| // Copyright 2018 Google Inc. All rights reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     http://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | package android | 
 |  | 
 | import ( | 
 | 	"crypto/sha256" | 
 | 	"fmt" | 
 | 	"path/filepath" | 
 | 	"sort" | 
 | 	"strings" | 
 | 	"testing" | 
 |  | 
 | 	"github.com/google/blueprint" | 
 | 	"github.com/google/blueprint/proptools" | 
 | 	"google.golang.org/protobuf/encoding/prototext" | 
 | 	"google.golang.org/protobuf/proto" | 
 |  | 
 | 	"android/soong/cmd/sbox/sbox_proto" | 
 | 	"android/soong/remoteexec" | 
 | 	"android/soong/response" | 
 | 	"android/soong/shared" | 
 | ) | 
 |  | 
 | const sboxSandboxBaseDir = "__SBOX_SANDBOX_DIR__" | 
 | const sboxOutSubDir = "out" | 
 | const sboxToolsSubDir = "tools" | 
 | const sboxOutDir = sboxSandboxBaseDir + "/" + sboxOutSubDir | 
 |  | 
 | // RuleBuilder provides an alternative to ModuleContext.Rule and ModuleContext.Build to add a command line to the build | 
 | // graph. | 
 | type RuleBuilder struct { | 
 | 	pctx PackageContext | 
 | 	ctx  BuilderContext | 
 |  | 
 | 	commands         []*RuleBuilderCommand | 
 | 	installs         RuleBuilderInstalls | 
 | 	temporariesSet   map[WritablePath]bool | 
 | 	restat           bool | 
 | 	sbox             bool | 
 | 	highmem          bool | 
 | 	remoteable       RemoteRuleSupports | 
 | 	rbeParams        *remoteexec.REParams | 
 | 	outDir           WritablePath | 
 | 	sboxOutSubDir    string | 
 | 	sboxTools        bool | 
 | 	sboxInputs       bool | 
 | 	sboxManifestPath WritablePath | 
 | 	missingDeps      []string | 
 | } | 
 |  | 
 | // NewRuleBuilder returns a newly created RuleBuilder. | 
 | func NewRuleBuilder(pctx PackageContext, ctx BuilderContext) *RuleBuilder { | 
 | 	return &RuleBuilder{ | 
 | 		pctx:           pctx, | 
 | 		ctx:            ctx, | 
 | 		temporariesSet: make(map[WritablePath]bool), | 
 | 		sboxOutSubDir:  sboxOutSubDir, | 
 | 	} | 
 | } | 
 |  | 
 | // SetSboxOutDirDirAsEmpty sets the out subdirectory to an empty string | 
 | // This is useful for sandboxing actions that change the execution root to a path in out/ (e.g mixed builds) | 
 | // For such actions, SetSboxOutDirDirAsEmpty ensures that the path does not become $SBOX_SANDBOX_DIR/out/out/bazel/output/execroot/__main__/... | 
 | func (rb *RuleBuilder) SetSboxOutDirDirAsEmpty() *RuleBuilder { | 
 | 	rb.sboxOutSubDir = "" | 
 | 	return rb | 
 | } | 
 |  | 
 | // RuleBuilderInstall is a tuple of install from and to locations. | 
 | type RuleBuilderInstall struct { | 
 | 	From Path | 
 | 	To   string | 
 | } | 
 |  | 
 | type RuleBuilderInstalls []RuleBuilderInstall | 
 |  | 
 | // String returns the RuleBuilderInstalls in the form used by $(call copy-many-files) in Make, a space separated | 
 | // list of from:to tuples. | 
 | func (installs RuleBuilderInstalls) String() string { | 
 | 	sb := strings.Builder{} | 
 | 	for i, install := range installs { | 
 | 		if i != 0 { | 
 | 			sb.WriteRune(' ') | 
 | 		} | 
 | 		sb.WriteString(install.From.String()) | 
 | 		sb.WriteRune(':') | 
 | 		sb.WriteString(install.To) | 
 | 	} | 
 | 	return sb.String() | 
 | } | 
 |  | 
 | // MissingDeps adds modules to the list of missing dependencies.  If MissingDeps | 
 | // is called with a non-empty input, any call to Build will result in a rule | 
 | // that will print an error listing the missing dependencies and fail. | 
 | // MissingDeps should only be called if Config.AllowMissingDependencies() is | 
 | // true. | 
 | func (r *RuleBuilder) MissingDeps(missingDeps []string) { | 
 | 	r.missingDeps = append(r.missingDeps, missingDeps...) | 
 | } | 
 |  | 
 | // Restat marks the rule as a restat rule, which will be passed to ModuleContext.Rule in BuildParams.Restat. | 
 | func (r *RuleBuilder) Restat() *RuleBuilder { | 
 | 	r.restat = true | 
 | 	return r | 
 | } | 
 |  | 
 | // HighMem marks the rule as a high memory rule, which will limit how many run in parallel with other high memory | 
 | // rules. | 
 | func (r *RuleBuilder) HighMem() *RuleBuilder { | 
 | 	r.highmem = true | 
 | 	return r | 
 | } | 
 |  | 
 | // Remoteable marks the rule as supporting remote execution. | 
 | func (r *RuleBuilder) Remoteable(supports RemoteRuleSupports) *RuleBuilder { | 
 | 	r.remoteable = supports | 
 | 	return r | 
 | } | 
 |  | 
 | // Rewrapper marks the rule as running inside rewrapper using the given params in order to support | 
 | // running on RBE.  During RuleBuilder.Build the params will be combined with the inputs, outputs | 
 | // and tools known to RuleBuilder to prepend an appropriate rewrapper command line to the rule's | 
 | // command line. | 
 | func (r *RuleBuilder) Rewrapper(params *remoteexec.REParams) *RuleBuilder { | 
 | 	if !r.sboxInputs { | 
 | 		panic(fmt.Errorf("RuleBuilder.Rewrapper must be called after RuleBuilder.SandboxInputs")) | 
 | 	} | 
 | 	r.rbeParams = params | 
 | 	return r | 
 | } | 
 |  | 
 | // Sbox marks the rule as needing to be wrapped by sbox. The outputDir should point to the output | 
 | // directory that sbox will wipe. It should not be written to by any other rule. manifestPath should | 
 | // point to a location where sbox's manifest will be written and must be outside outputDir. sbox | 
 | // will ensure that all outputs have been written, and will discard any output files that were not | 
 | // specified. | 
 | func (r *RuleBuilder) Sbox(outputDir WritablePath, manifestPath WritablePath) *RuleBuilder { | 
 | 	if r.sbox { | 
 | 		panic("Sbox() may not be called more than once") | 
 | 	} | 
 | 	if len(r.commands) > 0 { | 
 | 		panic("Sbox() may not be called after Command()") | 
 | 	} | 
 | 	r.sbox = true | 
 | 	r.outDir = outputDir | 
 | 	r.sboxManifestPath = manifestPath | 
 | 	return r | 
 | } | 
 |  | 
 | // SandboxTools enables tool sandboxing for the rule by copying any referenced tools into the | 
 | // sandbox. | 
 | func (r *RuleBuilder) SandboxTools() *RuleBuilder { | 
 | 	if !r.sbox { | 
 | 		panic("SandboxTools() must be called after Sbox()") | 
 | 	} | 
 | 	if len(r.commands) > 0 { | 
 | 		panic("SandboxTools() may not be called after Command()") | 
 | 	} | 
 | 	r.sboxTools = true | 
 | 	return r | 
 | } | 
 |  | 
 | // SandboxInputs enables input sandboxing for the rule by copying any referenced inputs into the | 
 | // sandbox.  It also implies SandboxTools(). | 
 | // | 
 | // Sandboxing inputs requires RuleBuilder to be aware of all references to input paths.  Paths | 
 | // that are passed to RuleBuilder outside of the methods that expect inputs, for example | 
 | // FlagWithArg, must use RuleBuilderCommand.PathForInput to translate the path to one that matches | 
 | // the sandbox layout. | 
 | func (r *RuleBuilder) SandboxInputs() *RuleBuilder { | 
 | 	if !r.sbox { | 
 | 		panic("SandboxInputs() must be called after Sbox()") | 
 | 	} | 
 | 	if len(r.commands) > 0 { | 
