|  | // Copyright 2020 Google Inc. All rights reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | package android | 
|  |  | 
|  | import ( | 
|  | "bytes" | 
|  | "crypto/sha1" | 
|  | "encoding/hex" | 
|  | "fmt" | 
|  | "os" | 
|  | "path" | 
|  | "path/filepath" | 
|  | "regexp" | 
|  | "runtime" | 
|  | "sort" | 
|  | "strings" | 
|  | "sync" | 
|  |  | 
|  | "android/soong/android/allowlists" | 
|  | "android/soong/bazel/cquery" | 
|  | "android/soong/shared" | 
|  | "android/soong/starlark_import" | 
|  |  | 
|  | "android/soong/bazel" | 
|  |  | 
|  | "github.com/google/blueprint" | 
|  | "github.com/google/blueprint/metrics" | 
|  | ) | 
|  |  | 
|  | var ( | 
|  | _                 = pctx.HostBinToolVariable("bazelBuildRunfilesTool", "build-runfiles") | 
|  | buildRunfilesRule = pctx.AndroidStaticRule("bazelBuildRunfiles", blueprint.RuleParams{ | 
|  | Command:     "${bazelBuildRunfilesTool} ${in} ${outDir}", | 
|  | Depfile:     "", | 
|  | Description: "", | 
|  | CommandDeps: []string{"${bazelBuildRunfilesTool}"}, | 
|  | }, "outDir") | 
|  | ) | 
|  |  | 
|  | func registerMixedBuildsMutator(ctx RegisterMutatorsContext) { | 
|  | ctx.BottomUp("mixed_builds_prep", mixedBuildsPrepareMutator).Parallel() | 
|  | } | 
|  |  | 
|  | func RegisterMixedBuildsMutator(ctx RegistrationContext) { | 
|  | ctx.FinalDepsMutators(registerMixedBuildsMutator) | 
|  | } | 
|  |  | 
|  | func mixedBuildsPrepareMutator(ctx BottomUpMutatorContext) { | 
|  | if m := ctx.Module(); m.Enabled() { | 
|  | if mixedBuildMod, ok := m.(MixedBuildBuildable); ok { | 
|  | mixedBuildEnabled := MixedBuildsEnabled(ctx) | 
|  | queueMixedBuild := mixedBuildMod.IsMixedBuildSupported(ctx) && mixedBuildEnabled == MixedBuildEnabled | 
|  | if queueMixedBuild { | 
|  | mixedBuildMod.QueueBazelCall(ctx) | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | type cqueryRequest interface { | 
|  | // Name returns a string name for this request type. Such request type names must be unique, | 
|  | // and must only consist of alphanumeric characters. | 
|  | Name() string | 
|  |  | 
|  | // StarlarkFunctionBody returns a starlark function body to process this request type. | 
|  | // The returned string is the body of a Starlark function which obtains | 
|  | // all request-relevant information about a target and returns a string containing | 
|  | // this information. | 
|  | // The function should have the following properties: | 
|  | //   - The arguments are `target` (a configured target) and `id_string` (the label + configuration). | 
|  | //   - The return value must be a string. | 
|  | //   - The function body should not be indented outside of its own scope. | 
|  | StarlarkFunctionBody() string | 
|  | } | 
|  |  | 
|  | // Portion of cquery map key to describe target configuration. | 
|  | type configKey struct { | 
|  | arch    string | 
|  | osType  OsType | 
|  | apexKey ApexConfigKey | 
|  | } | 
|  |  | 
|  | type ApexConfigKey struct { | 
|  | WithinApex     bool | 
|  | ApexSdkVersion string | 
|  | ApiDomain      string | 
|  | } | 
|  |  | 
|  | func (c ApexConfigKey) String() string { | 
|  | return fmt.Sprintf("%s_%s_%s", withinApexToString(c.WithinApex), c.ApexSdkVersion, c.ApiDomain) | 
|  | } | 
|  |  | 
|  | func withinApexToString(withinApex bool) string { | 
|  | if withinApex { | 
|  | return "within_apex" | 
|  | } | 
|  | return "" | 
|  | } | 
|  |  | 
|  | func (c configKey) String() string { | 
|  | return fmt.Sprintf("%s::%s::%s", c.arch, c.osType, c.apexKey) | 
|  | } | 
|  |  | 
|  | // Map key to describe bazel cquery requests. | 
|  | type cqueryKey struct { | 
|  | label       string | 
|  | requestType cqueryRequest | 
|  | configKey   configKey | 
|  | } | 
|  |  | 
|  | func makeCqueryKey(label string, cqueryRequest cqueryRequest, cfgKey configKey) cqueryKey { | 
|  | if strings.HasPrefix(label, "//") { | 
|  | // Normalize Bazel labels to specify main repository explicitly. | 
|  | label = "@" + label | 
|  | } | 
|  | return cqueryKey{label, cqueryRequest, cfgKey} | 
|  | } | 
|  |  | 
|  | func (c cqueryKey) String() string { | 
|  | return fmt.Sprintf("cquery(%s,%s,%s)", c.label, c.requestType.Name(), c.configKey) | 
|  | } | 
|  |  | 
|  | type invokeBazelContext interface { | 
|  | GetEventHandler() *metrics.EventHandler | 
|  | } | 
|  |  | 
|  | // BazelContext is a context object useful for interacting with Bazel during | 
|  | // the course of a build. Use of Bazel to evaluate part of the build graph | 
|  | // is referred to as a "mixed build". (Some modules are managed by Soong, | 
|  | // some are managed by Bazel). To facilitate interop between these build | 
|  | // subgraphs, Soong may make requests to Bazel and evaluate their responses | 
|  | // so that Soong modules may accurately depend on Bazel targets. | 
|  | type BazelContext interface { | 
|  | // Add a cquery request to the bazel request queue. All queued requests | 
|  | // will be sent to Bazel on a subsequent invocation of InvokeBazel. | 
|  | QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) | 
|  |  | 
|  | // ** Cquery Results Retrieval Functions | 
|  | // The below functions pertain to retrieving cquery results from a prior | 
|  | // InvokeBazel function call and parsing the results. | 
|  |  | 
|  | // Returns result files built by building the given bazel target label. | 
|  | GetOutputFiles(label string, cfgKey configKey) ([]string, error) | 
|  |  | 
|  | // Returns the results of GetOutputFiles and GetCcObjectFiles in a single query (in that order). | 
|  | GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) | 
|  |  | 
|  | // Returns the results of the GetApexInfo query (including output files) | 
|  | GetApexInfo(label string, cfgkey configKey) (cquery.ApexInfo, error) | 
|  |  | 
|  | // Returns the results of the GetCcUnstrippedInfo query | 
|  | GetCcUnstrippedInfo(label string, cfgkey configKey) (cquery.CcUnstrippedInfo, error) | 
|  |  | 
|  | // Returns the results of the GetPrebuiltFileInfo query | 
|  | GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) | 
|  |  | 
|  | // ** end Cquery Results Retrieval Functions | 
|  |  | 
|  | // Issues commands to Bazel to receive results for all cquery requests | 
|  | // queued in the BazelContext. The ctx argument is optional and is only | 
|  | // used for performance data collection | 
|  | InvokeBazel(config Config, ctx invokeBazelContext) error | 
|  |  | 
|  | // Returns true if Bazel handling is enabled for the module with the given name. | 
|  | // Note that this only implies "bazel mixed build" allowlisting. The caller | 
|  | // should independently verify the module is eligible for Bazel handling | 
|  | // (for example, that it is MixedBuildBuildable). | 
|  | IsModuleNameAllowed(moduleName string, withinApex bool) bool | 
|  |  | 
|  | // Returns the bazel output base (the root directory for all bazel intermediate outputs). | 
|  | OutputBase() string | 
|  |  | 
|  | // Returns build statements which should get registered to reflect Bazel's outputs. | 
|  | BuildStatementsToRegister() []*bazel.BuildStatement | 
|  |  | 
|  | // Returns the depsets defined in Bazel's aquery response. | 
|  | AqueryDepsets() []bazel.AqueryDepset | 
|  |  | 
|  | QueueBazelSandwichCqueryRequests(config Config) error | 
|  | } | 
|  |  | 
|  | type bazelRunner interface { | 
|  | issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (output string, errorMessage string, error error) | 
|  | } | 
|  |  | 
|  | type bazelPaths struct { | 
|  | homeDir       string | 
|  | bazelPath     string | 
|  | outputBase    string | 
|  | workspaceDir  string | 
|  | soongOutDir   string | 
|  | metricsDir    string | 
|  | bazelDepsFile string | 
|  | } | 
|  |  | 
|  | // A context object which tracks queued requests that need to be made to Bazel, | 
|  | // and their results after the requests have been made. | 
|  | type mixedBuildBazelContext struct { | 
|  | bazelRunner | 
|  | paths *bazelPaths | 
|  | // cquery requests that have not yet been issued to Bazel. This list is maintained | 
|  | // in a sorted state, and is guaranteed to have no duplicates. | 
|  | requests     []cqueryKey | 
|  | requestMutex sync.Mutex // requests can be written in parallel | 
