blob: c1aca957e050e7401f53ef891a36993801a90f64 [file] [log] [blame]
Artur Satayev849f8442020-04-28 14:57:42 +01001/*
2 * Copyright (C) 2020 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package apex
18
19import (
Artur Satayeva4405fa2020-05-14 15:15:01 +010020 "github.com/google/blueprint"
Artur Satayev9af168d2020-06-24 10:17:19 +000021
22 "android/soong/android"
Artur Satayev849f8442020-04-28 14:57:42 +010023)
24
25func init() {
26 android.RegisterSingletonType("apex_depsinfo_singleton", apexDepsInfoSingletonFactory)
27}
28
29type apexDepsInfoSingleton struct {
Artur Satayev019560f2020-07-02 11:51:47 +000030 allowedApexDepsInfoCheckResult android.OutputPath
Artur Satayev849f8442020-04-28 14:57:42 +010031}
32
33func apexDepsInfoSingletonFactory() android.Singleton {
34 return &apexDepsInfoSingleton{}
35}
36
Artur Satayev019560f2020-07-02 11:51:47 +000037var (
38 // Generate new apex allowed_deps.txt by merging all internal dependencies.
39 generateApexDepsInfoFilesRule = pctx.AndroidStaticRule("generateApexDepsInfoFilesRule", blueprint.RuleParams{
40 Command: "cat $out.rsp | xargs cat" +
41 // Only track non-external dependencies, i.e. those that end up in the binary
42 " | grep -v '(external)'" +
43 // Ignore comments in any of the files
44 " | grep -v '^#'" +
45 " | sort -u -f >$out",
Artur Satayev849f8442020-04-28 14:57:42 +010046 Rspfile: "$out.rsp",
47 RspfileContent: "$in",
Artur Satayev019560f2020-07-02 11:51:47 +000048 })
49
50 // Diff two given lists while ignoring comments in the allowed deps file.
51 diffAllowedApexDepsInfoRule = pctx.AndroidStaticRule("diffAllowedApexDepsInfoRule", blueprint.RuleParams{
52 Description: "Diff ${allowed_deps} and ${new_allowed_deps}",
53 Command: `
54 if grep -v '^#' ${allowed_deps} | diff -B - ${new_allowed_deps}; then
55 touch ${out};
56 else
57 echo -e "\n******************************";
58 echo "ERROR: go/apex-allowed-deps-error";
59 echo "******************************";
60 echo "Detected changes to allowed dependencies in updatable modules.";
61 echo "To fix and update build/soong/apex/allowed_deps.txt, please run:";
62 echo "$$ (croot && build/soong/scripts/update-apex-allowed-deps.sh)";
63 echo "Members of mainline-modularization@google.com will review the changes.";
64 echo -e "******************************\n";
65 exit 1;
66 fi;
67 `,
68 }, "allowed_deps", "new_allowed_deps")
Artur Satayev849f8442020-04-28 14:57:42 +010069)
70
71func (s *apexDepsInfoSingleton) GenerateBuildActions(ctx android.SingletonContext) {
Artur Satayev9af168d2020-06-24 10:17:19 +000072 updatableFlatLists := android.Paths{}
Artur Satayev849f8442020-04-28 14:57:42 +010073 ctx.VisitAllModules(func(module android.Module) {
74 if binaryInfo, ok := module.(android.ApexBundleDepsInfoIntf); ok {
Colin Cross56a83212020-09-15 18:30:11 -070075 apexInfo := ctx.ModuleProvider(module, android.ApexInfoProvider).(android.ApexInfo)
76 if path := binaryInfo.FlatListPath(); path != nil {
77 if binaryInfo.Updatable() || apexInfo.Updatable {
78 updatableFlatLists = append(updatableFlatLists, path)
79 }
Artur Satayev849f8442020-04-28 14:57:42 +010080 }
81 }
82 })
83
Artur Satayev019560f2020-07-02 11:51:47 +000084 allowedDeps := android.ExistentPathForSource(ctx, "build/soong/apex/allowed_deps.txt").Path()
85
86 newAllowedDeps := android.PathForOutput(ctx, "apex", "depsinfo", "new-allowed-deps.txt")
Artur Satayev849f8442020-04-28 14:57:42 +010087 ctx.Build(pctx, android.BuildParams{
Artur Satayev019560f2020-07-02 11:51:47 +000088 Rule: generateApexDepsInfoFilesRule,
89 Inputs: append(updatableFlatLists, allowedDeps),
90 Output: newAllowedDeps,
Artur Satayev849f8442020-04-28 14:57:42 +010091 })
Artur Satayev019560f2020-07-02 11:51:47 +000092
93 s.allowedApexDepsInfoCheckResult = android.PathForOutput(ctx, newAllowedDeps.Rel()+".check")
94 ctx.Build(pctx, android.BuildParams{
95 Rule: diffAllowedApexDepsInfoRule,
96 Input: newAllowedDeps,
97 Output: s.allowedApexDepsInfoCheckResult,
98 Args: map[string]string{
99 "allowed_deps": allowedDeps.String(),
100 "new_allowed_deps": newAllowedDeps.String(),
101 },
102 })
Artur Satayev01aa11e2020-07-30 18:26:28 +0100103
104 ctx.Phony("apex-allowed-deps-check", s.allowedApexDepsInfoCheckResult)
Artur Satayev019560f2020-07-02 11:51:47 +0000105}
106
107func (s *apexDepsInfoSingleton) MakeVars(ctx android.MakeVarsContext) {
108 // Export check result to Make. The path is added to droidcore.
109 ctx.Strict("APEX_ALLOWED_DEPS_CHECK", s.allowedApexDepsInfoCheckResult.String())
Artur Satayev849f8442020-04-28 14:57:42 +0100110}