 | 		panic("SandboxInputs() may not be called after Command()") | 
 | 	} | 
 | 	r.sboxTools = true | 
 | 	r.sboxInputs = true | 
 | 	return r | 
 | } | 
 |  | 
 | // Install associates an output of the rule with an install location, which can be retrieved later using | 
 | // RuleBuilder.Installs. | 
 | func (r *RuleBuilder) Install(from Path, to string) { | 
 | 	r.installs = append(r.installs, RuleBuilderInstall{from, to}) | 
 | } | 
 |  | 
 | // Command returns a new RuleBuilderCommand for the rule.  The commands will be ordered in the rule by when they were | 
 | // created by this method.  That can be mutated through their methods in any order, as long as the mutations do not | 
 | // race with any call to Build. | 
 | func (r *RuleBuilder) Command() *RuleBuilderCommand { | 
 | 	command := &RuleBuilderCommand{ | 
 | 		rule: r, | 
 | 	} | 
 | 	r.commands = append(r.commands, command) | 
 | 	return command | 
 | } | 
 |  | 
 | // Temporary marks an output of a command as an intermediate file that will be used as an input to another command | 
 | // in the same rule, and should not be listed in Outputs. | 
 | func (r *RuleBuilder) Temporary(path WritablePath) { | 
 | 	r.temporariesSet[path] = true | 
 | } | 
 |  | 
 | // DeleteTemporaryFiles adds a command to the rule that deletes any outputs that have been marked using Temporary | 
 | // when the rule runs.  DeleteTemporaryFiles should be called after all calls to Temporary. | 
 | func (r *RuleBuilder) DeleteTemporaryFiles() { | 
 | 	var temporariesList WritablePaths | 
 |  | 
 | 	for intermediate := range r.temporariesSet { | 
 | 		temporariesList = append(temporariesList, intermediate) | 
 | 	} | 
 |  | 
 | 	sort.Slice(temporariesList, func(i, j int) bool { | 
 | 		return temporariesList[i].String() < temporariesList[j].String() | 
 | 	}) | 
 |  | 
 | 	r.Command().Text("rm").Flag("-f").Outputs(temporariesList) | 
 | } | 
 |  | 
 | // Inputs returns the list of paths that were passed to the RuleBuilderCommand methods that take | 
 | // input paths, such as RuleBuilderCommand.Input, RuleBuilderCommand.Implicit, or | 
 | // RuleBuilderCommand.FlagWithInput.  Inputs to a command that are also outputs of another command | 
 | // in the same RuleBuilder are filtered out.  The list is sorted and duplicates removed. | 
 | func (r *RuleBuilder) Inputs() Paths { | 
 | 	outputs := r.outputSet() | 
 | 	depFiles := r.depFileSet() | 
 |  | 
 | 	inputs := make(map[string]Path) | 
 | 	for _, c := range r.commands { | 
 | 		for _, input := range append(c.inputs, c.implicits...) { | 
 | 			inputStr := input.String() | 
 | 			if _, isOutput := outputs[inputStr]; !isOutput { | 
 | 				if _, isDepFile := depFiles[inputStr]; !isDepFile { | 
 | 					inputs[input.String()] = input | 
 | 				} | 
 | 			} | 
 | 		} | 
 | 	} | 
 |  | 
 | 	var inputList Paths | 
 | 	for _, input := range inputs { | 
 | 		inputList = append(inputList, input) | 
 | 	} | 
 |  | 
 | 	sort.Slice(inputList, func(i, j int) bool { | 
 | 		return inputList[i].String() < inputList[j].String() | 
 | 	}) | 
 |  | 
 | 	return inputList | 
 | } | 
 |  | 
 | // OrderOnlys returns the list of paths that were passed to the RuleBuilderCommand.OrderOnly or | 
 | // RuleBuilderCommand.OrderOnlys.  The list is sorted and duplicates removed. | 
 | func (r *RuleBuilder) OrderOnlys() Paths { | 
 | 	orderOnlys := make(map[string]Path) | 
 | 	for _, c := range r.commands { | 
 | 		for _, orderOnly := range c.orderOnlys { | 
 | 			orderOnlys[orderOnly.String()] = orderOnly | 
 | 		} | 
 | 	} | 
 |  | 
 | 	var orderOnlyList Paths | 
 | 	for _, orderOnly := range orderOnlys { | 
 | 		orderOnlyList = append(orderOnlyList, orderOnly) | 
 | 	} | 
 |  | 
 | 	sort.Slice(orderOnlyList, func(i, j int) bool { | 
 | 		return orderOnlyList[i].String() < orderOnlyList[j].String() | 
 | 	}) | 
 |  | 
 | 	return orderOnlyList | 
 | } | 
 |  | 
 | // Validations returns the list of paths that were passed to RuleBuilderCommand.Validation or | 
 | // RuleBuilderCommand.Validations.  The list is sorted and duplicates removed. | 
 | func (r *RuleBuilder) Validations() Paths { | 
 | 	validations := make(map[string]Path) | 
 | 	for _, c := range r.commands { | 
 | 		for _, validation := range c.validations { | 
 | 			validations[validation.String()] = validation | 
 | 		} | 
 | 	} | 
 |  | 
 | 	var validationList Paths | 
 | 	for _, validation := range validations { | 
 | 		validationList = append(validationList, validation) | 
 | 	} | 
 |  | 
 | 	sort.Slice(validationList, func(i, j int) bool { | 
 | 		return validationList[i].String() < validationList[j].String() | 
 | 	}) | 
 |  | 
 | 	return validationList | 
 | } | 
 |  | 
 | func (r *RuleBuilder) outputSet() map[string]WritablePath { | 
 | 	outputs := make(map[string]WritablePath) | 
 | 	for _, c := range r.commands { | 
 | 		for _, output := range c.outputs { | 
 | 			outputs[output.String()] = output | 
 | 		} | 
 | 	} | 
 | 	return outputs | 
 | } | 
 |  | 
 | // Outputs returns the list of paths that were passed to the RuleBuilderCommand methods that take | 
 | // output paths, such as RuleBuilderCommand.Output, RuleBuilderCommand.ImplicitOutput, or | 
 | // RuleBuilderCommand.FlagWithInput.  The list is sorted and duplicates removed. | 
 | func (r *RuleBuilder) Outputs() WritablePaths { | 
 | 	outputs := r.outputSet() | 
 |  | 
 | 	var outputList WritablePaths | 
 | 	for _, output := range outputs { | 
 | 		if !r.temporariesSet[output] { | 
 | 			outputList = append(outputList, output) | 
 | 		} | 
 | 	} | 
 |  | 
 | 	sort.Slice(outputList, func(i, j int) bool { | 
 | 		return outputList[i].String() < outputList[j].String() | 
 | 	}) | 
 |  | 
 | 	return outputList | 
 | } | 
 |  | 
 | func (r *RuleBuilder) depFileSet() map[string]WritablePath { | 
 | 	depFiles := make(map[string]WritablePath) | 
 | 	for _, c := range r.commands { | 
 | 		for _, depFile := range c.depFiles { | 
 | 			depFiles[depFile.String()] = depFile | 
 | 		} | 
 | 	} | 
 | 	return depFiles | 
 | } | 
 |  | 
 | // DepFiles returns the list of paths that were passed to the RuleBuilderCommand methods that take depfile paths, such | 
 | // as RuleBuilderCommand.DepFile or RuleBuilderCommand.FlagWithDepFile. | 
 | func (r *RuleBuilder) DepFiles() WritablePaths { | 
 | 	var depFiles WritablePaths | 
 |  | 
 | 	for _, c := range r.commands { | 
 | 		for _, depFile := range c.depFiles { | 
 | 			depFiles = append(depFiles, depFile) | 
 | 		} | 
 | 	} | 
 |  | 
 | 	return depFiles | 
 | } | 
 |  | 
 | // Installs returns the list of tuples passed to Install. | 
 | func (r *RuleBuilder) Installs() RuleBuilderInstalls { | 
 | 	return append(RuleBuilderInstalls(nil), r.installs...) | 
 | } | 
 |  | 
 | func (r *RuleBuilder) toolsSet() map[string]Path { | 
 | 	tools := make(map[string]Path) | 
 | 	for _, c := range r.commands { | 
 | 		for _, tool := range c.tools { | 
 | 			tools[tool.String()] = tool | 
 | 		} | 
 | 	} | 
 |  | 
