blob: eb5e3700c24408f6769f3110b16984c5b2abaa7a [file] [log] [blame]
// Copyright 2020 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.sandbox;
import static com.google.common.collect.ImmutableMap.toImmutableMap;
import static com.google.common.truth.Truth.assertThat;
import static java.nio.charset.StandardCharsets.UTF_8;
import static java.util.concurrent.TimeUnit.SECONDS;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSet;
import com.google.common.collect.Iterables;
import com.google.devtools.build.lib.actions.ActionInput;
import com.google.devtools.build.lib.actions.CommandLines.ParamFileActionInput;
import com.google.devtools.build.lib.actions.ParameterFile.ParameterFileType;
import com.google.devtools.build.lib.actions.cache.VirtualActionInput;
import com.google.devtools.build.lib.actions.util.ActionsTestUtil;
import com.google.devtools.build.lib.exec.BinTools;
import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxInputs;
import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxOutputs;
import com.google.devtools.build.lib.testutil.Scratch;
import com.google.devtools.build.lib.testutil.TestUtils;
import com.google.devtools.build.lib.vfs.DigestHashFunction;
import com.google.devtools.build.lib.vfs.Dirent;
import com.google.devtools.build.lib.vfs.FileSystem;
import com.google.devtools.build.lib.vfs.FileSystemUtils;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.PathFragment;
import com.google.devtools.build.lib.vfs.Root;
import com.google.devtools.build.lib.vfs.RootedPath;
import com.google.devtools.build.lib.vfs.Symlinks;
import com.google.devtools.build.lib.vfs.inmemoryfs.InMemoryFileSystem;
import java.io.IOException;
import java.util.Arrays;
import java.util.LinkedHashSet;
import java.util.Set;
import java.util.concurrent.BrokenBarrierException;
import java.util.concurrent.CyclicBarrier;
import java.util.concurrent.ExecutorService;
import java.util.concurrent.Executors;
import java.util.concurrent.Future;
import java.util.concurrent.Semaphore;
import java.util.function.Function;
import javax.annotation.Nullable;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
/** Tests for {@link SandboxHelpers}. */
@RunWith(JUnit4.class)
public class SandboxHelpersTest {
private final Scratch scratch = new Scratch();
private Path execRootPath;
private Root execRoot;
@Nullable private ExecutorService executorToCleanup;
@Before
public void createExecRoot() throws IOException {
execRootPath = scratch.dir("/execRoot");
execRoot = Root.fromPath(execRootPath);
}
@After
public void shutdownExecutor() throws InterruptedException {
if (executorToCleanup == null) {
return;
}
executorToCleanup.shutdown();
executorToCleanup.awaitTermination(TestUtils.WAIT_TIMEOUT_SECONDS, SECONDS);
}
private RootedPath execRootedPath(String execPath) {
return RootedPath.toRootedPath(execRoot, PathFragment.create(execPath));
}
@Test
public void processInputFiles_materializesParamFile() throws Exception {
SandboxHelpers sandboxHelpers = new SandboxHelpers();
ParamFileActionInput paramFile =
new ParamFileActionInput(
PathFragment.create("paramFile"),
ImmutableList.of("-a", "-b"),
ParameterFileType.UNQUOTED,
UTF_8);
SandboxInputs inputs =
sandboxHelpers.processInputFiles(inputMap(paramFile), execRootPath, execRootPath, null);
assertThat(inputs.getFiles())
.containsExactly(PathFragment.create("paramFile"), execRootedPath("paramFile"));
assertThat(inputs.getSymlinks()).isEmpty();
assertThat(FileSystemUtils.readLines(execRootPath.getChild("paramFile"), UTF_8))
.containsExactly("-a", "-b")
.inOrder();
assertThat(execRootPath.getChild("paramFile").isExecutable()).isTrue();
}
@Test
public void processInputFiles_materializesBinToolsFile() throws Exception {
SandboxHelpers sandboxHelpers = new SandboxHelpers();
BinTools.PathActionInput tool =
new BinTools.PathActionInput(
scratch.file("tool", "#!/bin/bash", "echo hello"),
PathFragment.create("_bin/say_hello"));
SandboxInputs inputs =
sandboxHelpers.processInputFiles(inputMap(tool), execRootPath, execRootPath, null);
assertThat(inputs.getFiles())
.containsExactly(PathFragment.create("_bin/say_hello"), execRootedPath("_bin/say_hello"));
assertThat(inputs.getSymlinks()).isEmpty();
assertThat(FileSystemUtils.readLines(execRootPath.getRelative("_bin/say_hello"), UTF_8))
.containsExactly("#!/bin/bash", "echo hello")
.inOrder();
assertThat(execRootPath.getRelative("_bin/say_hello").isExecutable()).isTrue();
}
/**
* Test simulating a scenario when 2 parallel writes of the same virtual input both complete write
* of the temp file and then proceed with post-processing steps one-by-one.