|  |  | 
|  | results map[cqueryKey]string // Results of cquery requests after Bazel invocations | 
|  |  | 
|  | // Build statements which should get registered to reflect Bazel's outputs. | 
|  | buildStatements []*bazel.BuildStatement | 
|  |  | 
|  | // Depsets which should be used for Bazel's build statements. | 
|  | depsets []bazel.AqueryDepset | 
|  |  | 
|  | // Per-module allowlist/denylist functionality to control whether analysis of | 
|  | // modules are handled by Bazel. For modules which do not have a Bazel definition | 
|  | // (or do not sufficiently support bazel handling via MixedBuildBuildable), | 
|  | // this allowlist will have no effect, even if the module is explicitly allowlisted here. | 
|  | // Per-module denylist to opt modules out of bazel handling. | 
|  | bazelDisabledModules map[string]bool | 
|  | // Per-module allowlist to opt modules in to bazel handling. | 
|  | bazelEnabledModules map[string]bool | 
|  | // DCLA modules are enabled when used in apex. | 
|  | bazelDclaEnabledModules map[string]bool | 
|  |  | 
|  | targetProduct      string | 
|  | targetBuildVariant string | 
|  | } | 
|  |  | 
|  | var _ BazelContext = &mixedBuildBazelContext{} | 
|  |  | 
|  | // A bazel context to use when Bazel is disabled. | 
|  | type noopBazelContext struct{} | 
|  |  | 
|  | var _ BazelContext = noopBazelContext{} | 
|  |  | 
|  | func (n noopBazelContext) QueueBazelRequest(_ string, _ cqueryRequest, _ configKey) { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) GetOutputFiles(_ string, _ configKey) ([]string, error) { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) GetCcInfo(_ string, _ configKey) (cquery.CcInfo, error) { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) GetApexInfo(_ string, _ configKey) (cquery.ApexInfo, error) { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) GetCcUnstrippedInfo(_ string, _ configKey) (cquery.CcUnstrippedInfo, error) { | 
|  | //TODO implement me | 
|  | panic("implement me") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) GetPrebuiltFileInfo(_ string, _ configKey) (cquery.PrebuiltFileInfo, error) { | 
|  | panic("implement me") | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (m noopBazelContext) OutputBase() string { | 
|  | return "" | 
|  | } | 
|  |  | 
|  | func (n noopBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { | 
|  | return false | 
|  | } | 
|  |  | 
|  | func (m noopBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { | 
|  | return []*bazel.BuildStatement{} | 
|  | } | 
|  |  | 
|  | func (m noopBazelContext) AqueryDepsets() []bazel.AqueryDepset { | 
|  | return []bazel.AqueryDepset{} | 
|  | } | 
|  |  | 
|  | // A bazel context to use for tests. | 
|  | type MockBazelContext struct { | 
|  | OutputBaseDir string | 
|  |  | 
|  | LabelToOutputFiles      map[string][]string | 
|  | LabelToCcInfo           map[string]cquery.CcInfo | 
|  | LabelToPythonBinary     map[string]string | 
|  | LabelToApexInfo         map[string]cquery.ApexInfo | 
|  | LabelToCcBinary         map[string]cquery.CcUnstrippedInfo | 
|  | LabelToPrebuiltFileInfo map[string]cquery.PrebuiltFileInfo | 
|  |  | 
|  | BazelRequests map[string]bool | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { | 
|  | key := BuildMockBazelContextRequestKey(label, requestType, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) | 
|  | if m.BazelRequests == nil { | 
|  | m.BazelRequests = make(map[string]bool) | 
|  | } | 
|  | m.BazelRequests[key] = true | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) GetOutputFiles(label string, _ configKey) ([]string, error) { | 
|  | result, ok := m.LabelToOutputFiles[label] | 
|  | if !ok { | 
|  | return []string{}, fmt.Errorf("no target with label %q in LabelToOutputFiles", label) | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { | 
|  | result, ok := m.LabelToCcInfo[label] | 
|  | if !ok { | 
|  | key := BuildMockBazelContextResultKey(label, cfgKey.arch, cfgKey.osType, cfgKey.apexKey) | 
|  | result, ok = m.LabelToCcInfo[key] | 
|  | if !ok { | 
|  | return cquery.CcInfo{}, fmt.Errorf("no target with label %q in LabelToCcInfo", label) | 
|  | } | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) GetApexInfo(label string, _ configKey) (cquery.ApexInfo, error) { | 
|  | result, ok := m.LabelToApexInfo[label] | 
|  | if !ok { | 
|  | return cquery.ApexInfo{}, fmt.Errorf("no target with label %q in LabelToApexInfo", label) | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) GetCcUnstrippedInfo(label string, _ configKey) (cquery.CcUnstrippedInfo, error) { | 
|  | result, ok := m.LabelToCcBinary[label] | 
|  | if !ok { | 
|  | return cquery.CcUnstrippedInfo{}, fmt.Errorf("no target with label %q in LabelToCcBinary", label) | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) GetPrebuiltFileInfo(label string, _ configKey) (cquery.PrebuiltFileInfo, error) { | 
|  | result, ok := m.LabelToPrebuiltFileInfo[label] | 
|  | if !ok { | 
|  | return cquery.PrebuiltFileInfo{}, fmt.Errorf("no target with label %q in LabelToPrebuiltFileInfo", label) | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) InvokeBazel(_ Config, _ invokeBazelContext) error { | 
|  | panic("unimplemented") | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) IsModuleNameAllowed(_ string, _ bool) bool { | 
|  | return true | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) OutputBase() string { return m.OutputBaseDir } | 
|  |  | 
|  | func (m MockBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { | 
|  | return []*bazel.BuildStatement{} | 
|  | } | 
|  |  | 
|  | func (m MockBazelContext) AqueryDepsets() []bazel.AqueryDepset { | 
|  | return []bazel.AqueryDepset{} | 
|  | } | 
|  |  | 
|  | var _ BazelContext = MockBazelContext{} | 
|  |  | 
|  | func BuildMockBazelContextRequestKey(label string, request cqueryRequest, arch string, osType OsType, apexKey ApexConfigKey) string { | 
|  | cfgKey := configKey{ | 
|  | arch:    arch, | 
|  | osType:  osType, | 
|  | apexKey: apexKey, | 
|  | } | 
|  |  | 
|  | return strings.Join([]string{label, request.Name(), cfgKey.String()}, "_") | 
|  | } | 
|  |  | 
|  | func BuildMockBazelContextResultKey(label string, arch string, osType OsType, apexKey ApexConfigKey) string { | 
|  | cfgKey := configKey{ | 
|  | arch:    arch, | 
|  | osType:  osType, | 
|  | apexKey: apexKey, | 
|  | } | 
|  |  | 
|  | return strings.Join([]string{label, cfgKey.String()}, "_") | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) QueueBazelRequest(label string, requestType cqueryRequest, cfgKey configKey) { | 
|  | key := makeCqueryKey(label, requestType, cfgKey) | 
|  | bazelCtx.requestMutex.Lock() | 
|  | defer bazelCtx.requestMutex.Unlock() | 
|  |  | 
|  | // Insert key into requests, maintaining the sort, and only if it's not duplicate. | 
|  | keyString := key.String() | 
|  | foundEqual := false | 
|  | notLessThanKeyString := func(i int) bool { | 
|  | s := bazelCtx.requests[i].String() | 
|  | v := strings.Compare(s, keyString) | 
|  | if v == 0 { | 
|  | foundEqual = true | 
|  | } | 
|  | return v >= 0 | 
|  | } | 
|  | targetIndex := sort.Search(len(bazelCtx.requests), notLessThanKeyString) | 
|  | if foundEqual { | 
|  | return | 
|  | } | 
|  |  | 
|  | if targetIndex == len(bazelCtx.requests) { | 
|  | bazelCtx.requests = append(bazelCtx.requests, key) | 
|  | } else { | 
|  | bazelCtx.requests = append(bazelCtx.requests[:targetIndex+1], bazelCtx.requests[targetIndex:]...) | 
|  | bazelCtx.requests[targetIndex] = key | 
|  | } | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) GetOutputFiles(label string, cfgKey configKey) ([]string, error) { | 
|  | key := makeCqueryKey(label, cquery.GetOutputFiles, cfgKey) | 
|  | if rawString, ok := bazelCtx.results[key]; ok { | 
|  | bazelOutput := strings.TrimSpace(rawString) | 
|  |  | 
|  | return cquery.GetOutputFiles.ParseResult(bazelOutput), nil | 
|  | } | 
|  | return nil, fmt.Errorf("no bazel response found for %v", key) | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) GetCcInfo(label string, cfgKey configKey) (cquery.CcInfo, error) { | 
|  | key := makeCqueryKey(label, cquery.GetCcInfo, cfgKey) | 
|  | if rawString, ok := bazelCtx.results[key]; ok { | 