 | 	return tools | 
 | } | 
 |  | 
 | // Tools returns the list of paths that were passed to the RuleBuilderCommand.Tool method.  The | 
 | // list is sorted and duplicates removed. | 
 | func (r *RuleBuilder) Tools() Paths { | 
 | 	toolsSet := r.toolsSet() | 
 |  | 
 | 	var toolsList Paths | 
 | 	for _, tool := range toolsSet { | 
 | 		toolsList = append(toolsList, tool) | 
 | 	} | 
 |  | 
 | 	sort.Slice(toolsList, func(i, j int) bool { | 
 | 		return toolsList[i].String() < toolsList[j].String() | 
 | 	}) | 
 |  | 
 | 	return toolsList | 
 | } | 
 |  | 
 | // RspFileInputs returns the list of paths that were passed to the RuleBuilderCommand.FlagWithRspFileInputList method. | 
 | func (r *RuleBuilder) RspFileInputs() Paths { | 
 | 	var rspFileInputs Paths | 
 | 	for _, c := range r.commands { | 
 | 		for _, rspFile := range c.rspFiles { | 
 | 			rspFileInputs = append(rspFileInputs, rspFile.paths...) | 
 | 		} | 
 | 	} | 
 |  | 
 | 	return rspFileInputs | 
 | } | 
 |  | 
 | func (r *RuleBuilder) rspFiles() []rspFileAndPaths { | 
 | 	var rspFiles []rspFileAndPaths | 
 | 	for _, c := range r.commands { | 
 | 		rspFiles = append(rspFiles, c.rspFiles...) | 
 | 	} | 
 |  | 
 | 	return rspFiles | 
 | } | 
 |  | 
 | // Commands returns a slice containing the built command line for each call to RuleBuilder.Command. | 
 | func (r *RuleBuilder) Commands() []string { | 
 | 	var commands []string | 
 | 	for _, c := range r.commands { | 
 | 		commands = append(commands, c.String()) | 
 | 	} | 
 | 	return commands | 
 | } | 
 |  | 
 | // BuilderContext is a subset of ModuleContext and SingletonContext. | 
 | type BuilderContext interface { | 
 | 	PathContext | 
 | 	Rule(PackageContext, string, blueprint.RuleParams, ...string) blueprint.Rule | 
 | 	Build(PackageContext, BuildParams) | 
 | } | 
 |  | 
 | var _ BuilderContext = ModuleContext(nil) | 
 | var _ BuilderContext = SingletonContext(nil) | 
 |  | 
 | func (r *RuleBuilder) depFileMergerCmd(depFiles WritablePaths) *RuleBuilderCommand { | 
 | 	return r.Command(). | 
 | 		builtToolWithoutDeps("dep_fixer"). | 
 | 		Inputs(depFiles.Paths()) | 
 | } | 
 |  | 
 | // BuildWithNinjaVars adds the built command line to the build graph, with dependencies on Inputs and Tools, and output files for | 
 | // Outputs. This function will not escape Ninja variables, so it may be used to write sandbox manifests using Ninja variables. | 
 | func (r *RuleBuilder) BuildWithUnescapedNinjaVars(name string, desc string) { | 
 | 	r.build(name, desc, false) | 
 | } | 
 |  | 
 | // Build adds the built command line to the build graph, with dependencies on Inputs and Tools, and output files for | 
 | // Outputs. | 
 | func (r *RuleBuilder) Build(name string, desc string) { | 
 | 	r.build(name, desc, true) | 
 | } | 
 |  | 
 | func (r *RuleBuilder) build(name string, desc string, ninjaEscapeCommandString bool) { | 
 | 	name = ninjaNameEscape(name) | 
 |  | 
 | 	if len(r.missingDeps) > 0 { | 
 | 		r.ctx.Build(r.pctx, BuildParams{ | 
 | 			Rule:        ErrorRule, | 
 | 			Outputs:     r.Outputs(), | 
 | 			Description: desc, | 
 | 			Args: map[string]string{ | 
 | 				"error": "missing dependencies: " + strings.Join(r.missingDeps, ", "), | 
 | 			}, | 
 | 		}) | 
 | 		return | 
 | 	} | 
 |  | 
 | 	var depFile WritablePath | 
 | 	var depFormat blueprint.Deps | 
 | 	if depFiles := r.DepFiles(); len(depFiles) > 0 { | 
 | 		depFile = depFiles[0] | 
 | 		depFormat = blueprint.DepsGCC | 
 | 		if len(depFiles) > 1 { | 
 | 			// Add a command locally that merges all depfiles together into the first depfile. | 
 | 			r.depFileMergerCmd(depFiles) | 
 |  | 
 | 			if r.sbox { | 
 | 				// Check for Rel() errors, as all depfiles should be in the output dir.  Errors | 
 | 				// will be reported to the ctx. | 
 | 				for _, path := range depFiles[1:] { | 
 | 					Rel(r.ctx, r.outDir.String(), path.String()) | 
 | 				} | 
 | 			} | 
 | 		} | 
 | 	} | 
 |  | 
 | 	tools := r.Tools() | 
 | 	commands := r.Commands() | 
 | 	outputs := r.Outputs() | 
 | 	inputs := r.Inputs() | 
 | 	rspFiles := r.rspFiles() | 
 |  | 
 | 	if len(commands) == 0 { | 
 | 		return | 
 | 	} | 
 | 	if len(outputs) == 0 { | 
 | 		panic("No outputs specified from any Commands") | 
 | 	} | 
 |  | 
 | 	commandString := strings.Join(commands, " && ") | 
 |  | 
 | 	if r.sbox { | 
 | 		// If running the command inside sbox, write the rule data out to an sbox | 
 | 		// manifest.textproto. | 
 | 		manifest := sbox_proto.Manifest{} | 
 | 		command := sbox_proto.Command{} | 
 | 		manifest.Commands = append(manifest.Commands, &command) | 
 | 		command.Command = proto.String(commandString) | 
 |  | 
 | 		if depFile != nil { | 
 | 			manifest.OutputDepfile = proto.String(depFile.String()) | 
 | 		} | 
 |  | 
 | 		// If sandboxing tools is enabled, add copy rules to the manifest to copy each tool | 
 | 		// into the sbox directory. | 
 | 		if r.sboxTools { | 
 | 			for _, tool := range tools { | 
 | 				command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ | 
 | 					From: proto.String(tool.String()), | 
 | 					To:   proto.String(sboxPathForToolRel(r.ctx, tool)), | 
 | 				}) | 
 | 			} | 
 | 			for _, c := range r.commands { | 
 | 				for _, tool := range c.packagedTools { | 
 | 					command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ | 
 | 						From:       proto.String(tool.srcPath.String()), | 
 | 						To:         proto.String(sboxPathForPackagedToolRel(tool)), | 
 | 						Executable: proto.Bool(tool.executable), | 
 | 					}) | 
 | 					tools = append(tools, tool.srcPath) | 
 | 				} | 
 | 			} | 
 | 		} | 
 |  | 
 | 		// If sandboxing inputs is enabled, add copy rules to the manifest to copy each input | 
 | 		// into the sbox directory. | 
 | 		if r.sboxInputs { | 
 | 			for _, input := range inputs { | 
 | 				command.CopyBefore = append(command.CopyBefore, &sbox_proto.Copy{ | 
 | 					From: proto.String(input.String()), | 
 | 					To:   proto.String(r.sboxPathForInputRel(input)), | 
 | 				}) | 
 | 			} | 
 |  | 
 | 			// If using rsp files copy them and their contents into the sbox directory with | 
 | 			// the appropriate path mappings. | 
 | 			for _, rspFile := range rspFiles { | 
 | 				command.RspFiles = append(command.RspFiles, &sbox_proto.RspFile{ | 
 | 					File: proto.String(rspFile.file.String()), | 
 | 					// These have to match the logic in sboxPathForInputRel | 
 | 					PathMappings: []*sbox_proto.PathMapping{ | 
 | 						{ | 
 | 							From: proto.String(r.outDir.String()), | 
 | 							To:   proto.String(sboxOutSubDir), | 
 | 						}, | 
 | 						{ | 
 | 							From: proto.String(r.ctx.Config().OutDir()), | 
 | 							To:   proto.String(sboxOutSubDir), | 
 | 						}, | 
 | 					}, | 
 | 				}) | 
 | 			} | 
 |  | 
 | 			command.Chdir = proto.Bool(true) | 
 | 		} | 
 |  | 
 | 		// Add copy rules to the manifest to copy each output file from the sbox directory. | 