*/
@Test
public void sandboxInputMaterializeVirtualInput_parallelWritesForSameInput_writesCorrectFile()
throws Exception {
VirtualActionInput input = ActionsTestUtil.createVirtualActionInput("file", "hello");
executorToCleanup = Executors.newSingleThreadExecutor();
CyclicBarrier bothWroteTempFile = new CyclicBarrier(2);
Semaphore finishProcessingSemaphore = new Semaphore(1);
FileSystem customFs =
new InMemoryFileSystem(DigestHashFunction.SHA1) {
@Override
@SuppressWarnings("UnsynchronizedOverridesSynchronized") // .await() inside
protected void setExecutable(PathFragment path, boolean executable) throws IOException {
try {
bothWroteTempFile.await();
finishProcessingSemaphore.acquire();
} catch (BrokenBarrierException | InterruptedException e) {
throw new IllegalArgumentException(e);
}
super.setExecutable(path, executable);
}
};
Scratch customScratch = new Scratch(customFs);
Path customExecRoot = customScratch.dir("/execroot");
SandboxHelpers sandboxHelpers = new SandboxHelpers();
Future<?> future =
executorToCleanup.submit(
() -> {
try {
var unused =
sandboxHelpers.processInputFiles(
inputMap(input), customExecRoot, customExecRoot, null);
finishProcessingSemaphore.release();
} catch (IOException e) {
throw new IllegalArgumentException(e);
}
});
var unused =
sandboxHelpers.processInputFiles(inputMap(input), customExecRoot, customExecRoot, null);
finishProcessingSemaphore.release();
future.get();
assertThat(customExecRoot.readdir(Symlinks.NOFOLLOW))
.containsExactly(new Dirent("file", Dirent.Type.FILE));
Path outputFile = customExecRoot.getChild("file");
assertThat(FileSystemUtils.readLines(outputFile, UTF_8)).containsExactly("hello");
assertThat(outputFile.isExecutable()).isTrue();
}
private static ImmutableMap<PathFragment, ActionInput> inputMap(ActionInput... inputs) {
return Arrays.stream(inputs)
.collect(toImmutableMap(ActionInput::getExecPath, Function.identity()));
}
@Test
public void atomicallyWriteVirtualInput_writesParamFile() throws Exception {
ParamFileActionInput paramFile =
new ParamFileActionInput(
PathFragment.create("paramFile"),
ImmutableList.of("-a", "-b"),
ParameterFileType.UNQUOTED,
UTF_8);
SandboxHelpers.atomicallyWriteVirtualInput(
paramFile, scratch.resolve("/outputs/paramFile"), "-1234");
assertThat(scratch.resolve("/outputs").readdir(Symlinks.NOFOLLOW))
.containsExactly(new Dirent("paramFile", Dirent.Type.FILE));
Path outputFile = scratch.resolve("/outputs/paramFile");
assertThat(FileSystemUtils.readLines(outputFile, UTF_8)).containsExactly("-a", "-b").inOrder();
assertThat(outputFile.isExecutable()).isTrue();
}
@Test
public void atomicallyWriteVirtualInput_writesBinToolsFile() throws Exception {
BinTools.PathActionInput tool =
new BinTools.PathActionInput(
scratch.file("tool", "tool_code"), PathFragment.create("tools/tool"));
SandboxHelpers.atomicallyWriteVirtualInput(tool, scratch.resolve("/outputs/tool"), "-1234");
assertThat(scratch.resolve("/outputs").readdir(Symlinks.NOFOLLOW))
.containsExactly(new Dirent("tool", Dirent.Type.FILE));
Path outputFile = scratch.resolve("/outputs/tool");
assertThat(FileSystemUtils.readLines(outputFile, UTF_8)).containsExactly("tool_code");
assertThat(outputFile.isExecutable()).isTrue();
}
@Test
public void atomicallyWriteVirtualInput_writesArbitraryVirtualInput() throws Exception {