|  | bazelOutput := strings.TrimSpace(rawString) | 
|  | return cquery.GetCcInfo.ParseResult(bazelOutput) | 
|  | } | 
|  | return cquery.CcInfo{}, fmt.Errorf("no bazel response found for %v", key) | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) GetApexInfo(label string, cfgKey configKey) (cquery.ApexInfo, error) { | 
|  | key := makeCqueryKey(label, cquery.GetApexInfo, cfgKey) | 
|  | if rawString, ok := bazelCtx.results[key]; ok { | 
|  | return cquery.GetApexInfo.ParseResult(strings.TrimSpace(rawString)) | 
|  | } | 
|  | return cquery.ApexInfo{}, fmt.Errorf("no bazel response found for %v", key) | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) GetCcUnstrippedInfo(label string, cfgKey configKey) (cquery.CcUnstrippedInfo, error) { | 
|  | key := makeCqueryKey(label, cquery.GetCcUnstrippedInfo, cfgKey) | 
|  | if rawString, ok := bazelCtx.results[key]; ok { | 
|  | return cquery.GetCcUnstrippedInfo.ParseResult(strings.TrimSpace(rawString)) | 
|  | } | 
|  | return cquery.CcUnstrippedInfo{}, fmt.Errorf("no bazel response for %s", key) | 
|  | } | 
|  |  | 
|  | func (bazelCtx *mixedBuildBazelContext) GetPrebuiltFileInfo(label string, cfgKey configKey) (cquery.PrebuiltFileInfo, error) { | 
|  | key := makeCqueryKey(label, cquery.GetPrebuiltFileInfo, cfgKey) | 
|  | if rawString, ok := bazelCtx.results[key]; ok { | 
|  | return cquery.GetPrebuiltFileInfo.ParseResult(strings.TrimSpace(rawString)) | 
|  | } | 
|  | return cquery.PrebuiltFileInfo{}, fmt.Errorf("no bazel response for %s", key) | 
|  | } | 
|  |  | 
|  | func AddToStringSet(set map[string]bool, items []string) { | 
|  | for _, item := range items { | 
|  | set[item] = true | 
|  | } | 
|  | } | 
|  |  | 
|  | func GetBazelEnabledAndDisabledModules(buildMode SoongBuildMode, forceEnabled map[string]struct{}) (map[string]bool, map[string]bool) { | 
|  | disabledModules := map[string]bool{} | 
|  | enabledModules := map[string]bool{} | 
|  |  | 
|  | switch buildMode { | 
|  | case BazelProdMode: | 
|  | AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) | 
|  | for enabledAdHocModule := range forceEnabled { | 
|  | enabledModules[enabledAdHocModule] = true | 
|  | } | 
|  | case BazelStagingMode: | 
|  | // Staging mode includes all prod modules plus all staging modules. | 
|  | AddToStringSet(enabledModules, allowlists.ProdMixedBuildsEnabledList) | 
|  | AddToStringSet(enabledModules, allowlists.StagingMixedBuildsEnabledList) | 
|  | for enabledAdHocModule := range forceEnabled { | 
|  | enabledModules[enabledAdHocModule] = true | 
|  | } | 
|  | default: | 
|  | panic("Expected BazelProdMode or BazelStagingMode") | 
|  | } | 
|  | return enabledModules, disabledModules | 
|  | } | 
|  |  | 
|  | func GetBazelEnabledModules(buildMode SoongBuildMode) []string { | 
|  | enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(buildMode, nil) | 
|  | enabledList := make([]string, 0, len(enabledModules)) | 
|  | for module := range enabledModules { | 
|  | if !disabledModules[module] { | 
|  | enabledList = append(enabledList, module) | 
|  | } | 
|  | } | 
|  | sort.Strings(enabledList) | 
|  | return enabledList | 
|  | } | 
|  |  | 
|  | func NewBazelContext(c *config) (BazelContext, error) { | 
|  | if c.BuildMode != BazelProdMode && c.BuildMode != BazelStagingMode { | 
|  | return noopBazelContext{}, nil | 
|  | } | 
|  |  | 
|  | enabledModules, disabledModules := GetBazelEnabledAndDisabledModules(c.BuildMode, c.BazelModulesForceEnabledByFlag()) | 
|  |  | 
|  | paths := bazelPaths{ | 
|  | soongOutDir: c.soongOutDir, | 
|  | } | 
|  | var missing []string | 
|  | vars := []struct { | 
|  | name string | 
|  | ptr  *string | 
|  |  | 
|  | // True if the environment variable needs to be tracked so that changes to the variable | 
|  | // cause the ninja file to be regenerated, false otherwise. False should only be set for | 
|  | // environment variables that have no effect on the generated ninja file. | 
|  | track bool | 
|  | }{ | 
|  | {"BAZEL_HOME", &paths.homeDir, true}, | 
|  | {"BAZEL_PATH", &paths.bazelPath, true}, | 
|  | {"BAZEL_OUTPUT_BASE", &paths.outputBase, true}, | 
|  | {"BAZEL_WORKSPACE", &paths.workspaceDir, true}, | 
|  | {"BAZEL_METRICS_DIR", &paths.metricsDir, false}, | 
|  | {"BAZEL_DEPS_FILE", &paths.bazelDepsFile, true}, | 
|  | } | 
|  | for _, v := range vars { | 
|  | if v.track { | 
|  | if s := c.Getenv(v.name); len(s) > 1 { | 
|  | *v.ptr = s | 
|  | continue | 
|  | } | 
|  | } else if s, ok := c.env[v.name]; ok { | 
|  | *v.ptr = s | 
|  | } else { | 
|  | missing = append(missing, v.name) | 
|  | } | 
|  | } | 
|  | if len(missing) > 0 { | 
|  | return nil, fmt.Errorf("missing required env vars to use bazel: %s", missing) | 
|  | } | 
|  |  | 
|  | targetBuildVariant := "user" | 
|  | if c.Eng() { | 
|  | targetBuildVariant = "eng" | 
|  | } else if c.Debuggable() { | 
|  | targetBuildVariant = "userdebug" | 
|  | } | 
|  | targetProduct := "unknown" | 
|  | if c.HasDeviceProduct() { | 
|  | targetProduct = c.DeviceProduct() | 
|  | } | 
|  | dclaMixedBuildsEnabledList := []string{} | 
|  | if c.BuildMode == BazelProdMode { | 
|  | dclaMixedBuildsEnabledList = allowlists.ProdDclaMixedBuildsEnabledList | 
|  | } else if c.BuildMode == BazelStagingMode { | 
|  | dclaMixedBuildsEnabledList = append(allowlists.ProdDclaMixedBuildsEnabledList, | 
|  | allowlists.StagingDclaMixedBuildsEnabledList...) | 
|  | } | 
|  | dclaEnabledModules := map[string]bool{} | 
|  | AddToStringSet(dclaEnabledModules, dclaMixedBuildsEnabledList) | 
|  | return &mixedBuildBazelContext{ | 
|  | bazelRunner:             &builtinBazelRunner{c.UseBazelProxy, absolutePath(c.outDir)}, | 
|  | paths:                   &paths, | 
|  | bazelEnabledModules:     enabledModules, | 
|  | bazelDisabledModules:    disabledModules, | 
|  | bazelDclaEnabledModules: dclaEnabledModules, | 
|  | targetProduct:           targetProduct, | 
|  | targetBuildVariant:      targetBuildVariant, | 
|  | }, nil | 
|  | } | 
|  |  | 
|  | func (p *bazelPaths) BazelMetricsDir() string { | 
|  | return p.metricsDir | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) IsModuleNameAllowed(moduleName string, withinApex bool) bool { | 
|  | if context.bazelDisabledModules[moduleName] { | 
|  | return false | 
|  | } | 
|  | if context.bazelEnabledModules[moduleName] { | 
|  | return true | 
|  | } | 
|  | if withinApex && context.bazelDclaEnabledModules[moduleName] { | 
|  | return true | 
|  | } | 
|  |  | 
|  | return false | 
|  | } | 
|  |  | 
|  | func pwdPrefix() string { | 
|  | // Darwin doesn't have /proc | 
|  | if runtime.GOOS != "darwin" { | 
|  | return "PWD=/proc/self/cwd" | 
|  | } | 
|  | return "" | 
|  | } | 
|  |  | 
|  | type bazelCommand struct { | 
|  | command string | 
|  | // query or label | 
|  | expression string | 
|  | } | 
|  |  | 
|  | type builtinBazelRunner struct { | 
|  | useBazelProxy bool | 
|  | outDir        string | 
|  | } | 
|  |  | 
|  | // Issues the given bazel command with given build label and additional flags. | 
|  | // Returns (stdout, stderr, error). The first and second return values are strings | 
|  | // containing the stdout and stderr of the run command, and an error is returned if | 
|  | // the invocation returned an error code. | 
|  | func (r *builtinBazelRunner) issueBazelCommand(cmdRequest bazel.CmdRequest, paths *bazelPaths, eventHandler *metrics.EventHandler) (string, string, error) { | 
|  | if r.useBazelProxy { | 
|  | eventHandler.Begin("client_proxy") | 
|  | defer eventHandler.End("client_proxy") | 
|  | proxyClient := bazel.NewProxyClient(r.outDir) | 
|  | resp, err := proxyClient.IssueCommand(cmdRequest) | 
|  |  | 
|  | if err != nil { | 
|  | return "", "", err | 
|  | } | 
|  | if len(resp.ErrorString) > 0 { | 
|  | return "", "", fmt.Errorf(resp.ErrorString) | 
|  | } | 
|  | return resp.Stdout, resp.Stderr, nil | 
|  | } else { | 
|  | eventHandler.Begin("bazel command") | 
|  | defer eventHandler.End("bazel command") | 
|  |  | 
|  | stdout, stderr, err := bazel.ExecBazel(paths.bazelPath, absolutePath(paths.syntheticWorkspaceDir()), cmdRequest) | 
|  | return string(stdout), string(stderr), err | 
|  | } | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) createBazelCommand(config Config, runName bazel.RunName, command bazelCommand, | 