 | 		// to the output directory after running the commands. | 
 | 		for _, output := range outputs { | 
 | 			rel := Rel(r.ctx, r.outDir.String(), output.String()) | 
 | 			command.CopyAfter = append(command.CopyAfter, &sbox_proto.Copy{ | 
 | 				From: proto.String(filepath.Join(r.sboxOutSubDir, rel)), | 
 | 				To:   proto.String(output.String()), | 
 | 			}) | 
 | 		} | 
 |  | 
 | 		// Outputs that were marked Temporary will not be checked that they are in the output | 
 | 		// directory by the loop above, check them here. | 
 | 		for path := range r.temporariesSet { | 
 | 			Rel(r.ctx, r.outDir.String(), path.String()) | 
 | 		} | 
 |  | 
 | 		// Add a hash of the list of input files to the manifest so that the textproto file | 
 | 		// changes when the list of input files changes and causes the sbox rule that | 
 | 		// depends on it to rerun. | 
 | 		command.InputHash = proto.String(hashSrcFiles(inputs)) | 
 |  | 
 | 		// Verify that the manifest textproto is not inside the sbox output directory, otherwise | 
 | 		// it will get deleted when the sbox rule clears its output directory. | 
 | 		_, manifestInOutDir := MaybeRel(r.ctx, r.outDir.String(), r.sboxManifestPath.String()) | 
 | 		if manifestInOutDir { | 
 | 			ReportPathErrorf(r.ctx, "sbox rule %q manifestPath %q must not be in outputDir %q", | 
 | 				name, r.sboxManifestPath.String(), r.outDir.String()) | 
 | 		} | 
 |  | 
 | 		// Create a rule to write the manifest as textproto. Pretty print it by indenting and | 
 | 		// splitting across multiple lines. | 
 | 		pbText, err := prototext.MarshalOptions{Indent: " "}.Marshal(&manifest) | 
 | 		if err != nil { | 
 | 			ReportPathErrorf(r.ctx, "sbox manifest failed to marshal: %q", err) | 
 | 		} | 
 | 		if ninjaEscapeCommandString { | 
 | 			WriteFileRule(r.ctx, r.sboxManifestPath, string(pbText)) | 
 | 		} else { | 
 | 			// We need  to have a rule to write files that is | 
 | 			// defined on the RuleBuilder's pctx in order to | 
 | 			// write Ninja variables in the string. | 
 | 			// The WriteFileRule function above rule can only write | 
 | 			// raw strings because it is defined on the android | 
 | 			// package's pctx, and it can't access variables defined | 
 | 			// in another context. | 
 | 			r.ctx.Build(r.pctx, BuildParams{ | 
 | 				Rule: r.ctx.Rule(r.pctx, "unescapedWriteFile", blueprint.RuleParams{ | 
 | 					Command:        `rm -rf ${out} && cat ${out}.rsp > ${out}`, | 
 | 					Rspfile:        "${out}.rsp", | 
 | 					RspfileContent: "${content}", | 
 | 					Description:    "write file", | 
 | 				}, "content"), | 
 | 				Output:      r.sboxManifestPath, | 
 | 				Description: "write sbox manifest " + r.sboxManifestPath.Base(), | 
 | 				Args: map[string]string{ | 
 | 					"content": string(pbText), | 
 | 				}, | 
 | 			}) | 
 | 		} | 
 |  | 
 | 		// Generate a new string to use as the command line of the sbox rule.  This uses | 
 | 		// a RuleBuilderCommand as a convenience method of building the command line, then | 
 | 		// converts it to a string to replace commandString. | 
 | 		sboxCmd := &RuleBuilderCommand{ | 
 | 			rule: &RuleBuilder{ | 
 | 				ctx: r.ctx, | 
 | 			}, | 
 | 		} | 
 | 		sboxCmd.builtToolWithoutDeps("sbox"). | 
 | 			FlagWithArg("--sandbox-path ", shared.TempDirForOutDir(PathForOutput(r.ctx).String())). | 
 | 			FlagWithArg("--output-dir ", r.outDir.String()). | 
 | 			FlagWithInput("--manifest ", r.sboxManifestPath) | 
 |  | 
 | 		if r.restat { | 
 | 			sboxCmd.Flag("--write-if-changed") | 
 | 		} | 
 |  | 
 | 		// Replace the command string, and add the sbox tool and manifest textproto to the | 
 | 		// dependencies of the final sbox rule. | 
 | 		commandString = sboxCmd.buf.String() | 
 | 		tools = append(tools, sboxCmd.tools...) | 
 | 		inputs = append(inputs, sboxCmd.inputs...) | 
 |  | 
 | 		if r.rbeParams != nil { | 
 | 			// RBE needs a list of input files to copy to the remote builder.  For inputs already | 
 | 			// listed in an rsp file, pass the rsp file directly to rewrapper.  For the rest, | 
 | 			// create a new rsp file to pass to rewrapper. | 
 | 			var remoteRspFiles Paths | 
 | 			var remoteInputs Paths | 
 |  | 
 | 			remoteInputs = append(remoteInputs, inputs...) | 
 | 			remoteInputs = append(remoteInputs, tools...) | 
 |  | 
 | 			for _, rspFile := range rspFiles { | 
 | 				remoteInputs = append(remoteInputs, rspFile.file) | 
 | 				remoteRspFiles = append(remoteRspFiles, rspFile.file) | 
 | 			} | 
 |  | 
 | 			if len(remoteInputs) > 0 { | 
 | 				inputsListFile := r.sboxManifestPath.ReplaceExtension(r.ctx, "rbe_inputs.list") | 
 | 				writeRspFileRule(r.ctx, inputsListFile, remoteInputs) | 
 | 				remoteRspFiles = append(remoteRspFiles, inputsListFile) | 
 | 				// Add the new rsp file as an extra input to the rule. | 
 | 				inputs = append(inputs, inputsListFile) | 
 | 			} | 
 |  | 
 | 			r.rbeParams.OutputFiles = outputs.Strings() | 
 | 			r.rbeParams.RSPFiles = remoteRspFiles.Strings() | 
 | 			rewrapperCommand := r.rbeParams.NoVarTemplate(r.ctx.Config().RBEWrapper()) | 
 | 			commandString = rewrapperCommand + " bash -c '" + strings.ReplaceAll(commandString, `'`, `'\''`) + "'" | 
 | 		} | 
 | 	} else { | 
 | 		// If not using sbox the rule will run the command directly, put the hash of the | 
 | 		// list of input files in a comment at the end of the command line to ensure ninja | 
 | 		// reruns the rule when the list of input files changes. | 
 | 		commandString += " # hash of input list: " + hashSrcFiles(inputs) | 
 | 	} | 
 |  | 
 | 	// Ninja doesn't like multiple outputs when depfiles are enabled, move all but the first output to | 
 | 	// ImplicitOutputs.  RuleBuilder doesn't use "$out", so the distinction between Outputs and | 
 | 	// ImplicitOutputs doesn't matter. | 
 | 	output := outputs[0] | 
 | 	implicitOutputs := outputs[1:] | 
 |  | 
 | 	var rspFile, rspFileContent string | 
 | 	var rspFileInputs Paths | 
 | 	if len(rspFiles) > 0 { | 
 | 		// The first rsp files uses Ninja's rsp file support for the rule | 
 | 		rspFile = rspFiles[0].file.String() | 
 | 		// Use "$in" for rspFileContent to avoid duplicating the list of files in the dependency | 
 | 		// list and in the contents of the rsp file.  Inputs to the rule that are not in the | 
 | 		// rsp file will be listed in Implicits instead of Inputs so they don't show up in "$in". | 
 | 		rspFileContent = "$in" | 
 | 		rspFileInputs = append(rspFileInputs, rspFiles[0].paths...) | 
 |  | 
 | 		for _, rspFile := range rspFiles[1:] { | 
 | 			// Any additional rsp files need an extra rule to write the file. | 
 | 			writeRspFileRule(r.ctx, rspFile.file, rspFile.paths) | 
 | 			// The main rule needs to depend on the inputs listed in the extra rsp file. | 
 | 			inputs = append(inputs, rspFile.paths...) | 
 | 			// The main rule needs to depend on the extra rsp file. | 
 | 			inputs = append(inputs, rspFile.file) | 
 | 		} | 
 | 	} | 
 |  | 
 | 	var pool blueprint.Pool | 
