Default --incompatible_disallow_unsound_directory_outputs to true.
The downstream pipeline didn't detect any breakage.
A few tests need to explicitly set the flag to false, or be rewritten to not rely on directory-producing genrules.
Progress on #18646.
PiperOrigin-RevId: 568852835
Change-Id: Ib7508be7f9c6c9448435145a11149c70fbbfa854
diff --git a/src/main/java/com/google/devtools/build/lib/analysis/config/CoreOptions.java b/src/main/java/com/google/devtools/build/lib/analysis/config/CoreOptions.java
index 3e9d941..5e5754b 100644
--- a/src/main/java/com/google/devtools/build/lib/analysis/config/CoreOptions.java
+++ b/src/main/java/com/google/devtools/build/lib/analysis/config/CoreOptions.java
@@ -174,7 +174,7 @@
@Option(
name = "incompatible_disallow_unsound_directory_outputs",
- defaultValue = "false",
+ defaultValue = "true",
documentationCategory = OptionDocumentationCategory.UNDOCUMENTED,
metadataTags = OptionMetadataTag.INCOMPATIBLE_CHANGE,
effectTags = {OptionEffectTag.BAZEL_INTERNAL_CONFIGURATION},
diff --git a/src/test/java/com/google/devtools/build/lib/buildtool/DirectoryArtifactWarningTest.java b/src/test/java/com/google/devtools/build/lib/buildtool/DirectoryArtifactWarningTest.java
index 0ffb744..3e1d5c0 100644
--- a/src/test/java/com/google/devtools/build/lib/buildtool/DirectoryArtifactWarningTest.java
+++ b/src/test/java/com/google/devtools/build/lib/buildtool/DirectoryArtifactWarningTest.java
@@ -40,6 +40,7 @@
public void testOutputArtifactDirectoryWarning_forGenrule() throws Exception {
setupGenruleWithOutputArtifactDirectory();
+ addOptions("--noincompatible_disallow_unsound_directory_outputs");
buildTarget("//x");
events.assertContainsWarning(
@@ -81,6 +82,7 @@
public void testOutputArtifactDirectoryWarning_forStarlarkRule() throws Exception {
setupStarlarkRuleWithOutputArtifactDirectory();
+ addOptions("--noincompatible_disallow_unsound_directory_outputs");
buildTarget("//x");
events.assertContainsWarning(
diff --git a/src/test/java/com/google/devtools/build/lib/metrics/MetricsCollectorTest.java b/src/test/java/com/google/devtools/build/lib/metrics/MetricsCollectorTest.java
index 14ca0f2..106c926 100644
--- a/src/test/java/com/google/devtools/build/lib/metrics/MetricsCollectorTest.java
+++ b/src/test/java/com/google/devtools/build/lib/metrics/MetricsCollectorTest.java
@@ -75,9 +75,8 @@
"foo/BUILD",
"genrule(",
" name = 'foo',",
- " outs = ['dir'],",
- " cmd = '/bin/mkdir $(location dir)',",
- " srcs = [],",
+ " outs = ['out'],",
+ " cmd = 'touch $@',",
")");
}
@@ -577,9 +576,9 @@
"foo/BUILD",
"genrule(",
" name = 'foo',",
- " outs = ['dir'],",
+ " outs = ['out'],",
" srcs = ['//noexist:noexist'],",
- " cmd = '/bin/mkdir $(location dir)',",
