|  | // Copyright 2017 Google Inc. All rights reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | package build | 
|  |  | 
|  | import ( | 
|  | "fmt" | 
|  | "io/ioutil" | 
|  | "os" | 
|  | "path/filepath" | 
|  | "sync" | 
|  | "text/template" | 
|  | "time" | 
|  |  | 
|  | "android/soong/ui/metrics" | 
|  | ) | 
|  |  | 
|  | // SetupOutDir ensures the out directory exists, and has the proper files to | 
|  | // prevent kati from recursing into it. | 
|  | func SetupOutDir(ctx Context, config Config) { | 
|  | ensureEmptyFileExists(ctx, filepath.Join(config.OutDir(), "Android.mk")) | 
|  | ensureEmptyFileExists(ctx, filepath.Join(config.OutDir(), "CleanSpec.mk")) | 
|  | ensureEmptyDirectoriesExist(ctx, config.TempDir()) | 
|  |  | 
|  | // Potentially write a marker file for whether kati is enabled. This is used by soong_build to | 
|  | // potentially run the AndroidMk singleton and postinstall commands. | 
|  | // Note that the absence of the  file does not not preclude running Kati for product | 
|  | // configuration purposes. | 
|  | katiEnabledMarker := filepath.Join(config.SoongOutDir(), ".soong.kati_enabled") | 
|  | if config.SkipKatiNinja() { | 
|  | os.Remove(katiEnabledMarker) | 
|  | // Note that we can not remove the file for SkipKati builds yet -- some continuous builds | 
|  | // --skip-make builds rely on kati targets being defined. | 
|  | } else if !config.SkipKati() { | 
|  | ensureEmptyFileExists(ctx, katiEnabledMarker) | 
|  | } | 
|  |  | 
|  | // The ninja_build file is used by our buildbots to understand that the output | 
|  | // can be parsed as ninja output. | 
|  | ensureEmptyFileExists(ctx, filepath.Join(config.OutDir(), "ninja_build")) | 
|  | ensureEmptyFileExists(ctx, filepath.Join(config.OutDir(), ".out-dir")) | 
|  |  | 
|  | if buildDateTimeFile, ok := config.environ.Get("BUILD_DATETIME_FILE"); ok { | 
|  | err := ioutil.WriteFile(buildDateTimeFile, []byte(config.buildDateTime), 0666) // a+rw | 
|  | if err != nil { | 
|  | ctx.Fatalln("Failed to write BUILD_DATETIME to file:", err) | 
|  | } | 
|  | } else { | 
|  | ctx.Fatalln("Missing BUILD_DATETIME_FILE") | 
|  | } | 
|  |  | 
|  | // BUILD_NUMBER should be set to the source control value that | 
|  | // represents the current state of the source code.  E.g., a | 
|  | // perforce changelist number or a git hash.  Can be an arbitrary string | 
|  | // (to allow for source control that uses something other than numbers), | 
|  | // but must be a single word and a valid file name. | 
|  | // | 
|  | // If no BUILD_NUMBER is set, create a useful "I am an engineering build | 
|  | // from this date/time" value.  Make it start with a non-digit so that | 
|  | // anyone trying to parse it as an integer will probably get "0". | 
|  | buildNumber, ok := config.environ.Get("BUILD_NUMBER") | 
|  | if ok { | 
|  | writeValueIfChanged(ctx, config, config.OutDir(), "file_name_tag.txt", buildNumber) | 
|  | } else { | 
|  | var username string | 
|  | if username, ok = config.environ.Get("BUILD_USERNAME"); !ok { | 
|  | ctx.Fatalln("Missing BUILD_USERNAME") | 
|  | } | 
|  | buildNumber = fmt.Sprintf("eng.%.6s.%s", username, time.Now().Format("20060102.150405" /* YYYYMMDD.HHMMSS */)) | 
|  | writeValueIfChanged(ctx, config, config.OutDir(), "file_name_tag.txt", username) | 
|  | } | 
|  | // Write the build number to a file so it can be read back in | 
|  | // without changing the command line every time.  Avoids rebuilds | 
|  | // when using ninja. | 