 | 	if r.ctx.Config().UseGoma() && r.remoteable.Goma { | 
 | 		// When USE_GOMA=true is set and the rule is supported by goma, allow jobs to run outside the local pool. | 
 | 	} else if r.ctx.Config().UseRBE() && r.remoteable.RBE { | 
 | 		// When USE_RBE=true is set and the rule is supported by RBE, use the remotePool. | 
 | 		pool = remotePool | 
 | 	} else if r.highmem { | 
 | 		pool = highmemPool | 
 | 	} else if r.ctx.Config().UseRemoteBuild() { | 
 | 		pool = localPool | 
 | 	} | 
 |  | 
 | 	if ninjaEscapeCommandString { | 
 | 		commandString = proptools.NinjaEscape(commandString) | 
 | 	} | 
 |  | 
 | 	r.ctx.Build(r.pctx, BuildParams{ | 
 | 		Rule: r.ctx.Rule(r.pctx, name, blueprint.RuleParams{ | 
 | 			Command:        commandString, | 
 | 			CommandDeps:    proptools.NinjaEscapeList(tools.Strings()), | 
 | 			Restat:         r.restat, | 
 | 			Rspfile:        proptools.NinjaEscape(rspFile), | 
 | 			RspfileContent: rspFileContent, | 
 | 			Pool:           pool, | 
 | 		}), | 
 | 		Inputs:          rspFileInputs, | 
 | 		Implicits:       inputs, | 
 | 		OrderOnly:       r.OrderOnlys(), | 
 | 		Validations:     r.Validations(), | 
 | 		Output:          output, | 
 | 		ImplicitOutputs: implicitOutputs, | 
 | 		Depfile:         depFile, | 
 | 		Deps:            depFormat, | 
 | 		Description:     desc, | 
 | 	}) | 
 | } | 
 |  | 
 | // RuleBuilderCommand is a builder for a command in a command line.  It can be mutated by its methods to add to the | 
 | // command and track dependencies.  The methods mutate the RuleBuilderCommand in place, as well as return the | 
 | // RuleBuilderCommand, so they can be used chained or unchained.  All methods that add text implicitly add a single | 
 | // space as a separator from the previous method. | 
 | type RuleBuilderCommand struct { | 
 | 	rule *RuleBuilder | 
 |  | 
 | 	buf           strings.Builder | 
 | 	inputs        Paths | 
 | 	implicits     Paths | 
 | 	orderOnlys    Paths | 
 | 	validations   Paths | 
 | 	outputs       WritablePaths | 
 | 	depFiles      WritablePaths | 
 | 	tools         Paths | 
 | 	packagedTools []PackagingSpec | 
 | 	rspFiles      []rspFileAndPaths | 
 | } | 
 |  | 
 | type rspFileAndPaths struct { | 
 | 	file  WritablePath | 
 | 	paths Paths | 
 | } | 
 |  | 
 | func checkPathNotNil(path Path) { | 
 | 	if path == nil { | 
 | 		panic("rule_builder paths cannot be nil") | 
 | 	} | 
 | } | 
 |  | 
 | func (c *RuleBuilderCommand) addInput(path Path) string { | 
 | 	checkPathNotNil(path) | 
 | 	c.inputs = append(c.inputs, path) | 
 | 	return c.PathForInput(path) | 
 | } | 
 |  | 
 | func (c *RuleBuilderCommand) addImplicit(path Path) { | 
 | 	checkPathNotNil(path) | 
 | 	c.implicits = append(c.implicits, path) | 
 | } | 
 |  | 
 | func (c *RuleBuilderCommand) addOrderOnly(path Path) { | 
 | 	checkPathNotNil(path) | 
 | 	c.orderOnlys = append(c.orderOnlys, path) | 
 | } | 
 |  | 
 | // PathForInput takes an input path and returns the appropriate path to use on the command line.  If | 
 | // sbox was enabled via a call to RuleBuilder.Sbox() and the path was an output path it returns a | 
 | // path with the placeholder prefix used for outputs in sbox.  If sbox is not enabled it returns the | 
 | // original path. | 
 | func (c *RuleBuilderCommand) PathForInput(path Path) string { | 
 | 	if c.rule.sbox { | 
 | 		rel, inSandbox := c.rule._sboxPathForInputRel(path) | 
 | 		if inSandbox { | 
 | 			rel = filepath.Join(sboxSandboxBaseDir, rel) | 
 | 		} | 
 | 		return rel | 
 | 	} | 
 | 	return path.String() | 
 | } | 
 |  | 
 | // PathsForInputs takes a list of input paths and returns the appropriate paths to use on the | 
 | // command line.  If sbox was enabled via a call to RuleBuilder.Sbox() a path was an output path, it | 
 | // returns the path with the placeholder prefix used for outputs in sbox.  If sbox is not enabled it | 
 | // returns the original paths. | 
 | func (c *RuleBuilderCommand) PathsForInputs(paths Paths) []string { | 
 | 	ret := make([]string, len(paths)) | 
 | 	for i, path := range paths { | 
 | 		ret[i] = c.PathForInput(path) | 
 | 	} | 
 | 	return ret | 
 | } | 
 |  | 
 | // PathForOutput takes an output path and returns the appropriate path to use on the command | 
 | // line.  If sbox was enabled via a call to RuleBuilder.Sbox(), it returns a path with the | 
 | // placeholder prefix used for outputs in sbox.  If sbox is not enabled it returns the | 
 | // original path. | 
 | func (c *RuleBuilderCommand) PathForOutput(path WritablePath) string { | 
 | 	if c.rule.sbox { | 
 | 		// Errors will be handled in RuleBuilder.Build where we have a context to report them | 
 | 		rel, _, _ := maybeRelErr(c.rule.outDir.String(), path.String()) | 
 | 		return filepath.Join(sboxOutDir, rel) | 
 | 	} | 
 | 	return path.String() | 
 | } | 
 |  | 
 | func sboxPathForToolRel(ctx BuilderContext, path Path) string { | 
 | 	// Errors will be handled in RuleBuilder.Build where we have a context to report them | 
 | 	toolDir := pathForInstall(ctx, ctx.Config().BuildOS, ctx.Config().BuildArch, "") | 
 | 	relOutSoong, isRelOutSoong, _ := maybeRelErr(toolDir.String(), path.String()) | 
 | 	if isRelOutSoong { | 
 | 		// The tool is in the Soong output directory, it will be copied to __SBOX_OUT_DIR__/tools/out | 
 | 		return filepath.Join(sboxToolsSubDir, "out", relOutSoong) | 
 | 	} | 
 | 	// The tool is in the source directory, it will be copied to __SBOX_OUT_DIR__/tools/src | 
 | 	return filepath.Join(sboxToolsSubDir, "src", path.String()) | 
 | } | 
 |  | 
 | func (r *RuleBuilder) _sboxPathForInputRel(path Path) (rel string, inSandbox bool) { | 
 | 	// Errors will be handled in RuleBuilder.Build where we have a context to report them | 
 | 	rel, isRelSboxOut, _ := maybeRelErr(r.outDir.String(), path.String()) | 
 | 	if isRelSboxOut { | 
 | 		return filepath.Join(sboxOutSubDir, rel), true | 
 | 	} | 
 | 	if r.sboxInputs { | 
 | 		// When sandboxing inputs all inputs have to be copied into the sandbox.  Input files that | 
 | 		// are outputs of other rules could be an arbitrary absolute path if OUT_DIR is set, so they | 
 | 		// will be copied to relative paths under __SBOX_OUT_DIR__/out. | 
 | 		rel, isRelOut, _ := maybeRelErr(r.ctx.Config().OutDir(), path.String()) | 
 | 		if isRelOut { | 
 | 			return filepath.Join(sboxOutSubDir, rel), true | 
 | 		} | 
 | 	} | 
 | 	return path.String(), false | 
 | } | 
 |  | 
 | func (r *RuleBuilder) sboxPathForInputRel(path Path) string { | 
 | 	rel, _ := r._sboxPathForInputRel(path) | 
 | 	return rel | 
 | } | 
 |  | 
 | func (r *RuleBuilder) sboxPathsForInputsRel(paths Paths) []string { | 
 | 	ret := make([]string, len(paths)) | 
 | 	for i, path := range paths { | 
 | 		ret[i] = r.sboxPathForInputRel(path) | 
 | 	} | 
 | 	return ret | 
 | } | 
 |  | 
 | func sboxPathForPackagedToolRel(spec PackagingSpec) string { | 
 | 	return filepath.Join(sboxToolsSubDir, "out", spec.relPathInPackage) | 