VirtualActionInput input = ActionsTestUtil.createVirtualActionInput("file", "hello");
SandboxHelpers.atomicallyWriteVirtualInput(input, scratch.resolve("/outputs/file"), "-1234");
assertThat(scratch.resolve("/outputs").readdir(Symlinks.NOFOLLOW))
.containsExactly(new Dirent("file", Dirent.Type.FILE));
Path outputFile = scratch.resolve("/outputs/file");
assertThat(FileSystemUtils.readLines(outputFile, UTF_8)).containsExactly("hello");
assertThat(outputFile.isExecutable()).isTrue();
}
@Test
public void cleanExisting_updatesDirs() throws IOException {
RootedPath inputTxt =
RootedPath.toRootedPath(
Root.fromPath(scratch.getFileSystem().getPath("/")), PathFragment.create("hello.txt"));
Path rootDir = execRootPath.getParentDirectory();
PathFragment input1 = PathFragment.create("existing/directory/with/input1.txt");
PathFragment input2 = PathFragment.create("partial/directory/input2.txt");
PathFragment input3 = PathFragment.create("new/directory/input3.txt");
SandboxInputs inputs =
new SandboxInputs(
ImmutableMap.of(input1, inputTxt, input2, inputTxt, input3, inputTxt),
ImmutableMap.of(),
ImmutableMap.of(),
ImmutableMap.of());
Set<PathFragment> inputsToCreate = new LinkedHashSet<>();
LinkedHashSet<PathFragment> dirsToCreate = new LinkedHashSet<>();
SandboxHelpers.populateInputsAndDirsToCreate(
ImmutableSet.of(),
inputsToCreate,
dirsToCreate,
Iterables.concat(
ImmutableSet.of(), inputs.getFiles().keySet(), inputs.getSymlinks().keySet()),
SandboxOutputs.create(
ImmutableSet.of(PathFragment.create("out/dir/output.txt")), ImmutableSet.of())
.files(),
SandboxOutputs.create(
ImmutableSet.of(PathFragment.create("out/dir/output.txt")), ImmutableSet.of())
.dirs());
PathFragment inputDir1 = input1.getParentDirectory();
PathFragment inputDir2 = input2.getParentDirectory();
PathFragment inputDir3 = input3.getParentDirectory();
PathFragment outputDir = PathFragment.create("out/dir");
assertThat(dirsToCreate).containsExactly(inputDir1, inputDir2, inputDir3, outputDir);
assertThat(inputsToCreate).containsExactly(input1, input2, input3);
// inputdir1 exists fully
execRootPath.getRelative(inputDir1).createDirectoryAndParents();
// inputdir2 exists partially, should be kept nonetheless.
execRootPath
.getRelative(inputDir2)
.getParentDirectory()
.getRelative("doomedSubdir")
.createDirectoryAndParents();
// inputDir3 just doesn't exist
// outputDir only exists partially
execRootPath.getRelative(outputDir).getParentDirectory().createDirectoryAndParents();
execRootPath.getRelative("justSomeDir/thatIsDoomed").createDirectoryAndParents();
SandboxHelpers.cleanExisting(rootDir, inputs, inputsToCreate, dirsToCreate, execRootPath);
assertThat(dirsToCreate).containsExactly(inputDir2, inputDir3, outputDir);
assertThat(execRootPath.getRelative("existing/directory/with").exists()).isTrue();
assertThat(execRootPath.getRelative("partial").exists()).isTrue();
assertThat(execRootPath.getRelative("partial/doomedSubdir").exists()).isFalse();
assertThat(execRootPath.getRelative("partial/directory").exists()).isFalse();
assertThat(execRootPath.getRelative("justSomeDir/thatIsDoomed").exists()).isFalse();
assertThat(execRootPath.getRelative("out").exists()).isTrue();
assertThat(execRootPath.getRelative("out/dir").exists()).isFalse();
}
}