blob: 72aaba62b77ad40b676120d631c0257393bf77e1 [file] [log] [blame]
// Copyright 2022 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.remote;
import static com.google.common.collect.Iterables.getOnlyElement;
import static com.google.common.truth.Truth.assertThat;
import static com.google.devtools.build.lib.remote.util.IntegrationTestUtils.startWorker;
import static com.google.devtools.build.lib.vfs.FileSystemUtils.readContent;
import static java.nio.charset.StandardCharsets.UTF_8;
import static org.junit.Assert.assertThrows;
import static org.junit.Assume.assumeFalse;
import com.google.common.collect.ImmutableList;
import com.google.devtools.build.lib.actions.Artifact;
import com.google.devtools.build.lib.actions.BuildFailedException;
import com.google.devtools.build.lib.authandtls.credentialhelper.CredentialModule;
import com.google.devtools.build.lib.dynamic.DynamicExecutionModule;
import com.google.devtools.build.lib.remote.util.IntegrationTestUtils.WorkerInstance;
import com.google.devtools.build.lib.runtime.BlazeModule;
import com.google.devtools.build.lib.runtime.BlazeRuntime;
import com.google.devtools.build.lib.runtime.BlockWaitingModule;
import com.google.devtools.build.lib.runtime.BuildSummaryStatsModule;
import com.google.devtools.build.lib.standalone.StandaloneModule;
import com.google.devtools.build.lib.util.OS;
import com.google.devtools.build.lib.vfs.FileSystemUtils;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.Symlinks;
import java.io.IOException;
import org.junit.After;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.junit.runners.JUnit4;
/** Integration tests for Build without the Bytes. */
@RunWith(JUnit4.class)
public class BuildWithoutTheBytesIntegrationTest extends BuildWithoutTheBytesIntegrationTestBase {
private WorkerInstance worker;
@Override
protected void setupOptions() throws Exception {
super.setupOptions();
if (worker == null) {
worker = startWorker();
}
addOptions(
"--remote_executor=grpc://localhost:" + worker.getPort(),
"--remote_download_minimal",
"--dynamic_local_strategy=standalone",
"--dynamic_remote_strategy=remote");
// (b/281655526) Skymeld is incompatible.
addOptions("--noexperimental_merged_skyframe_analysis_execution");
}
@Override
protected void setDownloadToplevel() {
addOptions("--remote_download_outputs=toplevel");
}
@Override
protected void setDownloadAll() {
addOptions("--remote_download_outputs=all");
}
@Override
protected BlazeRuntime.Builder getRuntimeBuilder() throws Exception {
return super.getRuntimeBuilder()
.addBlazeModule(new RemoteModule())
.addBlazeModule(new BuildSummaryStatsModule())
.addBlazeModule(new BlockWaitingModule());
}
@Override
protected ImmutableList<BlazeModule> getSpawnModules() {
return ImmutableList.<BlazeModule>builder()
.addAll(super.getSpawnModules())
.add(new StandaloneModule())
.add(new CredentialModule())
.add(new DynamicExecutionModule())
.build();
}
@Override
protected void assertOutputEquals(Path path, String expectedContent) throws Exception {
assertThat(readContent(path, UTF_8)).isEqualTo(expectedContent);
}
@Override
protected void assertOutputContains(String content, String contains) throws Exception {
assertThat(content).contains(contains);
}
@Override
protected void evictAllBlobs() throws Exception {
worker.restart();
}
@Override
protected boolean hasAccessToRemoteOutputs() {
return true;
}
@After
public void tearDown() throws IOException {
if (worker != null) {
worker.stop();
}
}
@Test
public void executeRemotely_actionFails_outputsAreAvailableLocallyForDebuggingPurpose()
throws Exception {
write(
"a/BUILD",
"genrule(",
" name = 'fail',",
" srcs = [],",
" outs = ['fail.txt'],",
" cmd = 'echo foo > $@ && exit 1',",
")");
assertThrows(BuildFailedException.class, () -> buildTarget("//a:fail"));
assertOnlyOutputContent("//a:fail", "fail.txt", "foo\n");
}
@Test
public void intermediateOutputsAreInputForInternalActions_prefetchIntermediateOutputs()
throws Exception {
// Disable on Windows since it seems that template is not supported there.
if (OS.getCurrent() == OS.WINDOWS) {
return;
}
// Test that a remotely stored output that's an input to a internal action
// (ctx.actions.expand_template) is staged lazily for action execution.
write(
"a/substitute_username.bzl",
"def _substitute_username_impl(ctx):",
" ctx.actions.expand_template(",
" template = ctx.file.template,",
" output = ctx.outputs.out,",
" substitutions = {",
" '{USERNAME}': ctx.attr.username,",
" },",
" )",
"",
"substitute_username = rule(",
" implementation = _substitute_username_impl,",
" attrs = {",
" 'username': attr.string(mandatory = True),",
" 'template': attr.label(",
" allow_single_file = True,",
" mandatory = True,",
" ),",
" },",
" outputs = {'out': '%{name}.txt'},",
")");
write(
"a/BUILD",
"load(':substitute_username.bzl', 'substitute_username')",
"genrule(",
" name = 'generate-template',",
" cmd = 'echo -n \"Hello {USERNAME}!\" > $@',",
" outs = ['template.txt'],",
" srcs = [],",
")",
"",
"substitute_username(",
" name = 'substitute-buchgr',",
" username = 'buchgr',",
" template = ':generate-template',",
")");
buildTarget("//a:substitute-buchgr");
// The genrule //a:generate-template should run remotely and //a:substitute-buchgr should be a
// internal action running locally.