 | } | 
 |  | 
 | // PathForPackagedTool takes a PackageSpec for a tool and returns the corresponding path for the | 
 | // tool after copying it into the sandbox.  This can be used  on the RuleBuilder command line to | 
 | // reference the tool. | 
 | func (c *RuleBuilderCommand) PathForPackagedTool(spec PackagingSpec) string { | 
 | 	if !c.rule.sboxTools { | 
 | 		panic("PathForPackagedTool() requires SandboxTools()") | 
 | 	} | 
 |  | 
 | 	return filepath.Join(sboxSandboxBaseDir, sboxPathForPackagedToolRel(spec)) | 
 | } | 
 |  | 
 | // PathForTool takes a path to a tool, which may be an output file or a source file, and returns | 
 | // the corresponding path for the tool in the sbox sandbox if sbox is enabled, or the original path | 
 | // if it is not.  This can be used  on the RuleBuilder command line to reference the tool. | 
 | func (c *RuleBuilderCommand) PathForTool(path Path) string { | 
 | 	if c.rule.sbox && c.rule.sboxTools { | 
 | 		return filepath.Join(sboxSandboxBaseDir, sboxPathForToolRel(c.rule.ctx, path)) | 
 | 	} | 
 | 	return path.String() | 
 | } | 
 |  | 
 | // PathsForTools takes a list of paths to tools, which may be output files or source files, and | 
 | // returns the corresponding paths for the tools in the sbox sandbox if sbox is enabled, or the | 
 | // original paths if it is not.  This can be used  on the RuleBuilder command line to reference the tool. | 
 | func (c *RuleBuilderCommand) PathsForTools(paths Paths) []string { | 
 | 	if c.rule.sbox && c.rule.sboxTools { | 
 | 		var ret []string | 
 | 		for _, path := range paths { | 
 | 			ret = append(ret, filepath.Join(sboxSandboxBaseDir, sboxPathForToolRel(c.rule.ctx, path))) | 
 | 		} | 
 | 		return ret | 
 | 	} | 
 | 	return paths.Strings() | 
 | } | 
 |  | 
 | // PackagedTool adds the specified tool path to the command line.  It can only be used with tool | 
 | // sandboxing enabled by SandboxTools(), and will copy the tool into the sandbox. | 
 | func (c *RuleBuilderCommand) PackagedTool(spec PackagingSpec) *RuleBuilderCommand { | 
 | 	if !c.rule.sboxTools { | 
 | 		panic("PackagedTool() requires SandboxTools()") | 
 | 	} | 
 |  | 
 | 	c.packagedTools = append(c.packagedTools, spec) | 
 | 	c.Text(sboxPathForPackagedToolRel(spec)) | 
 | 	return c | 
 | } | 
 |  | 
 | // ImplicitPackagedTool copies the specified tool into the sandbox without modifying the command | 
 | // line.  It can only be used with tool sandboxing enabled by SandboxTools(). | 
 | func (c *RuleBuilderCommand) ImplicitPackagedTool(spec PackagingSpec) *RuleBuilderCommand { | 
 | 	if !c.rule.sboxTools { | 
 | 		panic("ImplicitPackagedTool() requires SandboxTools()") | 
 | 	} | 
 |  | 
 | 	c.packagedTools = append(c.packagedTools, spec) | 
 | 	return c | 
 | } | 
 |  | 
 | // ImplicitPackagedTools copies the specified tools into the sandbox without modifying the command | 
 | // line.  It can only be used with tool sandboxing enabled by SandboxTools(). | 
 | func (c *RuleBuilderCommand) ImplicitPackagedTools(specs []PackagingSpec) *RuleBuilderCommand { | 
 | 	if !c.rule.sboxTools { | 
 | 		panic("ImplicitPackagedTools() requires SandboxTools()") | 
 | 	} | 
 |  | 
 | 	c.packagedTools = append(c.packagedTools, specs...) | 
 | 	return c | 
 | } | 
 |  | 
 | // Text adds the specified raw text to the command line.  The text should not contain input or output paths or the | 
 | // rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) Text(text string) *RuleBuilderCommand { | 
 | 	if c.buf.Len() > 0 { | 
 | 		c.buf.WriteByte(' ') | 
 | 	} | 
 | 	c.buf.WriteString(text) | 
 | 	return c | 
 | } | 
 |  | 
 | // Textf adds the specified formatted text to the command line.  The text should not contain input or output paths or | 
 | // the rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) Textf(format string, a ...interface{}) *RuleBuilderCommand { | 
 | 	return c.Text(fmt.Sprintf(format, a...)) | 
 | } | 
 |  | 
 | // Flag adds the specified raw text to the command line.  The text should not contain input or output paths or the | 
 | // rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) Flag(flag string) *RuleBuilderCommand { | 
 | 	return c.Text(flag) | 
 | } | 
 |  | 
 | // OptionalFlag adds the specified raw text to the command line if it is not nil.  The text should not contain input or | 
 | // output paths or the rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) OptionalFlag(flag *string) *RuleBuilderCommand { | 
 | 	if flag != nil { | 
 | 		c.Text(*flag) | 
 | 	} | 
 |  | 
 | 	return c | 
 | } | 
 |  | 
 | // Flags adds the specified raw text to the command line.  The text should not contain input or output paths or the | 
 | // rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) Flags(flags []string) *RuleBuilderCommand { | 
 | 	for _, flag := range flags { | 
 | 		c.Text(flag) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // FlagWithArg adds the specified flag and argument text to the command line, with no separator between them.  The flag | 
 | // and argument should not contain input or output paths or the rule will not have them listed in its dependencies or | 
 | // outputs. | 
 | func (c *RuleBuilderCommand) FlagWithArg(flag, arg string) *RuleBuilderCommand { | 
 | 	return c.Text(flag + arg) | 
 | } | 
 |  | 
 | // FlagForEachArg adds the specified flag joined with each argument to the command line.  The result is identical to | 
 | // calling FlagWithArg for argument. | 
 | func (c *RuleBuilderCommand) FlagForEachArg(flag string, args []string) *RuleBuilderCommand { | 
 | 	for _, arg := range args { | 
 | 		c.FlagWithArg(flag, arg) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // FlagWithList adds the specified flag and list of arguments to the command line, with the arguments joined by sep | 
 | // and no separator between the flag and arguments.  The flag and arguments should not contain input or output paths or | 
 | // the rule will not have them listed in its dependencies or outputs. | 
 | func (c *RuleBuilderCommand) FlagWithList(flag string, list []string, sep string) *RuleBuilderCommand { | 
 | 	return c.Text(flag + strings.Join(list, sep)) | 
 | } | 
 |  | 
 | // Tool adds the specified tool path to the command line.  The path will be also added to the dependencies returned by | 
 | // RuleBuilder.Tools. | 
 | func (c *RuleBuilderCommand) Tool(path Path) *RuleBuilderCommand { | 
 | 	checkPathNotNil(path) | 
 | 	c.tools = append(c.tools, path) | 
 | 	return c.Text(c.PathForTool(path)) | 
 | } | 
 |  | 
 | // Tool adds the specified tool path to the dependencies returned by RuleBuilder.Tools. | 
 | func (c *RuleBuilderCommand) ImplicitTool(path Path) *RuleBuilderCommand { | 
 | 	checkPathNotNil(path) | 
 | 	c.tools = append(c.tools, path) | 
 | 	return c | 
 | } | 
 |  | 
 | // Tool adds the specified tool path to the dependencies returned by RuleBuilder.Tools. | 