|  | extraFlags ...string) bazel.CmdRequest { | 
|  | if runtime.GOOS != "linux" && runtime.GOOS != "darwin" { | 
|  | panic("Unknown GOOS: " + runtime.GOOS) | 
|  | } | 
|  | cmdFlags := []string{ | 
|  | "--output_base=" + absolutePath(context.paths.outputBase), | 
|  | command.command, | 
|  | command.expression, | 
|  | "--profile=" + shared.BazelMetricsFilename(context.paths, runName), | 
|  |  | 
|  | "--host_platform=@soong_injection//product_config_platforms:mixed_builds_product_" + runtime.GOOS + "_x86_64", | 
|  | "--//build/bazel/product_config:target_build_variant=" + context.targetBuildVariant, | 
|  | // Don't specify --platforms, because on some products/branches (like kernel-build-tools) | 
|  | // the main platform for mixed_builds_product-variant doesn't exist because an arch isn't | 
|  | // specified in product config. The derivative platforms that config_node transitions into | 
|  | // will still work. | 
|  |  | 
|  | // Suppress noise | 
|  | "--ui_event_filters=-INFO", | 
|  | "--noshow_progress", | 
|  | "--norun_validations", | 
|  | } | 
|  | cmdFlags = append(cmdFlags, extraFlags...) | 
|  |  | 
|  | extraEnv := []string{ | 
|  | "HOME=" + context.paths.homeDir, | 
|  | pwdPrefix(), | 
|  | "BUILD_DIR=" + absolutePath(context.paths.soongOutDir), | 
|  | // Make OUT_DIR absolute here so build/bazel/bin/bazel uses the correct | 
|  | // OUT_DIR at <root>/out, instead of <root>/out/soong/workspace/out. | 
|  | "OUT_DIR=" + absolutePath(context.paths.outDir()), | 
|  | // Disables local host detection of gcc; toolchain information is defined | 
|  | // explicitly in BUILD files. | 
|  | "BAZEL_DO_NOT_DETECT_CPP_TOOLCHAIN=1", | 
|  | } | 
|  | capturedEnvVars, err := starlark_import.GetStarlarkValue[[]string]("captured_env_vars") | 
|  | if err != nil { | 
|  | panic(err) | 
|  | } | 
|  | for _, envvar := range capturedEnvVars { | 
|  | val := config.Getenv(envvar) | 
|  | if val == "" { | 
|  | continue | 
|  | } | 
|  | extraEnv = append(extraEnv, fmt.Sprintf("%s=%s", envvar, val)) | 
|  | } | 
|  | envVars := append(os.Environ(), extraEnv...) | 
|  |  | 
|  | return bazel.CmdRequest{cmdFlags, envVars} | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) printableCqueryCommand(bazelCmd bazel.CmdRequest) string { | 
|  | args := append([]string{context.paths.bazelPath}, bazelCmd.Argv...) | 
|  | outputString := strings.Join(bazelCmd.Env, " ") + " \"" + strings.Join(args, "\" \"") + "\"" | 
|  | return outputString | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) mainBzlFileContents() []byte { | 
|  | // TODO(cparsons): Define configuration transitions programmatically based | 
|  | // on available archs. | 
|  | contents := ` | 
|  | ##################################################### | 
|  | # This file is generated by soong_build. Do not edit. | 
|  | ##################################################### | 
|  | def _config_node_transition_impl(settings, attr): | 
|  | if attr.os == "android" and attr.arch == "target": | 
|  | target = "mixed_builds_product" | 
|  | else: | 
|  | target = "mixed_builds_product_%s_%s" % (attr.os, attr.arch) | 
|  | apex_name = "" | 
|  | if attr.within_apex: | 
|  | # //build/bazel/rules/apex:apex_name has to be set to a non_empty value, | 
|  | # otherwise //build/bazel/rules/apex:non_apex will be true and the | 
|  | # "-D__ANDROID_APEX__" compiler flag will be missing. Apex_name is used | 
|  | # in some validation on bazel side which don't really apply in mixed | 
|  | # build because soong will do the work, so we just set it to a fixed | 
|  | # value here. | 
|  | apex_name = "dcla_apex" | 
|  | outputs = { | 
|  | "//command_line_option:platforms": "@soong_injection//product_config_platforms:%s" % target, | 
|  | "@//build/bazel/rules/apex:within_apex": attr.within_apex, | 
|  | "@//build/bazel/rules/apex:min_sdk_version": attr.apex_sdk_version, | 
|  | "@//build/bazel/rules/apex:apex_name": apex_name, | 
|  | "@//build/bazel/rules/apex:api_domain": attr.api_domain, | 
|  | } | 
|  |  | 
|  | return outputs | 
|  |  | 
|  | _config_node_transition = transition( | 
|  | implementation = _config_node_transition_impl, | 
|  | inputs = [], | 
|  | outputs = [ | 
|  | "//command_line_option:platforms", | 
|  | "@//build/bazel/rules/apex:within_apex", | 
|  | "@//build/bazel/rules/apex:min_sdk_version", | 
|  | "@//build/bazel/rules/apex:apex_name", | 
|  | "@//build/bazel/rules/apex:api_domain", | 
|  | ], | 
|  | ) | 
|  |  | 
|  | def _passthrough_rule_impl(ctx): | 
|  | return [DefaultInfo(files = depset(ctx.files.deps))] | 
|  |  | 
|  | config_node = rule( | 
|  | implementation = _passthrough_rule_impl, | 
|  | attrs = { | 
|  | "arch"    : attr.string(mandatory = True), | 
|  | "os"      : attr.string(mandatory = True), | 
|  | "within_apex" : attr.bool(default = False), | 
|  | "apex_sdk_version" : attr.string(mandatory = True), | 
|  | "api_domain" : attr.string(mandatory = True), | 
|  | "deps"    : attr.label_list(cfg = _config_node_transition, allow_files = True), | 
|  | "_allowlist_function_transition": attr.label(default = "@bazel_tools//tools/allowlists/function_transition_allowlist"), | 
|  | }, | 
|  | ) | 
|  |  | 
|  |  | 
|  | # Rule representing the root of the build, to depend on all Bazel targets that | 
|  | # are required for the build. Building this target will build the entire Bazel | 
|  | # build tree. | 
|  | mixed_build_root = rule( | 
|  | implementation = _passthrough_rule_impl, | 
|  | attrs = { | 
|  | "deps" : attr.label_list(), | 
|  | }, | 
|  | ) | 
|  |  | 
|  | def _phony_root_impl(ctx): | 
|  | return [] | 
|  |  | 
|  | # Rule to depend on other targets but build nothing. | 
|  | # This is useful as follows: building a target of this rule will generate | 
|  | # symlink forests for all dependencies of the target, without executing any | 
|  | # actions of the build. | 
|  | phony_root = rule( | 
|  | implementation = _phony_root_impl, | 
|  | attrs = {"deps" : attr.label_list()}, | 
|  | ) | 
|  | ` | 
|  |  | 
|  | return []byte(contents) | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) mainBuildFileContents() []byte { | 
|  | // TODO(cparsons): Map label to attribute programmatically; don't use hard-coded | 
|  | // architecture mapping. | 
|  | formatString := ` | 
|  | # This file is generated by soong_build. Do not edit. | 
|  | load(":main.bzl", "config_node", "mixed_build_root", "phony_root") | 
|  |  | 
|  | %s | 
|  |  | 
|  | mixed_build_root(name = "buildroot", | 
|  | deps = [%s], | 
|  | testonly = True, # Unblocks testonly deps. | 
|  | ) | 
|  |  | 
|  | phony_root(name = "phonyroot", | 
|  | deps = [":buildroot"], | 
|  | testonly = True, # Unblocks testonly deps. | 
|  | ) | 
|  | ` | 
|  | configNodeFormatString := ` | 
|  | config_node(name = "%s", | 
|  | arch = "%s", | 
|  | os = "%s", | 
|  | within_apex = %s, | 
|  | apex_sdk_version = "%s", | 
|  | api_domain = "%s", | 
|  | deps = [%s], | 
|  | testonly = True, # Unblocks testonly deps. | 
|  | ) | 
|  | ` | 
|  |  | 
|  | configNodesSection := "" | 
|  |  | 
|  | labelsByConfig := map[string][]string{} | 
|  |  | 
|  | for _, val := range context.requests { | 
|  | labelString := fmt.Sprintf("\"@%s\"", val.label) | 
|  | configString := getConfigString(val) | 
|  | labelsByConfig[configString] = append(labelsByConfig[configString], labelString) | 
|  | } | 
|  |  | 
|  | // Configs need to be sorted to maintain determinism of the BUILD file. | 
|  | sortedConfigs := make([]string, 0, len(labelsByConfig)) | 
|  | for val := range labelsByConfig { | 
|  | sortedConfigs = append(sortedConfigs, val) | 
|  | } | 
|  | sort.Slice(sortedConfigs, func(i, j int) bool { return sortedConfigs[i] < sortedConfigs[j] }) | 
|  |  | 
|  | allLabels := []string{} | 
|  | for _, configString := range sortedConfigs { | 
|  | labels := labelsByConfig[configString] | 
|  | configTokens := strings.Split(configString, "|") | 
|  | if len(configTokens) < 2 { | 
|  | panic(fmt.Errorf("Unexpected config string format: %s", configString)) | 
|  | } | 
|  | archString := configTokens[0] | 
|  | osString := configTokens[1] | 
|  | withinApex := "False" | 