|  | writeValueIfChanged(ctx, config, config.SoongOutDir(), "build_number.txt", buildNumber) | 
|  | } | 
|  |  | 
|  | var combinedBuildNinjaTemplate = template.Must(template.New("combined").Parse(` | 
|  | builddir = {{.OutDir}} | 
|  | {{if .UseRemoteBuild }}pool local_pool | 
|  | depth = {{.Parallel}} | 
|  | {{end -}} | 
|  | pool highmem_pool | 
|  | depth = {{.HighmemParallel}} | 
|  | {{if and (not .SkipKatiNinja) .HasKatiSuffix}}subninja {{.KatiBuildNinjaFile}} | 
|  | subninja {{.KatiPackageNinjaFile}} | 
|  | {{end -}} | 
|  | subninja {{.SoongNinjaFile}} | 
|  | `)) | 
|  |  | 
|  | func createCombinedBuildNinjaFile(ctx Context, config Config) { | 
|  | // If we're in SkipKati mode but want to run kati ninja, skip creating this file if it already exists | 
|  | if config.SkipKati() && !config.SkipKatiNinja() { | 
|  | if _, err := os.Stat(config.CombinedNinjaFile()); err == nil || !os.IsNotExist(err) { | 
|  | return | 
|  | } | 
|  | } | 
|  |  | 
|  | file, err := os.Create(config.CombinedNinjaFile()) | 
|  | if err != nil { | 
|  | ctx.Fatalln("Failed to create combined ninja file:", err) | 
|  | } | 
|  | defer file.Close() | 
|  |  | 
|  | if err := combinedBuildNinjaTemplate.Execute(file, config); err != nil { | 
|  | ctx.Fatalln("Failed to write combined ninja file:", err) | 
|  | } | 
|  | } | 
|  |  | 
|  | // These are bitmasks which can be used to check whether various flags are set | 
|  | const ( | 
|  | _ = iota | 
|  | // Whether to run the kati config step. | 
|  | RunProductConfig = 1 << iota | 
|  | // Whether to run soong to generate a ninja file. | 
|  | RunSoong = 1 << iota | 
|  | // Whether to run kati to generate a ninja file. | 
|  | RunKati = 1 << iota | 
|  | // Whether to include the kati-generated ninja file in the combined ninja. | 
|  | RunKatiNinja = 1 << iota | 
|  | // Whether to run ninja on the combined ninja. | 
|  | RunNinja       = 1 << iota | 
|  | RunDistActions = 1 << iota | 
|  | RunBuildTests  = 1 << iota | 
|  | ) | 
|  |  | 
|  | // checkBazelMode fails the build if there are conflicting arguments for which bazel | 
|  | // build mode to use. | 
|  | func checkBazelMode(ctx Context, config Config) { | 
|  | count := 0 | 
|  | if config.bazelProdMode { | 
|  | count++ | 
|  | } | 
|  | if config.bazelStagingMode { | 
|  | count++ | 
|  | } | 
|  | if count > 1 { | 
|  | ctx.Fatalln("Conflicting bazel mode.\n" + | 
|  | "Do not specify more than one of --bazel-mode and --bazel-mode-staging ") | 
|  | } | 
|  | } | 
|  |  | 
|  | // checkProblematicFiles fails the build if existing Android.mk or CleanSpec.mk files are found at the root of the tree. | 
|  | func checkProblematicFiles(ctx Context) { | 
|  | files := []string{"Android.mk", "CleanSpec.mk"} | 
|  | for _, file := range files { | 
|  | if _, err := os.Stat(file); !os.IsNotExist(err) { | 
|  | absolute := absPath(ctx, file) | 
|  | ctx.Printf("Found %s in tree root. This file needs to be removed to build.\n", file) | 
|  | ctx.Fatalf("    rm %s\n", absolute) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // checkCaseSensitivity issues a warning if a case-insensitive file system is being used. | 
|  | func checkCaseSensitivity(ctx Context, config Config) { | 
|  | outDir := config.OutDir() | 
|  | lowerCase := filepath.Join(outDir, "casecheck.txt") | 
|  | upperCase := filepath.Join(outDir, "CaseCheck.txt") | 
|  | lowerData := "a" | 
|  | upperData := "B" | 
|  |  | 
|  | if err := ioutil.WriteFile(lowerCase, []byte(lowerData), 0666); err != nil { // a+rw | 