 | func (c *RuleBuilderCommand) ImplicitTools(paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.ImplicitTool(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // BuiltTool adds the specified tool path that was built using a host Soong module to the command line.  The path will | 
 | // be also added to the dependencies returned by RuleBuilder.Tools. | 
 | // | 
 | // It is equivalent to: | 
 | // | 
 | //	cmd.Tool(ctx.Config().HostToolPath(ctx, tool)) | 
 | func (c *RuleBuilderCommand) BuiltTool(tool string) *RuleBuilderCommand { | 
 | 	if c.rule.ctx.Config().UseHostMusl() { | 
 | 		// If the host is using musl, assume that the tool was built against musl libc and include | 
 | 		// libc_musl.so in the sandbox. | 
 | 		// TODO(ccross): if we supported adding new dependencies during GenerateAndroidBuildActions | 
 | 		// this could be a dependency + TransitivePackagingSpecs. | 
 | 		c.ImplicitTool(c.rule.ctx.Config().HostJNIToolPath(c.rule.ctx, "libc_musl")) | 
 | 	} | 
 | 	return c.builtToolWithoutDeps(tool) | 
 | } | 
 |  | 
 | // builtToolWithoutDeps is similar to BuiltTool, but doesn't add any dependencies.  It is used | 
 | // internally by RuleBuilder for helper tools that are known to be compiled statically. | 
 | func (c *RuleBuilderCommand) builtToolWithoutDeps(tool string) *RuleBuilderCommand { | 
 | 	return c.Tool(c.rule.ctx.Config().HostToolPath(c.rule.ctx, tool)) | 
 | } | 
 |  | 
 | // PrebuiltBuildTool adds the specified tool path from prebuils/build-tools.  The path will be also added to the | 
 | // dependencies returned by RuleBuilder.Tools. | 
 | // | 
 | // It is equivalent to: | 
 | // | 
 | //	cmd.Tool(ctx.Config().PrebuiltBuildTool(ctx, tool)) | 
 | func (c *RuleBuilderCommand) PrebuiltBuildTool(ctx PathContext, tool string) *RuleBuilderCommand { | 
 | 	return c.Tool(ctx.Config().PrebuiltBuildTool(ctx, tool)) | 
 | } | 
 |  | 
 | // Input adds the specified input path to the command line.  The path will also be added to the dependencies returned by | 
 | // RuleBuilder.Inputs. | 
 | func (c *RuleBuilderCommand) Input(path Path) *RuleBuilderCommand { | 
 | 	return c.Text(c.addInput(path)) | 
 | } | 
 |  | 
 | // Inputs adds the specified input paths to the command line, separated by spaces.  The paths will also be added to the | 
 | // dependencies returned by RuleBuilder.Inputs. | 
 | func (c *RuleBuilderCommand) Inputs(paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.Input(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // Implicit adds the specified input path to the dependencies returned by RuleBuilder.Inputs without modifying the | 
 | // command line. | 
 | func (c *RuleBuilderCommand) Implicit(path Path) *RuleBuilderCommand { | 
 | 	c.addImplicit(path) | 
 | 	return c | 
 | } | 
 |  | 
 | // Implicits adds the specified input paths to the dependencies returned by RuleBuilder.Inputs without modifying the | 
 | // command line. | 
 | func (c *RuleBuilderCommand) Implicits(paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.addImplicit(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // GetImplicits returns the command's implicit inputs. | 
 | func (c *RuleBuilderCommand) GetImplicits() Paths { | 
 | 	return c.implicits | 
 | } | 
 |  | 
 | // OrderOnly adds the specified input path to the dependencies returned by RuleBuilder.OrderOnlys | 
 | // without modifying the command line. | 
 | func (c *RuleBuilderCommand) OrderOnly(path Path) *RuleBuilderCommand { | 
 | 	c.addOrderOnly(path) | 
 | 	return c | 
 | } | 
 |  | 
 | // OrderOnlys adds the specified input paths to the dependencies returned by RuleBuilder.OrderOnlys | 
 | // without modifying the command line. | 
 | func (c *RuleBuilderCommand) OrderOnlys(paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.addOrderOnly(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // Validation adds the specified input path to the validation dependencies by | 
 | // RuleBuilder.Validations without modifying the command line. | 
 | func (c *RuleBuilderCommand) Validation(path Path) *RuleBuilderCommand { | 
 | 	checkPathNotNil(path) | 
 | 	c.validations = append(c.validations, path) | 
 | 	return c | 
 | } | 
 |  | 
 | // Validations adds the specified input paths to the validation dependencies by | 
 | // RuleBuilder.Validations without modifying the command line. | 
 | func (c *RuleBuilderCommand) Validations(paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.Validation(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // Output adds the specified output path to the command line.  The path will also be added to the outputs returned by | 
 | // RuleBuilder.Outputs. | 
 | func (c *RuleBuilderCommand) Output(path WritablePath) *RuleBuilderCommand { | 
 | 	checkPathNotNil(path) | 
 | 	c.outputs = append(c.outputs, path) | 
 | 	return c.Text(c.PathForOutput(path)) | 
 | } | 
 |  | 
 | // Outputs adds the specified output paths to the command line, separated by spaces.  The paths will also be added to | 
 | // the outputs returned by RuleBuilder.Outputs. | 
 | func (c *RuleBuilderCommand) Outputs(paths WritablePaths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.Output(path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // OutputDir adds the output directory to the command line. This is only available when used with RuleBuilder.Sbox, | 
 | // and will be the temporary output directory managed by sbox, not the final one. | 
 | func (c *RuleBuilderCommand) OutputDir(subPathComponents ...string) *RuleBuilderCommand { | 
 | 	if !c.rule.sbox { | 
 | 		panic("OutputDir only valid with Sbox") | 
 | 	} | 
 | 	path := sboxOutDir | 
 | 	if len(subPathComponents) > 0 { | 
 | 		path = filepath.Join(append([]string{sboxOutDir}, subPathComponents...)...) | 
 | 	} | 
 | 	return c.Text(path) | 
 | } | 
 |  | 
 | // DepFile adds the specified depfile path to the paths returned by RuleBuilder.DepFiles and adds it to the command | 
 | // line, and causes RuleBuilder.Build file to set the depfile flag for ninja.  If multiple depfiles are added to | 
 | // commands in a single RuleBuilder then RuleBuilder.Build will add an extra command to merge the depfiles together. | 
 | func (c *RuleBuilderCommand) DepFile(path WritablePath) *RuleBuilderCommand { | 
 | 	checkPathNotNil(path) | 
 | 	c.depFiles = append(c.depFiles, path) | 
 | 	return c.Text(c.PathForOutput(path)) | 
 | } | 
 |  | 
 | // ImplicitOutput adds the specified output path to the dependencies returned by RuleBuilder.Outputs without modifying | 
 | // the command line. | 
 | func (c *RuleBuilderCommand) ImplicitOutput(path WritablePath) *RuleBuilderCommand { | 
 | 	c.outputs = append(c.outputs, path) | 
 | 	return c | 
 | } | 
 |  | 
 | // ImplicitOutputs adds the specified output paths to the dependencies returned by RuleBuilder.Outputs without modifying | 
 | // the command line. | 