+ " cmd = 'touch $@',",
")");
addOptions("--analyze");
@@ -591,7 +590,7 @@
"foo/BUILD",
"genrule(",
" name = 'foo',",
- " outs = ['dir'],",
+ " outs = ['out'],",
" cmd = '/bin/false',",
")");
@@ -628,15 +627,13 @@
"foo/BUILD",
"genrule(",
" name = 'foo',",
- " outs = ['dir'],",
- " cmd = '/bin/mkdir $(location dir)',",
- " srcs = [],",
+ " outs = ['out'],",
+ " cmd = 'touch $@',",
")",
"genrule(",
" name = 'bar',",
- " outs = ['dir2'],",
- " cmd = '/bin/mkdir $(location dir2)',",
- " srcs = [],",
+ " outs = ['out2'],",
+ " cmd = 'touch $@',",
")");
addOptions("--experimental_merged_skyframe_analysis_execution");
BuildGraphMetrics expected =
diff --git a/src/test/py/bazel/bazel_windows_test.py b/src/test/py/bazel/bazel_windows_test.py
index 91b3da9..f7a5eb5 100644
--- a/src/test/py/bazel/bazel_windows_test.py
+++ b/src/test/py/bazel/bazel_windows_test.py
@@ -262,25 +262,57 @@
env_add={'BAZEL_VC': 'C:/not/exists/VC'},
)
- def testDeleteReadOnlyFileAndDirectory(self):
+ def testDeleteReadOnlyFile(self):
self.CreateWorkspaceWithDefaultRepos('WORKSPACE')
- self.ScratchFile('BUILD', [
- 'genrule(',
- ' name = "gen_read_only_dir",',
- ' cmd_bat = "mkdir $@ && attrib +r $@",',
- ' outs = ["dir_foo"],',
- ')',
- '',
- 'genrule(',
- ' name = "gen_read_only_file",',
- ' cmd_bat = "echo hello > $@ && attrib +r $@",',
- ' outs = ["file_foo"],',
- ')',
- ])
+ self.ScratchFile(
+ 'BUILD',
+ [
+ 'genrule(',
+ ' name = "gen_read_only_file",',
+ ' cmd_bat = "echo hello > $@ && attrib +r $@",',
+ ' outs = ["file_foo"],',
+ ')',
+ ],
+ )
self.RunBazel(['build', '//...'])
self.RunBazel(['clean'])
+ def testDeleteReadOnlyDirectory(self):
+ self.CreateWorkspaceWithDefaultRepos('WORKSPACE')
+ self.ScratchFile(
+ 'defs.bzl',
+ [
+ 'def _impl(ctx):',
+ ' dir = ctx.actions.declare_directory(ctx.label.name)',
+ ' bat = ctx.actions.declare_file(ctx.label.name + ".bat")',
+ ' ctx.actions.write(',
+ ' output = bat,',
+ ' content = "attrib +r " + dir.path,',
+ ' is_executable = True,',
+ ' )',
+ ' ctx.actions.run(',
+ ' outputs = [dir],',
+ ' executable = bat,',
+ ' use_default_shell_env = True,',
+ ' )',
+ ' return DefaultInfo(files = depset([dir]))',
+ 'read_only_dir = rule(_impl)',
+ ],
+ )
+ self.ScratchFile(
+ 'BUILD',
+ [
+ 'load(":defs.bzl", "read_only_dir")',
+ 'read_only_dir(',
+ ' name = "gen_read_only_dir",',
+ ')',
+ ],
+ )
+
+ self.RunBazel(['build', '--subcommands', '--verbose_failures', '//...'])
+ self.RunBazel(['clean'])
+
def testBuildJavaTargetWithClasspathJar(self):
self.CreateWorkspaceWithDefaultRepos('WORKSPACE')
self.ScratchFile('BUILD', [
diff --git a/src/test/shell/bazel/bazel_hermetic_sandboxing_test.sh b/src/test/shell/bazel/bazel_hermetic_sandboxing_test.sh