|  | ctx.Fatalln("Failed to check case sensitivity:", err) | 
|  | } | 
|  |  | 
|  | if err := ioutil.WriteFile(upperCase, []byte(upperData), 0666); err != nil { // a+rw | 
|  | ctx.Fatalln("Failed to check case sensitivity:", err) | 
|  | } | 
|  |  | 
|  | res, err := ioutil.ReadFile(lowerCase) | 
|  | if err != nil { | 
|  | ctx.Fatalln("Failed to check case sensitivity:", err) | 
|  | } | 
|  |  | 
|  | if string(res) != lowerData { | 
|  | ctx.Println("************************************************************") | 
|  | ctx.Println("You are building on a case-insensitive filesystem.") | 
|  | ctx.Println("Please move your source tree to a case-sensitive filesystem.") | 
|  | ctx.Println("************************************************************") | 
|  | ctx.Fatalln("Case-insensitive filesystems not supported") | 
|  | } | 
|  | } | 
|  |  | 
|  | // help prints a help/usage message, via the build/make/help.sh script. | 
|  | func help(ctx Context, config Config) { | 
|  | cmd := Command(ctx, config, "help.sh", "build/make/help.sh") | 
|  | cmd.Sandbox = dumpvarsSandbox | 
|  | cmd.RunAndPrintOrFatal() | 
|  | } | 
|  |  | 
|  | // checkRAM warns if there probably isn't enough RAM to complete a build. | 
|  | func checkRAM(ctx Context, config Config) { | 
|  | if totalRAM := config.TotalRAM(); totalRAM != 0 { | 
|  | ram := float32(totalRAM) / (1024 * 1024 * 1024) | 
|  | ctx.Verbosef("Total RAM: %.3vGB", ram) | 
|  |  | 
|  | if ram <= 16 { | 
|  | ctx.Println("************************************************************") | 
|  | ctx.Printf("You are building on a machine with %.3vGB of RAM\n", ram) | 
|  | ctx.Println("") | 
|  | ctx.Println("The minimum required amount of free memory is around 16GB,") | 
|  | ctx.Println("and even with that, some configurations may not work.") | 
|  | ctx.Println("") | 
|  | ctx.Println("If you run into segfaults or other errors, try reducing your") | 
|  | ctx.Println("-j value.") | 
|  | ctx.Println("************************************************************") | 
|  | } else if ram <= float32(config.Parallel()) { | 
|  | // Want at least 1GB of RAM per job. | 
|  | ctx.Printf("Warning: high -j%d count compared to %.3vGB of RAM", config.Parallel(), ram) | 
|  | ctx.Println("If you run into segfaults or other errors, try a lower -j value") | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // Build the tree. Various flags in `config` govern which components of | 
|  | // the build to run. | 
|  | func Build(ctx Context, config Config) { | 
|  | ctx.Verboseln("Starting build with args:", config.Arguments()) | 
|  | ctx.Verboseln("Environment:", config.Environment().Environ()) | 
|  |  | 
|  | ctx.BeginTrace(metrics.Total, "total") | 
|  | defer ctx.EndTrace() | 
|  |  | 
|  | if inList("help", config.Arguments()) { | 
|  | help(ctx, config) | 
|  | return | 
|  | } | 
|  |  | 
|  | // Make sure that no other Soong process is running with the same output directory | 
|  | buildLock := BecomeSingletonOrFail(ctx, config) | 
|  | defer buildLock.Unlock() | 
|  |  | 
|  | logArgsOtherThan := func(specialTargets ...string) { | 
|  | var ignored []string | 
|  | for _, a := range config.Arguments() { | 
|  | if !inList(a, specialTargets) { | 
|  | ignored = append(ignored, a) | 
|  | } | 
|  | } | 
|  | if len(ignored) > 0 { | 
|  | ctx.Printf("ignoring arguments %q", ignored) | 
|  | } | 
|  | } | 
|  |  | 
|  | if inList("clean", config.Arguments()) || inList("clobber", config.Arguments()) { | 