 | func (c *RuleBuilderCommand) ImplicitOutputs(paths WritablePaths) *RuleBuilderCommand { | 
 | 	c.outputs = append(c.outputs, paths...) | 
 | 	return c | 
 | } | 
 |  | 
 | // ImplicitDepFile adds the specified depfile path to the paths returned by RuleBuilder.DepFiles without modifying | 
 | // the command line, and causes RuleBuilder.Build file to set the depfile flag for ninja.  If multiple depfiles | 
 | // are added to commands in a single RuleBuilder then RuleBuilder.Build will add an extra command to merge the | 
 | // depfiles together. | 
 | func (c *RuleBuilderCommand) ImplicitDepFile(path WritablePath) *RuleBuilderCommand { | 
 | 	c.depFiles = append(c.depFiles, path) | 
 | 	return c | 
 | } | 
 |  | 
 | // FlagWithInput adds the specified flag and input path to the command line, with no separator between them.  The path | 
 | // will also be added to the dependencies returned by RuleBuilder.Inputs. | 
 | func (c *RuleBuilderCommand) FlagWithInput(flag string, path Path) *RuleBuilderCommand { | 
 | 	return c.Text(flag + c.addInput(path)) | 
 | } | 
 |  | 
 | // FlagWithInputList adds the specified flag and input paths to the command line, with the inputs joined by sep | 
 | // and no separator between the flag and inputs.  The input paths will also be added to the dependencies returned by | 
 | // RuleBuilder.Inputs. | 
 | func (c *RuleBuilderCommand) FlagWithInputList(flag string, paths Paths, sep string) *RuleBuilderCommand { | 
 | 	strs := make([]string, len(paths)) | 
 | 	for i, path := range paths { | 
 | 		strs[i] = c.addInput(path) | 
 | 	} | 
 | 	return c.FlagWithList(flag, strs, sep) | 
 | } | 
 |  | 
 | // FlagForEachInput adds the specified flag joined with each input path to the command line.  The input paths will also | 
 | // be added to the dependencies returned by RuleBuilder.Inputs.  The result is identical to calling FlagWithInput for | 
 | // each input path. | 
 | func (c *RuleBuilderCommand) FlagForEachInput(flag string, paths Paths) *RuleBuilderCommand { | 
 | 	for _, path := range paths { | 
 | 		c.FlagWithInput(flag, path) | 
 | 	} | 
 | 	return c | 
 | } | 
 |  | 
 | // FlagWithOutput adds the specified flag and output path to the command line, with no separator between them.  The path | 
 | // will also be added to the outputs returned by RuleBuilder.Outputs. | 
 | func (c *RuleBuilderCommand) FlagWithOutput(flag string, path WritablePath) *RuleBuilderCommand { | 
 | 	c.outputs = append(c.outputs, path) | 
 | 	return c.Text(flag + c.PathForOutput(path)) | 
 | } | 
 |  | 
 | // FlagWithDepFile adds the specified flag and depfile path to the command line, with no separator between them.  The path | 
 | // will also be added to the outputs returned by RuleBuilder.Outputs. | 
 | func (c *RuleBuilderCommand) FlagWithDepFile(flag string, path WritablePath) *RuleBuilderCommand { | 
 | 	c.depFiles = append(c.depFiles, path) | 
 | 	return c.Text(flag + c.PathForOutput(path)) | 
 | } | 
 |  | 
 | // FlagWithRspFileInputList adds the specified flag and path to an rspfile to the command line, with | 
 | // no separator between them.  The paths will be written to the rspfile.  If sbox is enabled, the | 
 | // rspfile must be outside the sbox directory.  The first use of FlagWithRspFileInputList in any | 
 | // RuleBuilderCommand of a RuleBuilder will use Ninja's rsp file support for the rule, additional | 
 | // uses will result in an auxiliary rules to write the rspFile contents. | 
 | func (c *RuleBuilderCommand) FlagWithRspFileInputList(flag string, rspFile WritablePath, paths Paths) *RuleBuilderCommand { | 
 | 	// Use an empty slice if paths is nil, the non-nil slice is used as an indicator that the rsp file must be | 
 | 	// generated. | 
 | 	if paths == nil { | 
 | 		paths = Paths{} | 
 | 	} | 
 |  | 
 | 	c.rspFiles = append(c.rspFiles, rspFileAndPaths{rspFile, paths}) | 
 |  | 
 | 	if c.rule.sbox { | 
 | 		if _, isRel, _ := maybeRelErr(c.rule.outDir.String(), rspFile.String()); isRel { | 
 | 			panic(fmt.Errorf("FlagWithRspFileInputList rspfile %q must not be inside out dir %q", | 
 | 				rspFile.String(), c.rule.outDir.String())) | 
 | 		} | 
 | 	} | 
 |  | 
 | 	c.FlagWithArg(flag, c.PathForInput(rspFile)) | 
 | 	return c | 
 | } | 
 |  | 
 | // String returns the command line. | 
 | func (c *RuleBuilderCommand) String() string { | 
 | 	return c.buf.String() | 
 | } | 
 |  | 
 | // RuleBuilderSboxProtoForTests takes the BuildParams for the manifest passed to RuleBuilder.Sbox() | 
 | // and returns sbox testproto generated by the RuleBuilder. | 
 | func RuleBuilderSboxProtoForTests(t *testing.T, ctx *TestContext, params TestingBuildParams) *sbox_proto.Manifest { | 
 | 	t.Helper() | 
 | 	content := ContentFromFileRuleForTests(t, ctx, params) | 
 | 	manifest := sbox_proto.Manifest{} | 
 | 	err := prototext.Unmarshal([]byte(content), &manifest) | 
 | 	if err != nil { | 
 | 		t.Fatalf("failed to unmarshal manifest: %s", err.Error()) | 
 | 	} | 
 | 	return &manifest | 
 | } | 
 |  | 
 | func ninjaNameEscape(s string) string { | 
 | 	b := []byte(s) | 
 | 	escaped := false | 
 | 	for i, c := range b { | 
 | 		valid := (c >= 'a' && c <= 'z') || | 
 | 			(c >= 'A' && c <= 'Z') || | 
 | 			(c >= '0' && c <= '9') || | 
 | 			(c == '_') || | 
 | 			(c == '-') || | 
 | 			(c == '.') | 
 | 		if !valid { | 
 | 			b[i] = '_' | 
 | 			escaped = true | 
 | 		} | 
 | 	} | 
 | 	if escaped { | 
 | 		s = string(b) | 
 | 	} | 
 | 	return s | 
 | } | 
 |  | 
 | // hashSrcFiles returns a hash of the list of source files.  It is used to ensure the command line | 
 | // or the sbox textproto manifest change even if the input files are not listed on the command line. | 
 | func hashSrcFiles(srcFiles Paths) string { | 
 | 	h := sha256.New() | 
 | 	srcFileList := strings.Join(srcFiles.Strings(), "\n") | 
 | 	h.Write([]byte(srcFileList)) | 
 | 	return fmt.Sprintf("%x", h.Sum(nil)) | 
 | } | 
 |  | 
 | // BuilderContextForTesting returns a BuilderContext for the given config that can be used for tests | 
 | // that need to call methods that take a BuilderContext. | 
 | func BuilderContextForTesting(config Config) BuilderContext { | 
 | 	pathCtx := PathContextForTesting(config) | 
 | 	return builderContextForTests{ | 
 | 		PathContext: pathCtx, | 
 | 	} | 
 | } | 
 |  | 
 | type builderContextForTests struct { | 
 | 	PathContext | 
 | } | 
 |  | 
 | func (builderContextForTests) Rule(PackageContext, string, blueprint.RuleParams, ...string) blueprint.Rule { | 
 | 	return nil | 
 | } | 
 | func (builderContextForTests) Build(PackageContext, BuildParams) {} | 
 |  | 
 | func writeRspFileRule(ctx BuilderContext, rspFile WritablePath, paths Paths) { | 
 | 	buf := &strings.Builder{} | 
 | 	err := response.WriteRspFile(buf, paths.Strings()) | 
 | 	if err != nil { | 
 | 		// There should never be I/O errors writing to a bytes.Buffer. | 
 | 		panic(err) | 
 | 	} | 
 | 	WriteFileRule(ctx, rspFile, buf.String()) | 
 | } |