index 9515c3a..215a7a8 100755
--- a/src/test/shell/bazel/bazel_hermetic_sandboxing_test.sh
+++ b/src/test/shell/bazel/bazel_hermetic_sandboxing_test.sh
@@ -369,7 +369,8 @@
# Test that the sandbox is able to handle various types of artifacts.
# Regression test for Issue #15340
function test_other_artifacts() {
- bazel build examples/hermetic:other_artifacts &> $TEST_log
+ bazel build --noincompatible_disallow_unsound_directory_outputs \
+ examples/hermetic:other_artifacts &> $TEST_log
assert_contains ".regular_file_artifact" "bazel-bin/examples/hermetic/other_artifacts.result"
assert_contains ".unresolved_symlink_artifact" "bazel-bin/examples/hermetic/other_artifacts.result"
assert_contains ".directory_artifact" "bazel-bin/examples/hermetic/other_artifacts.result"
diff --git a/src/test/shell/bazel/remote/remote_execution_test.sh b/src/test/shell/bazel/remote/remote_execution_test.sh
index 3b903f2..2818dcc 100755
--- a/src/test/shell/bazel/remote/remote_execution_test.sh
+++ b/src/test/shell/bazel/remote/remote_execution_test.sh
@@ -936,6 +936,7 @@
bazel build \
--incompatible_remote_symlinks \
--noincompatible_remote_disallow_symlink_in_tree_artifact \
+ --noincompatible_disallow_unsound_directory_outputs \
--remote_executor=grpc://localhost:${worker_port} \
--remote_download_all \
--spawn_strategy=remote \
@@ -961,6 +962,7 @@
bazel build \
--incompatible_remote_symlinks \
--noincompatible_remote_disallow_symlink_in_tree_artifact \
+ --noincompatible_disallow_unsound_directory_outputs \
--remote_cache=grpc://localhost:${worker_port} \
--remote_download_all \
--spawn_strategy=local \
@@ -971,6 +973,7 @@
bazel build \
--incompatible_remote_symlinks \
--noincompatible_remote_disallow_symlink_in_tree_artifact \
+ --noincompatible_disallow_unsound_directory_outputs \
--remote_cache=grpc://localhost:${worker_port} \
--remote_download_all \
--spawn_strategy=local \
diff --git a/src/test/shell/integration/force_delete_output_test.sh b/src/test/shell/integration/force_delete_output_test.sh
index fd2834f..5beeac8 100755
--- a/src/test/shell/integration/force_delete_output_test.sh
+++ b/src/test/shell/integration/force_delete_output_test.sh
@@ -60,13 +60,28 @@
function test_delete_tree_in_unwritable_dir() {
mkdir -p x || fail "Can't create x"
+ cat > x/defs.bzl << 'EOF'
+def _impl(ctx):
+ dir = ctx.actions.declare_directory("unwritable/somedir")
+ ctx.actions.run_shell(
+ outputs = [dir],
+ command = "mkdir -p $1 && echo $2 $1/somefile && chmod a-w $(dirname $1)",
+ arguments = [dir.path, ctx.attr.content],
+ execution_requirements = {"local": "1"},
+ )
+ return DefaultInfo(files = depset([dir]))
+
+tree_in_unwritable_dir = rule(
+ implementation = _impl,
+ attrs = {"content": attr.string()},
+)
+EOF
+
cat > x/BUILD << 'EOF'
-genrule(
- name = "unwritable",
- srcs = [],
- outs = ["unwritable/somedir"],
- local = 1,
- cmd = "mkdir -p $@; echo 'some output' > $@/somefile.out; chmod a-w $$(dirname $@)"
+load(":defs.bzl", "tree_in_unwritable_dir")
+tree_in_unwritable_dir(
+ name = "unwritable",
+ content = "foo",
)
EOF
@@ -75,12 +90,10 @@
# Now modify the build file to force a rebuild while creating the same output
# within the write-protected directory.
cat > x/BUILD << 'EOF'
-genrule(
+load(":defs.bzl", "tree_in_unwritable_dir")
+tree_in_unwritable_dir(
name = "unwritable",
- srcs = [],
- outs = ["unwritable/somedir"],
- local = 1,
- cmd = "mkdir -p $@; echo 'some other output' > $@/somefile.out; chmod a-w $$(dirname $@)"
+ content = "bar",
)
EOF