|  | apexSdkVerString := "" | 
|  | apiDomainString := "" | 
|  | if osString == "android" { | 
|  | // api domains are meaningful only for device variants | 
|  | apiDomainString = "system" | 
|  | } | 
|  | targetString := fmt.Sprintf("%s_%s", osString, archString) | 
|  | if len(configTokens) > 2 { | 
|  | targetString += "_" + configTokens[2] | 
|  | if configTokens[2] == withinApexToString(true) { | 
|  | withinApex = "True" | 
|  | } | 
|  | } | 
|  | if len(configTokens) > 3 { | 
|  | targetString += "_" + configTokens[3] | 
|  | apexSdkVerString = configTokens[3] | 
|  | } | 
|  | if len(configTokens) > 4 { | 
|  | apiDomainString = configTokens[4] | 
|  | targetString += "_" + apiDomainString | 
|  | } | 
|  | allLabels = append(allLabels, fmt.Sprintf("\":%s\"", targetString)) | 
|  | labelsString := strings.Join(labels, ",\n            ") | 
|  | configNodesSection += fmt.Sprintf(configNodeFormatString, targetString, archString, osString, withinApex, apexSdkVerString, apiDomainString, | 
|  | labelsString) | 
|  | } | 
|  |  | 
|  | return []byte(fmt.Sprintf(formatString, configNodesSection, strings.Join(allLabels, ",\n            "))) | 
|  | } | 
|  |  | 
|  | func indent(original string) string { | 
|  | result := "" | 
|  | for _, line := range strings.Split(original, "\n") { | 
|  | result += "  " + line + "\n" | 
|  | } | 
|  | return result | 
|  | } | 
|  |  | 
|  | // Returns the file contents of the buildroot.cquery file that should be used for the cquery | 
|  | // expression in order to obtain information about buildroot and its dependencies. | 
|  | // The contents of this file depend on the mixedBuildBazelContext's requests; requests are enumerated | 
|  | // and grouped by their request type. The data retrieved for each label depends on its | 
|  | // request type. | 
|  | func (context *mixedBuildBazelContext) cqueryStarlarkFileContents() []byte { | 
|  | requestTypeToCqueryIdEntries := map[cqueryRequest][]string{} | 
|  | requestTypes := []cqueryRequest{} | 
|  | for _, val := range context.requests { | 
|  | cqueryId := getCqueryId(val) | 
|  | mapEntryString := fmt.Sprintf("%q : True", cqueryId) | 
|  | if _, seenKey := requestTypeToCqueryIdEntries[val.requestType]; !seenKey { | 
|  | requestTypes = append(requestTypes, val.requestType) | 
|  | } | 
|  | requestTypeToCqueryIdEntries[val.requestType] = | 
|  | append(requestTypeToCqueryIdEntries[val.requestType], mapEntryString) | 
|  | } | 
|  | labelRegistrationMapSection := "" | 
|  | functionDefSection := "" | 
|  | mainSwitchSection := "" | 
|  |  | 
|  | mapDeclarationFormatString := ` | 
|  | %s = { | 
|  | %s | 
|  | } | 
|  | ` | 
|  | functionDefFormatString := ` | 
|  | def %s(target, id_string): | 
|  | %s | 
|  | ` | 
|  | mainSwitchSectionFormatString := ` | 
|  | if id_string in %s: | 
|  | return id_string + ">>" + %s(target, id_string) | 
|  | ` | 
|  |  | 
|  | for _, requestType := range requestTypes { | 
|  | labelMapName := requestType.Name() + "_Labels" | 
|  | functionName := requestType.Name() + "_Fn" | 
|  | labelRegistrationMapSection += fmt.Sprintf(mapDeclarationFormatString, | 
|  | labelMapName, | 
|  | strings.Join(requestTypeToCqueryIdEntries[requestType], ",\n  ")) | 
|  | functionDefSection += fmt.Sprintf(functionDefFormatString, | 
|  | functionName, | 
|  | indent(requestType.StarlarkFunctionBody())) | 
|  | mainSwitchSection += fmt.Sprintf(mainSwitchSectionFormatString, | 
|  | labelMapName, functionName) | 
|  | } | 
|  |  | 
|  | formatString := ` | 
|  | # This file is generated by soong_build. Do not edit. | 
|  |  | 
|  | {LABEL_REGISTRATION_MAP_SECTION} | 
|  |  | 
|  | {FUNCTION_DEF_SECTION} | 
|  |  | 
|  | def get_arch(target): | 
|  | # TODO(b/199363072): filegroups and file targets aren't associated with any | 
|  | # specific platform architecture in mixed builds. This is consistent with how | 
|  | # Soong treats filegroups, but it may not be the case with manually-written | 
|  | # filegroup BUILD targets. | 
|  | buildoptions = build_options(target) | 
|  |  | 
|  | if buildoptions == None: | 
|  | # File targets do not have buildoptions. File targets aren't associated with | 
|  | #  any specific platform architecture in mixed builds, so use the host. | 
|  | return "x86_64|linux" | 
|  | platforms = buildoptions["//command_line_option:platforms"] | 
|  | if len(platforms) != 1: | 
|  | # An individual configured target should have only one platform architecture. | 
|  | # Note that it's fine for there to be multiple architectures for the same label, | 
|  | # but each is its own configured target. | 
|  | fail("expected exactly 1 platform for " + str(target.label) + " but got " + str(platforms)) | 
|  | platform_name = platforms[0].name | 
|  | if platform_name == "host": | 
|  | return "HOST" | 
|  | if not platform_name.startswith("mixed_builds_product"): | 
|  | fail("expected platform name of the form 'mixed_builds_product_android_<arch>' or 'mixed_builds_product_linux_<arch>', but was " + str(platforms)) | 
|  | platform_name = platform_name.removeprefix("mixed_builds_product").removeprefix("_") | 
|  | config_key = "" | 
|  | if not platform_name: | 
|  | config_key = "target|android" | 
|  | elif platform_name.startswith("android_"): | 
|  | config_key = platform_name.removeprefix("android_") + "|android" | 
|  | elif platform_name.startswith("linux_"): | 
|  | config_key = platform_name.removeprefix("linux_") + "|linux" | 
|  | else: | 
|  | fail("expected platform name of the form 'mixed_builds_product_android_<arch>' or 'mixed_builds_product_linux_<arch>', but was " + str(platforms)) | 
|  |  | 
|  | within_apex = buildoptions.get("//build/bazel/rules/apex:within_apex") | 
|  | apex_sdk_version = buildoptions.get("//build/bazel/rules/apex:min_sdk_version") | 
|  | api_domain = buildoptions.get("//build/bazel/rules/apex:api_domain") | 
|  |  | 
|  | if within_apex: | 
|  | config_key += "|within_apex" | 
|  | if apex_sdk_version != None and len(apex_sdk_version) > 0: | 
|  | config_key += "|" + apex_sdk_version | 
|  | if api_domain != None and len(api_domain) > 0: | 
|  | config_key += "|" + api_domain | 
|  |  | 
|  | return config_key | 
|  |  | 
|  | def format(target): | 
|  | id_string = str(target.label) + "|" + get_arch(target) | 
|  |  | 
|  | # TODO(b/248106697): Remove once Bazel is updated to always normalize labels. | 
|  | if id_string.startswith("//"): | 
|  | id_string = "@" + id_string | 
|  |  | 
|  | {MAIN_SWITCH_SECTION} | 
|  |  | 
|  | # This target was not requested via cquery, and thus must be a dependency | 
|  | # of a requested target. | 
|  | return id_string + ">>NONE" | 
|  | ` | 
|  | replacer := strings.NewReplacer( | 
|  | "{LABEL_REGISTRATION_MAP_SECTION}", labelRegistrationMapSection, | 
|  | "{FUNCTION_DEF_SECTION}", functionDefSection, | 
|  | "{MAIN_SWITCH_SECTION}", mainSwitchSection) | 
|  |  | 
|  | return []byte(replacer.Replace(formatString)) | 
|  | } | 
|  |  | 
|  | // Returns a path containing build-related metadata required for interfacing | 
|  | // with Bazel. Example: out/soong/bazel. | 
|  | func (p *bazelPaths) intermediatesDir() string { | 
|  | return filepath.Join(p.soongOutDir, "bazel") | 
|  | } | 
|  |  | 
|  | // Returns the path where the contents of the @soong_injection repository live. | 
|  | // It is used by Soong to tell Bazel things it cannot over the command line. | 
|  | func (p *bazelPaths) injectedFilesDir() string { | 
|  | return filepath.Join(p.soongOutDir, bazel.SoongInjectionDirName) | 
|  | } | 
|  |  | 
|  | // Returns the path of the synthetic Bazel workspace that contains a symlink | 
|  | // forest composed the whole source tree and BUILD files generated by bp2build. | 
|  | func (p *bazelPaths) syntheticWorkspaceDir() string { | 
|  | return filepath.Join(p.soongOutDir, "workspace") | 
|  | } | 
|  |  | 
|  | // Returns the path to the top level out dir ($OUT_DIR). | 
|  | func (p *bazelPaths) outDir() string { | 
|  | return filepath.Dir(p.soongOutDir) | 
|  | } | 
|  |  | 
|  | const buildrootLabel = "@soong_injection//mixed_builds:buildroot" | 
|  |  | 
|  | var ( | 
|  | cqueryCmd        = bazelCommand{"cquery", fmt.Sprintf("deps(%s, 2)", buildrootLabel)} | 
