| // Copyright 2016 The Bazel Authors. All rights reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| package com.google.devtools.build.lib.sandbox; |
| |
| import static com.google.common.base.Strings.isNullOrEmpty; |
| |
| import com.google.common.collect.ImmutableList; |
| import com.google.common.collect.ImmutableMap; |
| import com.google.devtools.build.lib.cmdline.Label; |
| import com.google.devtools.build.lib.exec.TreeDeleter; |
| import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxContents; |
| import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxInputs; |
| import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxOutputs; |
| import com.google.devtools.build.lib.util.CommandDescriptionForm; |
| import com.google.devtools.build.lib.util.CommandFailureUtils; |
| import com.google.devtools.build.lib.vfs.Path; |
| import com.google.devtools.build.lib.vfs.PathFragment; |
| import java.io.IOException; |
| import java.util.Optional; |
| import java.util.Set; |
| import javax.annotation.Nullable; |
| |
| /** |
| * Creates an execRoot for a Spawn that contains input files as symlinks to their original |
| * destination. |
| */ |
| public class SymlinkedSandboxedSpawn extends AbstractContainerizingSandboxedSpawn { |
| |
| /** Mnemonic of the action running in this spawn. */ |
| private final String mnemonic; |
| |
| private final Label targetLabel; |
| |
| @Nullable private final ImmutableList<String> interactiveDebugArguments; |
| |
| public SymlinkedSandboxedSpawn( |
| Path sandboxPath, |
| Path sandboxExecRoot, |
| ImmutableList<String> arguments, |
| ImmutableMap<String, String> environment, |
| SandboxInputs inputs, |
| SandboxOutputs outputs, |
| Set<Path> writableDirs, |
| TreeDeleter treeDeleter, |
| @Nullable Path sandboxDebugPath, |
| @Nullable Path statisticsPath, |
| @Nullable ImmutableList<String> interactiveDebugArguments, |
| String mnemonic, |
| Label targetLabel) { |
| super( |
| sandboxPath, |
| sandboxExecRoot, |
| arguments, |
| environment, |
| inputs, |
| outputs, |
| writableDirs, |
| treeDeleter, |
| sandboxDebugPath, |
| statisticsPath, |
| mnemonic); |
| this.mnemonic = isNullOrEmpty(mnemonic) ? "_NoMnemonic_" : mnemonic; |
| this.interactiveDebugArguments = interactiveDebugArguments; |
| this.targetLabel = targetLabel; |
| } |
| |
| @Override |
| public void filterInputsAndDirsToCreate( |
| Set<PathFragment> inputsToCreate, Set<PathFragment> dirsToCreate) |
| throws IOException, InterruptedException { |
| if (!SandboxStash.gotInstance()) { |
| return; |
| } |
| Optional<SandboxContents> sandboxContents = |
| SandboxStash.takeStashedSandbox( |
| sandboxPath, mnemonic, getEnvironment(), outputs, targetLabel); |
| sandboxExecRoot.createDirectoryAndParents(); |
| |
| if (sandboxContents != null) { |
| // Delete anything unnecessary, and update `inputsToCreate`/`dirsToCreate` if something can |
| // be left without changes (e.g., a, symlink that already points to the right destination). |
| // We're traversing from sandboxExecRoot's parent directory because external repositories can |
| // now be symlinked as siblings of sandboxExecRoot when |
| // --experimental_sibling_repository_layout is set. |
| if (sandboxContents.isPresent()) { |
| SandboxHelpers.cleanExisting( |
| sandboxExecRoot.getParentDirectory(), |
| inputs, |
| inputsToCreate, |
| dirsToCreate, |
| sandboxExecRoot, |
| treeDeleter, |
| sandboxContents.get()); |
| } else { |
| // No in-memory stashes enabled but there is a stash. |
| // When reusing an old sandbox, we do a full traversal of the parent directory of |
| // `sandboxExecRoot`. |
| SandboxHelpers.cleanExisting( |
| sandboxExecRoot.getParentDirectory(), |
| inputs, |
| inputsToCreate, |
| dirsToCreate, |
| sandboxExecRoot, |
| treeDeleter); |
| return; |
| } |
| } |
| |
| if (SandboxStash.useInMemoryStashes()) { |
| SandboxStash.setPathContents( |
| sandboxPath, SandboxHelpers.createContentMap(sandboxExecRoot, inputs, outputs)); |
| } |
| } |
| |
| @Override |
| protected void copyFile(Path source, Path target) throws IOException { |
| target.createSymbolicLink(source); |
| } |
| |
| @Override |
| public void delete() { |
| SandboxStash.stashSandbox( |
| sandboxPath, mnemonic, getEnvironment(), outputs, treeDeleter, targetLabel); |
| super.delete(); |
| } |
| |
| @Nullable |
| @Override |
| public Optional<String> getInteractiveDebugInstructions() { |
| if (interactiveDebugArguments == null) { |
| return Optional.empty(); |
| } |
| return Optional.of( |
| "Run this command to start an interactive shell in an identical sandboxed environment:\n" |
| + CommandFailureUtils.describeCommand( |
| CommandDescriptionForm.COMPLETE, |
| /* prettyPrintArgs= */ false, |
| interactiveDebugArguments, |
| getEnvironment(), |
| /* environmentVariablesToClear= */ null, |
| /* cwd= */ null, |
| /* configurationChecksum= */ null, |
| /* executionPlatformLabel= */ null)); |
| } |
| } |