|  | logArgsOtherThan("clean", "clobber") | 
|  | clean(ctx, config) | 
|  | return | 
|  | } | 
|  |  | 
|  | defer waitForDist(ctx) | 
|  |  | 
|  | checkBazelMode(ctx, config) | 
|  |  | 
|  | // checkProblematicFiles aborts the build if Android.mk or CleanSpec.mk are found at the root of the tree. | 
|  | checkProblematicFiles(ctx) | 
|  |  | 
|  | checkRAM(ctx, config) | 
|  |  | 
|  | SetupOutDir(ctx, config) | 
|  |  | 
|  | // checkCaseSensitivity issues a warning if a case-insensitive file system is being used. | 
|  | checkCaseSensitivity(ctx, config) | 
|  |  | 
|  | SetupPath(ctx, config) | 
|  |  | 
|  | what := evaluateWhatToRun(config, ctx.Verboseln) | 
|  |  | 
|  | if config.StartGoma() { | 
|  | startGoma(ctx, config) | 
|  | } | 
|  |  | 
|  | rbeCh := make(chan bool) | 
|  | if config.StartRBE() { | 
|  | cleanupRBELogsDir(ctx, config) | 
|  | go func() { | 
|  | startRBE(ctx, config) | 
|  | close(rbeCh) | 
|  | }() | 
|  | defer DumpRBEMetrics(ctx, config, filepath.Join(config.LogsDir(), "rbe_metrics.pb")) | 
|  | } else { | 
|  | close(rbeCh) | 
|  | } | 
|  |  | 
|  | if what&RunProductConfig != 0 { | 
|  | runMakeProductConfig(ctx, config) | 
|  | } | 
|  |  | 
|  | // Everything below here depends on product config. | 
|  |  | 
|  | if inList("installclean", config.Arguments()) || | 
|  | inList("install-clean", config.Arguments()) { | 
|  | logArgsOtherThan("installclean", "install-clean") | 
|  | installClean(ctx, config) | 
|  | ctx.Println("Deleted images and staging directories.") | 
|  | return | 
|  | } | 
|  |  | 
|  | if inList("dataclean", config.Arguments()) || | 
|  | inList("data-clean", config.Arguments()) { | 
|  | logArgsOtherThan("dataclean", "data-clean") | 
|  | dataClean(ctx, config) | 
|  | ctx.Println("Deleted data files.") | 
|  | return | 
|  | } | 
|  |  | 
|  | if what&RunSoong != 0 { | 
|  | runSoong(ctx, config) | 
|  | } | 
|  |  | 
|  | if what&RunKati != 0 { | 
|  | genKatiSuffix(ctx, config) | 
|  | runKatiCleanSpec(ctx, config) | 
|  | runKatiBuild(ctx, config) | 
|  | runKatiPackage(ctx, config) | 
|  |  | 
|  | ioutil.WriteFile(config.LastKatiSuffixFile(), []byte(config.KatiSuffix()), 0666) // a+rw | 
|  | } else if what&RunKatiNinja != 0 { | 
|  | // Load last Kati Suffix if it exists | 
|  | if katiSuffix, err := ioutil.ReadFile(config.LastKatiSuffixFile()); err == nil { | 
|  | ctx.Verboseln("Loaded previous kati config:", string(katiSuffix)) | 
|  | config.SetKatiSuffix(string(katiSuffix)) | 
|  | } | 
|  | } | 
|  |  | 
|  | // Write combined ninja file | 
|  | createCombinedBuildNinjaFile(ctx, config) | 
|  |  | 
|  | distGzipFile(ctx, config, config.CombinedNinjaFile()) | 
|  |  | 
|  | if what&RunBuildTests != 0 { | 
|  | testForDanglingRules(ctx, config) | 
|  | } | 
|  |  | 
|  | <-rbeCh | 
|  | if what&RunNinja != 0 { | 
|  | if what&RunKati != 0 { | 
|  | installCleanIfNecessary(ctx, config) | 
|  | } | 
|  | runNinjaForBuild(ctx, config) | 
|  | } | 
|  |  | 
|  | if what&RunDistActions != 0 { | 
|  | runDistActions(ctx, config) | 
|  | } | 
|  | } | 
|  |  | 
|  | func evaluateWhatToRun(config Config, verboseln func(v ...interface{})) int { | 
|  | //evaluate what to run | 
|  | what := 0 | 
|  | if config.Checkbuild() { | 
|  | what |= RunBuildTests | 
|  | } | 
|  | if !config.SkipConfig() { | 
|  | what |= RunProductConfig | 
|  | } else { | 
|  | verboseln("Skipping Config as requested") | 
|  | } | 
|  | if !config.SkipSoong() { | 
|  | what |= RunSoong | 
