blob: 1d6271925fdae5e1fa32e847ca34a8fd57b5dd69 [file] [log] [blame]
// Copyright 2016 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.sandbox;
import com.google.devtools.build.lib.runtime.CommandEnvironment;
import com.google.devtools.build.lib.shell.Command;
import com.google.devtools.build.lib.util.OsUtils;
import com.google.devtools.build.lib.vfs.Path;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
/**
* This runner runs process-wrapper inside a sandboxed execution root, which should work on most
* platforms and gives at least some isolation between running actions.
*/
final class ProcessWrapperRunner extends SandboxRunner {
private static final String PROCESS_WRAPPER = "process-wrapper" + OsUtils.executableExtension();
private final Path execRoot;
private final Path sandboxExecRoot;
ProcessWrapperRunner(Path execRoot, Path sandboxExecRoot, boolean verboseFailures) {
super(verboseFailures);
this.execRoot = execRoot;
this.sandboxExecRoot = sandboxExecRoot;
}
static boolean isSupported(CommandEnvironment commandEnv) {
// We can only use this runner, if the process-wrapper exists in the embedded tools.
// This might not always be the case, e.g. while bootstrapping.
return commandEnv.getBlazeWorkspace().getBinTools().getExecPath(PROCESS_WRAPPER) != null;
}
@Override
protected Command getCommand(
List<String> spawnArguments,
Map<String, String> env,
int timeout,
boolean allowNetwork,
boolean useFakeHostname,
boolean useFakeUsername) {
List<String> commandLineArgs = new ArrayList<>(5 + spawnArguments.size());
commandLineArgs.add(execRoot.getRelative("_bin/process-wrapper").getPathString());
commandLineArgs.add(Integer.toString(timeout));
commandLineArgs.add("5"); /* kill delay: give some time to print stacktraces and whatnot. */
commandLineArgs.add("-"); /* stdout. */
commandLineArgs.add("-"); /* stderr. */
commandLineArgs.addAll(spawnArguments);
return new Command(commandLineArgs.toArray(new String[0]), env, sandboxExecRoot.getPathFile());
}
}