|  | aqueryCmd        = bazelCommand{"aquery", fmt.Sprintf("deps(%s)", buildrootLabel)} | 
|  | buildCmd         = bazelCommand{"build", "@soong_injection//mixed_builds:phonyroot"} | 
|  | allBazelCommands = []bazelCommand{aqueryCmd, cqueryCmd, buildCmd} | 
|  | ) | 
|  |  | 
|  | // This can't be part of bp2build_product_config.go because it would create a circular go package dependency | 
|  | func getLabelsForBazelSandwichPartitions(variables *ProductVariables) []string { | 
|  | targetProduct := "unknown" | 
|  | if variables.DeviceProduct != nil { | 
|  | targetProduct = *variables.DeviceProduct | 
|  | } | 
|  | currentProductFolder := fmt.Sprintf("build/bazel/products/%s", targetProduct) | 
|  | if len(variables.PartitionVarsForBazelMigrationOnlyDoNotUse.ProductDirectory) > 0 { | 
|  | currentProductFolder = fmt.Sprintf("%s%s", variables.PartitionVarsForBazelMigrationOnlyDoNotUse.ProductDirectory, targetProduct) | 
|  | } | 
|  | var ret []string | 
|  | if variables.PartitionVarsForBazelMigrationOnlyDoNotUse.PartitionQualifiedVariables["system"].BuildingImage { | 
|  | ret = append(ret, "@//"+currentProductFolder+":system_image") | 
|  | ret = append(ret, "@//"+currentProductFolder+":run_system_image_test") | 
|  | } | 
|  | return ret | 
|  | } | 
|  |  | 
|  | func GetBazelSandwichCqueryRequests(config Config) ([]cqueryKey, error) { | 
|  | partitionLabels := getLabelsForBazelSandwichPartitions(&config.productVariables) | 
|  | result := make([]cqueryKey, 0, len(partitionLabels)) | 
|  | labelRegex := regexp.MustCompile("^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$") | 
|  | // Note that bazel "targets" are different from soong "targets", the bazel targets are | 
|  | // synonymous with soong modules, and soong targets are a configuration a module is built in. | 
|  | for _, target := range partitionLabels { | 
|  | match := labelRegex.FindStringSubmatch(target) | 
|  | if match == nil { | 
|  | return nil, fmt.Errorf("invalid label, must match `^@?//([a-zA-Z0-9/_-]+):[a-zA-Z0-9_-]+$`: %s", target) | 
|  | } | 
|  |  | 
|  | // change this to config.BuildOSTarget if we add host targets | 
|  | soongTarget := config.AndroidCommonTarget | 
|  | if soongTarget.Os.Class != Device { | 
|  | // kernel-build-tools seems to set the AndroidCommonTarget to a linux host | 
|  | // target for some reason, disable device builds in that case. | 
|  | continue | 
|  | } | 
|  |  | 
|  | result = append(result, cqueryKey{ | 
|  | label:       target, | 
|  | requestType: cquery.GetOutputFiles, | 
|  | configKey: configKey{ | 
|  | arch:   soongTarget.Arch.String(), | 
|  | osType: soongTarget.Os, | 
|  | }, | 
|  | }) | 
|  | } | 
|  | return result, nil | 
|  | } | 
|  |  | 
|  | // QueueBazelSandwichCqueryRequests queues cquery requests for all the bazel labels in | 
|  | // bazel_sandwich_targets. These will later be given phony targets so that they can be built on the | 
|  | // command line. | 
|  | func (context *mixedBuildBazelContext) QueueBazelSandwichCqueryRequests(config Config) error { | 
|  | requests, err := GetBazelSandwichCqueryRequests(config) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | for _, request := range requests { | 
|  | context.QueueBazelRequest(request.label, request.requestType, request.configKey) | 
|  | } | 
|  |  | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // Issues commands to Bazel to receive results for all cquery requests | 
|  | // queued in the BazelContext. | 
|  | func (context *mixedBuildBazelContext) InvokeBazel(config Config, ctx invokeBazelContext) error { | 
|  | eventHandler := ctx.GetEventHandler() | 
|  | eventHandler.Begin("bazel") | 
|  | defer eventHandler.End("bazel") | 
|  |  | 
|  | if metricsDir := context.paths.BazelMetricsDir(); metricsDir != "" { | 
|  | if err := os.MkdirAll(metricsDir, 0777); err != nil { | 
|  | return err | 
|  | } | 
|  | } | 
|  | context.results = make(map[cqueryKey]string) | 
|  | if err := context.runCquery(config, ctx); err != nil { | 
|  | return err | 
|  | } | 
|  | if err := context.runAquery(config, ctx); err != nil { | 
|  | return err | 
|  | } | 
|  | if err := context.generateBazelSymlinks(config, ctx); err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | // Clear requests. | 
|  | context.requests = []cqueryKey{} | 
|  | return nil | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) runCquery(config Config, ctx invokeBazelContext) error { | 
|  | eventHandler := ctx.GetEventHandler() | 
|  | eventHandler.Begin("cquery") | 
|  | defer eventHandler.End("cquery") | 
|  | soongInjectionPath := absolutePath(context.paths.injectedFilesDir()) | 
|  | mixedBuildsPath := filepath.Join(soongInjectionPath, "mixed_builds") | 
|  | if _, err := os.Stat(mixedBuildsPath); os.IsNotExist(err) { | 
|  | err = os.MkdirAll(mixedBuildsPath, 0777) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | } | 
|  | if err := writeFileBytesIfChanged(filepath.Join(soongInjectionPath, "WORKSPACE.bazel"), []byte{}, 0666); err != nil { | 
|  | return err | 
|  | } | 
|  | if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "main.bzl"), context.mainBzlFileContents(), 0666); err != nil { | 
|  | return err | 
|  | } | 
|  | if err := writeFileBytesIfChanged(filepath.Join(mixedBuildsPath, "BUILD.bazel"), context.mainBuildFileContents(), 0666); err != nil { | 
|  | return err | 
|  | } | 
|  | cqueryFileRelpath := filepath.Join(context.paths.injectedFilesDir(), "buildroot.cquery") | 
|  | if err := writeFileBytesIfChanged(absolutePath(cqueryFileRelpath), context.cqueryStarlarkFileContents(), 0666); err != nil { | 
|  | return err | 
|  | } | 
|  |  | 
|  | extraFlags := []string{"--output=starlark", "--starlark:file=" + absolutePath(cqueryFileRelpath)} | 
|  | if Bool(config.productVariables.ClangCoverage) { | 
|  | extraFlags = append(extraFlags, "--collect_code_coverage") | 
|  | } | 
|  |  | 
|  | cqueryCmdRequest := context.createBazelCommand(config, bazel.CqueryBuildRootRunName, cqueryCmd, extraFlags...) | 
|  | cqueryOutput, cqueryErrorMessage, cqueryErr := context.issueBazelCommand(cqueryCmdRequest, context.paths, eventHandler) | 
|  | if cqueryErr != nil { | 
|  | return cqueryErr | 
|  | } | 
|  | cqueryCommandPrint := fmt.Sprintf("cquery command line:\n  %s \n\n\n", context.printableCqueryCommand(cqueryCmdRequest)) | 
|  | if err := os.WriteFile(filepath.Join(soongInjectionPath, "cquery.out"), []byte(cqueryCommandPrint+cqueryOutput), 0666); err != nil { | 
|  | return err | 
|  | } | 
|  | cqueryResults := map[string]string{} | 
|  | for _, outputLine := range strings.Split(cqueryOutput, "\n") { | 
|  | if strings.Contains(outputLine, ">>") { | 
|  | splitLine := strings.SplitN(outputLine, ">>", 2) | 
|  | cqueryResults[splitLine[0]] = splitLine[1] | 
|  | } | 
|  | } | 
|  | for _, val := range context.requests { | 
|  | if cqueryResult, ok := cqueryResults[getCqueryId(val)]; ok { | 
|  | context.results[val] = cqueryResult | 
|  | } else { | 
|  | return fmt.Errorf("missing result for bazel target %s. query output: [%s], cquery err: [%s]", | 
|  | getCqueryId(val), cqueryOutput, cqueryErrorMessage) | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | func writeFileBytesIfChanged(path string, contents []byte, perm os.FileMode) error { | 
|  | oldContents, err := os.ReadFile(path) | 
|  | if err != nil || !bytes.Equal(contents, oldContents) { | 
|  | err = os.WriteFile(path, contents, perm) | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) runAquery(config Config, ctx invokeBazelContext) error { | 
|  | eventHandler := ctx.GetEventHandler() | 
|  | eventHandler.Begin("aquery") | 
|  | defer eventHandler.End("aquery") | 
|  | // Issue an aquery command to retrieve action information about the bazel build tree. | 
|  | // | 
|  | // Use jsonproto instead of proto; actual proto parsing would require a dependency on Bazel's | 
|  | // proto sources, which would add a number of unnecessary dependencies. | 
|  | extraFlags := []string{"--output=proto", "--include_file_write_contents"} | 
|  | if Bool(config.productVariables.ClangCoverage) { | 
|  | extraFlags = append(extraFlags, "--collect_code_coverage") | 
|  | paths := make([]string, 0, 2) | 
|  | if p := config.productVariables.NativeCoveragePaths; len(p) > 0 { | 