|  | } else { | 
|  | verboseln("Skipping use of Soong as requested") | 
|  | } | 
|  | if !config.SkipKati() { | 
|  | what |= RunKati | 
|  | } else { | 
|  | verboseln("Skipping Kati as requested") | 
|  | } | 
|  | if !config.SkipKatiNinja() { | 
|  | what |= RunKatiNinja | 
|  | } else { | 
|  | verboseln("Skipping use of Kati ninja as requested") | 
|  | } | 
|  | if !config.SkipNinja() { | 
|  | what |= RunNinja | 
|  | } else { | 
|  | verboseln("Skipping Ninja as requested") | 
|  | } | 
|  |  | 
|  | if !config.SoongBuildInvocationNeeded() { | 
|  | // This means that the output of soong_build is not needed and thus it would | 
|  | // run unnecessarily. In addition, if this code wasn't there invocations | 
|  | // with only special-cased target names like "m bp2build" would result in | 
|  | // passing Ninja the empty target list and it would then build the default | 
|  | // targets which is not what the user asked for. | 
|  | what = what &^ RunNinja | 
|  | what = what &^ RunKati | 
|  | } | 
|  |  | 
|  | if config.Dist() { | 
|  | what |= RunDistActions | 
|  | } | 
|  |  | 
|  | return what | 
|  | } | 
|  |  | 
|  | var distWaitGroup sync.WaitGroup | 
|  |  | 
|  | // waitForDist waits for all backgrounded distGzipFile and distFile writes to finish | 
|  | func waitForDist(ctx Context) { | 
|  | ctx.BeginTrace("soong_ui", "dist") | 
|  | defer ctx.EndTrace() | 
|  |  | 
|  | distWaitGroup.Wait() | 
|  | } | 
|  |  | 
|  | // distGzipFile writes a compressed copy of src to the distDir if dist is enabled.  Failures | 
|  | // are printed but non-fatal. Uses the distWaitGroup func for backgrounding (optimization). | 
|  | func distGzipFile(ctx Context, config Config, src string, subDirs ...string) { | 
|  | if !config.Dist() { | 
|  | return | 
|  | } | 
|  |  | 
|  | subDir := filepath.Join(subDirs...) | 
|  | destDir := filepath.Join(config.RealDistDir(), "soong_ui", subDir) | 
|  |  | 
|  | if err := os.MkdirAll(destDir, 0777); err != nil { // a+rwx | 
|  | ctx.Printf("failed to mkdir %s: %s", destDir, err.Error()) | 
|  | } | 
|  |  | 
|  | distWaitGroup.Add(1) | 
|  | go func() { | 
|  | defer distWaitGroup.Done() | 
|  | if err := gzipFileToDir(src, destDir); err != nil { | 
|  | ctx.Printf("failed to dist %s: %s", filepath.Base(src), err.Error()) | 
|  | } | 
|  | }() | 
|  | } | 
|  |  | 
|  | // distFile writes a copy of src to the distDir if dist is enabled.  Failures are printed but | 
|  | // non-fatal. Uses the distWaitGroup func for backgrounding (optimization). | 
|  | func distFile(ctx Context, config Config, src string, subDirs ...string) { | 
|  | if !config.Dist() { | 
|  | return | 
|  | } | 
|  |  | 
|  | subDir := filepath.Join(subDirs...) | 
|  | destDir := filepath.Join(config.RealDistDir(), "soong_ui", subDir) | 
|  |  | 
|  | if err := os.MkdirAll(destDir, 0777); err != nil { // a+rwx | 
|  | ctx.Printf("failed to mkdir %s: %s", destDir, err.Error()) | 
|  | } | 
|  |  | 
|  | distWaitGroup.Add(1) | 
|  | go func() { | 
|  | defer distWaitGroup.Done() | 
|  | if _, err := copyFile(src, filepath.Join(destDir, filepath.Base(src))); err != nil { | 
|  | ctx.Printf("failed to dist %s: %s", filepath.Base(src), err.Error()) | 
|  | } | 
|  | }() | 
|  | } | 
|  |  | 
|  | // Actions to run on every build where 'dist' is in the actions. | 
|  | // Be careful, anything added here slows down EVERY CI build | 
|  | func runDistActions(ctx Context, config Config) { | 
|  | runStagingSnapshot(ctx, config) | 
|  | } |