmt.Errorf("failed to remove obsolete output file %s: %w", fullExistingFile, err) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // Rewrite one or more depfiles so that it doesn't include the (randomized) sandbox directory | 
|  | // to an output file. | 
|  | func rewriteDepFiles(ins []string, out string) error { | 
|  | var mergedDeps []string | 
|  | for _, in := range ins { | 
|  | data, err := ioutil.ReadFile(in) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | deps, err := makedeps.Parse(in, bytes.NewBuffer(data)) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | mergedDeps = append(mergedDeps, deps.Inputs...) | 
|  | } | 
|  |  | 
|  | deps := makedeps.Deps{ | 
|  | // Ninja doesn't care what the output file is, so we can use any string here. | 
|  | Output: "outputfile", | 
|  | Inputs: mergedDeps, | 
|  | } | 
|  |  | 
|  | // Make the directory for the output depfile in case it is in a different directory | 
|  | // than any of the output files. | 
|  | outDir := filepath.Dir(out) | 
|  | err := os.MkdirAll(outDir, 0777) | 
|  | if err != nil { | 
|  | return fmt.Errorf("failed to create %q: %w", outDir, err) | 
|  | } | 
|  |  | 
|  | return ioutil.WriteFile(out, deps.Print(), 0666) | 
|  | } | 
|  |  | 
|  | // joinPath wraps filepath.Join but returns file without appending to dir if file is | 
|  | // absolute. | 
|  | func joinPath(dir, file string) string { | 
|  | if filepath.IsAbs(file) { | 
|  | return file | 
|  | } | 
|  | return filepath.Join(dir, file) | 
|  | } | 
|  |  | 
|  | // filesHaveSameContents compares the contents if two files, returning true if they are the same | 
|  | // and returning false if they are different or any errors occur. | 
|  | func filesHaveSameContents(a, b string) bool { | 
|  | // Compare the sizes of the two files | 
|  | statA, err := os.Stat(a) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  | statB, err := os.Stat(b) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  |  | 
|  | if statA.Size() != statB.Size() { | 
|  | return false | 
|  | } | 
|  |  | 
|  | // Open the two files | 
|  | fileA, err := os.Open(a) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  | defer fileA.Close() | 
|  | fileB, err := os.Open(b) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  | defer fileB.Close() | 
|  |  | 
|  | // Compare the files 1MB at a time | 
|  | const bufSize = 1 * 1024 * 1024 | 
|  | bufA := make([]byte, bufSize) | 
|  | bufB := make([]byte, bufSize) | 
|  |  | 
|  | remain := statA.Size() | 
|  | for remain > 0 { | 
|  | toRead := int64(bufSize) | 
|  | if toRead > remain { | 
|  | toRead = remain | 
|  | } | 
|  |  | 
|  | _, err = io.ReadFull(fileA, bufA[:toRead]) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  | _, err = io.ReadFull(fileB, bufB[:toRead]) | 
|  | if err != nil { | 
|  | return false | 
|  | } | 
|  |  | 
|  | if bytes.Compare(bufA[:toRead], bufB[:toRead]) != 0 { | 
|  | return false | 
|  | } | 
|  |  | 
|  | remain -= toRead | 
|  | } | 
|  |  | 
|  | return true | 
|  | } | 
|  |  | 
|  | func makeAbsPathEnv(pathEnv string) (string, error) { | 
|  | pathEnvElements := filepath.SplitList(pathEnv) | 
|  | for i, p := range pathEnvElements { | 
|  | if !filepath.IsAbs(p) { | 
|  | absPath, err := filepath.Abs(p) | 
|  | if err != nil { | 
|  | return "", fmt.Errorf("failed to make PATH entry %q absolute: %w", p, err) | 
|  | } | 
|  | pathEnvElements[i] = absPath | 
|  | } | 
|  | } | 
|  | return strings.Join(pathEnvElements, string(filepath.ListSeparator)), nil | 
|  | } |