|  | for i := range p { | 
|  | // TODO(b/259404593) convert path wildcard to regex values | 
|  | if p[i] == "*" { | 
|  | p[i] = ".*" | 
|  | } | 
|  | } | 
|  | paths = append(paths, JoinWithPrefixAndSeparator(p, "+", ",")) | 
|  | } | 
|  | if p := config.productVariables.NativeCoverageExcludePaths; len(p) > 0 { | 
|  | paths = append(paths, JoinWithPrefixAndSeparator(p, "-", ",")) | 
|  | } | 
|  | if len(paths) > 0 { | 
|  | extraFlags = append(extraFlags, "--instrumentation_filter="+strings.Join(paths, ",")) | 
|  | } | 
|  | } | 
|  | aqueryOutput, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.AqueryBuildRootRunName, aqueryCmd, | 
|  | extraFlags...), context.paths, eventHandler) | 
|  | if err != nil { | 
|  | return err | 
|  | } | 
|  | context.buildStatements, context.depsets, err = bazel.AqueryBuildStatements([]byte(aqueryOutput), eventHandler) | 
|  | return err | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) generateBazelSymlinks(config Config, ctx invokeBazelContext) error { | 
|  | eventHandler := ctx.GetEventHandler() | 
|  | eventHandler.Begin("symlinks") | 
|  | defer eventHandler.End("symlinks") | 
|  | // Issue a build command of the phony root to generate symlink forests for dependencies of the | 
|  | // Bazel build. This is necessary because aquery invocations do not generate this symlink forest, | 
|  | // but some of symlinks may be required to resolve source dependencies of the build. | 
|  | _, _, err := context.issueBazelCommand(context.createBazelCommand(config, bazel.BazelBuildPhonyRootRunName, buildCmd), context.paths, eventHandler) | 
|  | return err | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) BuildStatementsToRegister() []*bazel.BuildStatement { | 
|  | return context.buildStatements | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) AqueryDepsets() []bazel.AqueryDepset { | 
|  | return context.depsets | 
|  | } | 
|  |  | 
|  | func (context *mixedBuildBazelContext) OutputBase() string { | 
|  | return context.paths.outputBase | 
|  | } | 
|  |  | 
|  | // Singleton used for registering BUILD file ninja dependencies (needed | 
|  | // for correctness of builds which use Bazel. | 
|  | func BazelSingleton() Singleton { | 
|  | return &bazelSingleton{} | 
|  | } | 
|  |  | 
|  | type bazelSingleton struct{} | 
|  |  | 
|  | func (c *bazelSingleton) GenerateBuildActions(ctx SingletonContext) { | 
|  | // bazelSingleton is a no-op if mixed-soong-bazel-builds are disabled. | 
|  | if !ctx.Config().IsMixedBuildsEnabled() { | 
|  | return | 
|  | } | 
|  |  | 
|  | // Add ninja file dependencies for files which all bazel invocations require. | 
|  | bazelBuildList := absolutePath(filepath.Join( | 
|  | filepath.Dir(ctx.Config().moduleListFile), "bazel.list")) | 
|  | ctx.AddNinjaFileDeps(bazelBuildList) | 
|  |  | 
|  | data, err := os.ReadFile(bazelBuildList) | 
|  | if err != nil { | 
|  | ctx.Errorf(err.Error()) | 
|  | } | 
|  | files := strings.Split(strings.TrimSpace(string(data)), "\n") | 
|  | for _, file := range files { | 
|  | ctx.AddNinjaFileDeps(file) | 
|  | } | 
|  |  | 
|  | depsetHashToDepset := map[string]bazel.AqueryDepset{} | 
|  |  | 
|  | for _, depset := range ctx.Config().BazelContext.AqueryDepsets() { | 
|  | depsetHashToDepset[depset.ContentHash] = depset | 
|  |  | 
|  | var outputs []Path | 
|  | var orderOnlies []Path | 
|  | for _, depsetDepHash := range depset.TransitiveDepSetHashes { | 
|  | otherDepsetName := bazelDepsetName(depsetDepHash) | 
|  | outputs = append(outputs, PathForPhony(ctx, otherDepsetName)) | 
|  | } | 
|  | for _, artifactPath := range depset.DirectArtifacts { | 
|  | pathInBazelOut := PathForBazelOut(ctx, artifactPath) | 
|  | if artifactPath == "bazel-out/volatile-status.txt" { | 
|  | // See https://bazel.build/docs/user-manual#workspace-status | 
|  | orderOnlies = append(orderOnlies, pathInBazelOut) | 
|  | } else { | 
|  | outputs = append(outputs, pathInBazelOut) | 
|  | } | 
|  | } | 
|  | thisDepsetName := bazelDepsetName(depset.ContentHash) | 
|  | ctx.Build(pctx, BuildParams{ | 
|  | Rule:      blueprint.Phony, | 
|  | Outputs:   []WritablePath{PathForPhony(ctx, thisDepsetName)}, | 
|  | Implicits: outputs, | 
|  | OrderOnly: orderOnlies, | 
|  | }) | 
|  | } | 
|  |  | 
|  | executionRoot := path.Join(ctx.Config().BazelContext.OutputBase(), "execroot", "__main__") | 
|  | bazelOutDir := path.Join(executionRoot, "bazel-out") | 
|  | rel, err := filepath.Rel(ctx.Config().OutDir(), executionRoot) | 
|  | if err != nil { | 
|  | ctx.Errorf("%s", err.Error()) | 
|  | } | 
|  | dotdotsToOutRoot := strings.Repeat("../", strings.Count(rel, "/")+1) | 
|  | for index, buildStatement := range ctx.Config().BazelContext.BuildStatementsToRegister() { | 
|  | // nil build statements are a valid case where we do not create an action because it is | 
|  | // unnecessary or handled by other processing | 
|  | if buildStatement == nil { | 
|  | continue | 
|  | } | 
|  | if len(buildStatement.Command) > 0 { | 
|  | rule := NewRuleBuilder(pctx, ctx) | 
|  | intermediateDir, intermediateDirHash := intermediatePathForSboxMixedBuildAction(ctx, buildStatement) | 
|  | if buildStatement.ShouldRunInSbox { | 
|  | // Create a rule to build the output inside a sandbox | 
|  | // This will create two changes of working directory | 
|  | // 1. From ANDROID_BUILD_TOP to sbox top | 
|  | // 2. From sbox top to a a synthetic mixed build execution root relative to it | 
|  | // Finally, the outputs will be copied to intermediateDir | 
|  | rule.Sbox(intermediateDir, | 
|  | PathForOutput(ctx, "mixed_build_sbox_intermediates", intermediateDirHash+".textproto")). | 
|  | SandboxInputs(). | 
|  | // Since we will cd to mixed build execution root, set sbox's out subdir to empty | 
|  | // Without this, we will try to copy from $SBOX_SANDBOX_DIR/out/out/bazel/output/execroot/__main__/... | 
|  | SetSboxOutDirDirAsEmpty() | 
|  |  | 
|  | // Create another set of rules to copy files from the intermediate dir to mixed build execution root | 
|  | for _, outputPath := range buildStatement.OutputPaths { | 
|  | ctx.Build(pctx, BuildParams{ | 
|  | Rule:   CpIfChanged, | 
|  | Input:  intermediateDir.Join(ctx, executionRoot, outputPath), | 
|  | Output: PathForBazelOut(ctx, outputPath), | 
|  | }) | 
|  | } | 
|  | } | 
|  | createCommand(rule.Command(), buildStatement, executionRoot, bazelOutDir, ctx, depsetHashToDepset, dotdotsToOutRoot) | 
|  |  | 
|  | desc := fmt.Sprintf("%s: %s", buildStatement.Mnemonic, buildStatement.OutputPaths) | 
|  | rule.Build(fmt.Sprintf("bazel %d", index), desc) | 
|  | continue | 
|  | } | 
|  | // Certain actions returned by aquery (for instance FileWrite) do not contain a command | 
|  | // and thus require special treatment. If BuildStatement were an interface implementing | 
|  | // buildRule(ctx) function, the code here would just call it. | 
|  | // Unfortunately, the BuildStatement is defined in | 
|  | // the 'bazel' package, which cannot depend on 'android' package where ctx is defined, | 
|  | // because this would cause circular dependency. So, until we move aquery processing | 
|  | // to the 'android' package, we need to handle special cases here. | 
|  | switch buildStatement.Mnemonic { | 
|  | case "RepoMappingManifest": | 
|  | // It appears RepoMappingManifest files currently have | 
|  | // non-deterministic content. Just emit empty files for | 
|  | // now because they're unused. | 
|  | out := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) | 
|  | WriteFileRuleVerbatim(ctx, out, "") | 
|  | case "FileWrite", "SourceSymlinkManifest": | 
|  | out := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) | 
|  | if buildStatement.IsExecutable { | 
|  | WriteExecutableFileRuleVerbatim(ctx, out, buildStatement.FileContents) | 
|  | } else { | 
|  | WriteFileRuleVerbatim(ctx, out, buildStatement.FileContents) | 
|  | } | 
|  | case "SymlinkTree": | 
|  | // build-runfiles arguments are the manifest file and the target directory | 
|  | // where it creates the symlink tree according to this manifest (and then | 
|  | // writes the MANIFEST file to it). | 
|  | outManifest := PathForBazelOut(ctx, buildStatement.OutputPaths[0]) | 
|  | outManifestPath := outManifest.String() | 
|  | if !strings.HasSuffix(outManifestPath, "MANIFEST") { | 
|  | panic("the base name of the symlink tree action should be MANIFEST, got " + outManifestPath) | 
|  | } | 
|  | outDir := filepath.Dir(outManifestPath) | 
|  | ctx.Build(pctx, BuildParams{ | 
|  | Rule:        buildRunfilesRule, | 
|  | Output:      outManifest, | 
|  | Inputs:      []Path{PathForBazelOut(ctx, buildStatement.InputPaths[0])}, | 
|  | Description: "symlink tree for " + outDir, | 
|  | Args: map[string]string{ | 
|  | "outDir": outDir, | 
|  | }, | 
|  | }) | 
|  | default: | 
|  | panic(fmt.Sprintf("unhandled build statement: %v", buildStatement)) | 
|  | } | 
|  | } | 
|  |  | 
|  | // Create phony targets for all the bazel sandwich output files | 
|  | requests, err := GetBazelSandwichCqueryRequests(ctx.Config()) | 
|  | if err != nil { | 
|  | ctx.Errorf(err.Error()) | 
|  | } | 
|  | for _, request := range requests { | 
|  | files, err := ctx.Config().BazelContext.GetOutputFiles(request.label, request.configKey) | 
|  | if err != nil { | 
|  | ctx.Errorf(err.Error()) | 
|  | } | 
|  | filesAsPaths := make([]Path, 0, len(files)) | 
|  | for _, file := range files { | 
|  | filesAsPaths = append(filesAsPaths, PathForBazelOut(ctx, file)) | 
|  | } | 
|  | ctx.Phony("bazel_sandwich", filesAsPaths...) | 
|  | } | 
|  | ctx.Phony("checkbuild", PathForPhony(ctx, "bazel_sandwich")) | 
|  | } | 
|  |  | 
|  | // Returns a out dir path for a sandboxed mixed build action | 
|  | func intermediatePathForSboxMixedBuildAction(ctx PathContext, statement *bazel.BuildStatement) (OutputPath, string) { | 
|  | // An artifact can be generated by a single buildstatement. | 
|  | // Use the hash of the first artifact to create a unique path | 
|  | uniqueDir := sha1.New() | 
|  | uniqueDir.Write([]byte(statement.OutputPaths[0])) | 
|  | uniqueDirHashString := hex.EncodeToString(uniqueDir.Sum(nil)) | 
|  | return PathForOutput(ctx, "mixed_build_sbox_intermediates", uniqueDirHashString), uniqueDirHashString | 
|  | } | 
|  |  | 
|  | // Register bazel-owned build statements (obtained from the aquery invocation). | 
|  | func createCommand(cmd *RuleBuilderCommand, buildStatement *bazel.BuildStatement, executionRoot string, bazelOutDir string, ctx BuilderContext, depsetHashToDepset map[string]bazel.AqueryDepset, dotdotsToOutRoot string) { | 
|  | // executionRoot is the action cwd. | 
|  | if buildStatement.ShouldRunInSbox { | 
|  | // mkdir -p ensures that the directory exists when run via sbox | 
|  | cmd.Text(fmt.Sprintf("mkdir -p '%s' && cd '%s' &&", executionRoot, executionRoot)) | 
|  | } else { | 
|  | cmd.Text(fmt.Sprintf("cd '%s' &&", executionRoot)) | 
|  | } | 
|  |  | 
|  | // Remove old outputs, as some actions might not rerun if the outputs are detected. | 
|  | if len(buildStatement.OutputPaths) > 0 { | 
|  | cmd.Text("rm -rf") // -r because outputs can be Bazel dir/tree artifacts. | 
|  | for _, outputPath := range buildStatement.OutputPaths { | 
|  | cmd.Text(fmt.Sprintf("'%s'", outputPath)) | 
|  | } | 
|  | cmd.Text("&&") | 
|  | } | 
|  |  | 
|  | for _, pair := range buildStatement.Env { | 
|  | // Set per-action env variables, if any. | 
|  | cmd.Flag(pair.Key + "=" + pair.Value) | 
|  | } | 
|  |  | 
|  | command := buildStatement.Command | 
|  | command = strings.ReplaceAll(command, "{DOTDOTS_TO_OUTPUT_ROOT}", dotdotsToOutRoot) | 
|  |  | 
|  | // The actual Bazel action. | 
|  | if len(command) > 16*1024 { | 
|  | commandFile := PathForBazelOut(ctx, buildStatement.OutputPaths[0]+".sh") | 
|  | WriteFileRule(ctx, commandFile, command) | 
|  |  | 
|  | cmd.Text("bash").Text(buildStatement.OutputPaths[0] + ".sh").Implicit(commandFile) | 
|  | } else { | 
|  | cmd.Text(command) | 
|  | } | 
|  |  | 
|  | for _, outputPath := range buildStatement.OutputPaths { | 
|  | if buildStatement.ShouldRunInSbox { | 
|  | // The full path has three components that get joined together | 
|  | // 1. intermediate output dir that `sbox` will place the artifacts at | 
|  | // 2. mixed build execution root | 
|  | // 3. artifact path returned by aquery | 
|  | intermediateDir, _ := intermediatePathForSboxMixedBuildAction(ctx, buildStatement) | 
|  | cmd.ImplicitOutput(intermediateDir.Join(ctx, executionRoot, outputPath)) | 
|  | } else { | 
|  | cmd.ImplicitOutput(PathForBazelOut(ctx, outputPath)) | 
|  | } | 
|  | } | 
|  | for _, inputPath := range buildStatement.InputPaths { | 
|  | cmd.Implicit(PathForBazelOut(ctx, inputPath)) | 
|  | } | 
|  | for _, inputDepsetHash := range buildStatement.InputDepsetHashes { | 
|  | if buildStatement.ShouldRunInSbox { | 
|  | // Bazel depsets are phony targets that are used to group files. | 
|  | // We need to copy the grouped files into the sandbox | 
|  | ds, _ := depsetHashToDepset[inputDepsetHash] | 
|  | cmd.Implicits(PathsForBazelOut(ctx, ds.DirectArtifacts)) | 
|  | } else { | 
|  | otherDepsetName := bazelDepsetName(inputDepsetHash) | 
|  | cmd.Implicit(PathForPhony(ctx, otherDepsetName)) | 
|  | } | 
|  | } | 
|  | for _, implicitPath := range buildStatement.ImplicitDeps { | 
|  | cmd.Implicit(PathForArbitraryOutput(ctx, implicitPath)) | 
|  | } | 
|  |  | 
|  | if depfile := buildStatement.Depfile; depfile != nil { | 
|  | // The paths in depfile are relative to `executionRoot`. | 
|  | // Hence, they need to be corrected by replacing "bazel-out" | 
|  | // with the full `bazelOutDir`. | 
|  | // Otherwise, implicit outputs and implicit inputs under "bazel-out/" | 
|  | // would be deemed missing. | 
|  | // (Note: The regexp uses a capture group because the version of sed | 
|  | //  does not support a look-behind pattern.) | 
|  | replacement := fmt.Sprintf(`&& sed -i'' -E 's@(^|\s|")bazel-out/@\1%s/@g' '%s'`, | 
|  | bazelOutDir, *depfile) | 
|  | cmd.Text(replacement) | 
|  | cmd.ImplicitDepFile(PathForBazelOut(ctx, *depfile)) | 
|  | } | 
|  |  | 
|  | for _, symlinkPath := range buildStatement.SymlinkPaths { | 
|  | cmd.ImplicitSymlinkOutput(PathForBazelOut(ctx, symlinkPath)) | 
|  | } | 
|  | } | 
|  |  | 
|  | func getCqueryId(key cqueryKey) string { | 
|  | return key.label + "|" + getConfigString(key) | 
|  | } | 
|  |  | 
|  | func getConfigString(key cqueryKey) string { | 
|  | arch := key.configKey.arch | 
|  | if len(arch) == 0 || arch == "common" { | 
|  | if key.configKey.osType.Class == Device { | 
|  | // For the generic Android, the expected result is "target|android", which | 
|  | // corresponds to the product_variable_config named "android_target" in | 
|  | // build/bazel/platforms/BUILD.bazel. | 
|  | arch = "target" | 
|  | } else { | 
|  | // Use host platform, which is currently hardcoded to be x86_64. | 
|  | arch = "x86_64" | 
|  | } | 
|  | } | 
|  | osName := key.configKey.osType.Name | 
|  | if len(osName) == 0 || osName == "common_os" || osName == "linux_glibc" || osName == "linux_musl" { | 
|  | // Use host OS, which is currently hardcoded to be linux. | 
|  | osName = "linux" | 
|  | } | 
|  | keyString := arch + "|" + osName | 
|  | if key.configKey.apexKey.WithinApex { | 
|  | keyString += "|" + withinApexToString(key.configKey.apexKey.WithinApex) | 
|  | } | 
|  |  | 
|  | if len(key.configKey.apexKey.ApexSdkVersion) > 0 { | 
|  | keyString += "|" + key.configKey.apexKey.ApexSdkVersion | 
|  | } | 
|  |  | 
|  | if len(key.configKey.apexKey.ApiDomain) > 0 { | 
|  | keyString += "|" + key.configKey.apexKey.ApiDomain | 
|  | } | 
|  |  | 
|  | return keyString | 
|  | } | 
|  |  | 
|  | func GetConfigKey(ctx BaseModuleContext) configKey { | 
|  | return configKey{ | 
|  | // use string because Arch is not a valid key in go | 
|  | arch:   ctx.Arch().String(), | 
|  | osType: ctx.Os(), | 
|  | } | 
|  | } | 
|  |  | 
|  | func GetConfigKeyApexVariant(ctx BaseModuleContext, apexKey *ApexConfigKey) configKey { | 
|  | configKey := GetConfigKey(ctx) | 
|  |  | 
|  | if apexKey != nil { | 
|  | configKey.apexKey = ApexConfigKey{ | 
|  | WithinApex:     apexKey.WithinApex, | 
|  | ApexSdkVersion: apexKey.ApexSdkVersion, | 
|  | ApiDomain:      apexKey.ApiDomain, | 
|  | } | 
|  | } | 
|  |  | 
|  | return configKey | 
|  | } | 
|  |  | 
|  | func bazelDepsetName(contentHash string) string { | 
|  | return fmt.Sprintf("bazel_depset_%s", contentHash) | 
|  | } |