events.assertContainsInfo("3 processes: 2 internal, 1 remote");
Artifact intermediateOutput = getOnlyElement(getArtifacts("//a:generate-template"));
assertThat(intermediateOutput.getPath().exists()).isTrue();
assertOnlyOutputContent("//a:substitute-buchgr", "substitute-buchgr.txt", "Hello buchgr!");
}
@Test
public void changeOutputMode_invalidateActions() throws Exception {
write(
"a/BUILD",
"genrule(",
" name = 'foo',",
" srcs = [],",
" outs = ['foo.txt'],",
" cmd = 'echo foo > $@',",
")",
"",
"genrule(",
" name = 'foobar',",
" srcs = [':foo'],",
" outs = ['foobar.txt'],",
" cmd = 'cat $(location :foo) > $@ && echo bar > $@',",
")");
ActionEventCollector actionEventCollector = new ActionEventCollector();
runtimeWrapper.registerSubscriber(actionEventCollector);
buildTarget("//a:foobar");
// 3 = workspace status action + //:foo + //:foobar
assertThat(actionEventCollector.getNumActionNodesEvaluated()).isEqualTo(3);
actionEventCollector.clear();
events.clear();
setDownloadAll();
buildTarget("//a:foobar");
// Changing output mode should invalidate SkyFrame's in-memory caching and make it re-evaluate
// the action nodes.
assertThat(actionEventCollector.getNumActionNodesEvaluated()).isEqualTo(3);
events.assertContainsInfo("2 processes: 2 remote cache hit");
}
@Test
public void symlinkToGeneratedFile() throws Exception {
write(
"a/defs.bzl",
"def _impl(ctx):",
" if ctx.attr.chain_length < 1:",
" fail('chain_length must be > 0')",
"",
" file = ctx.actions.declare_file(ctx.label.name + '.file')",
// Use ctx.actions.run_shell instead of ctx.actions.write, so that it runs remotely.
" ctx.actions.run_shell(",
" outputs = [file],",
" command = 'echo hello > $1',",
" arguments = [file.path],",
" )",
"",
" for i in range(ctx.attr.chain_length):",
" sym = ctx.actions.declare_file(ctx.label.name + '.sym' + str(i))",
" ctx.actions.symlink(output = sym, target_file = file)",
" file = sym",
"",
" out = ctx.actions.declare_file(ctx.label.name + '.out')",
" ctx.actions.run_shell(",
" inputs = [sym],",
" outputs = [out],",
" command = '[[ hello == $(cat $1) ]] && touch $2',",
" arguments = [sym.path, out.path],",
" execution_requirements = {'no-remote': ''} if ctx.attr.local else {},",
" )",
"",
" return DefaultInfo(files = depset([out]))",
"",
"my_rule = rule(",
" implementation = _impl,",
" attrs = {",
" 'chain_length': attr.int(),",
" 'local': attr.bool(),",
" },",
")");
write(
"a/BUILD",
"load(':defs.bzl', 'my_rule')",
"",
"my_rule(name = 'one_local', local = True, chain_length = 1)",
"my_rule(name = 'two_local', local = True, chain_length = 2)",
"my_rule(name = 'one_remote', local = False, chain_length = 1)",
"my_rule(name = 'two_remote', local = False, chain_length = 2)");
buildTarget("//a:one_local", "//a:two_local", "//a:one_remote", "//a:two_remote");
}
@Test
public void symlinkToDirectory() throws Exception {
write(
"a/defs.bzl",
"def _impl(ctx):",
" if ctx.attr.chain_length < 1:",
" fail('chain_length must be > 0')",
"",
" dir = ctx.actions.declare_directory(ctx.label.name + '.dir')",
" ctx.actions.run_shell(",
" outputs = [dir],",
" command = 'mkdir -p $1/some/path && echo hello > $1/some/path/inside.txt',",
" arguments = [dir.path],",
" )",
"",
" for i in range(ctx.attr.chain_length):",
" sym = ctx.actions.declare_directory(ctx.label.name + '.sym' + str(i))",
" ctx.actions.symlink(output = sym, target_file = dir)",
" dir = sym",
"",
" out = ctx.actions.declare_file(ctx.label.name + '.out')",
" ctx.actions.run_shell(",
" inputs = [sym],",
" outputs = [out],",
" command = '[[ hello == $(cat $1/some/path/inside.txt) ]] && touch $2',",
" arguments = [sym.path, out.path],",
" execution_requirements = {'no-remote': ''} if ctx.attr.local else {},",
" )",
"",
" return DefaultInfo(files = depset([out]))",
"",
"my_rule = rule(",
" implementation = _impl,",
" attrs = {",
" 'chain_length': attr.int(),",
" 'local': attr.bool()",
" },",
")");
write(
"a/BUILD",
"load(':defs.bzl', 'my_rule')",
"",
"my_rule(name = 'one_local', local = True, chain_length = 1)",
"my_rule(name = 'two_local', local = True, chain_length = 2)",
"my_rule(name = 'one_remote', local = False, chain_length = 1)",
"my_rule(name = 'two_remote', local = False, chain_length = 2)");
buildTarget("//a:one_local", "//a:two_local", "//a:one_remote", "//a:two_remote");
}
@Test
public void symlinkToNestedFile() throws Exception {
addOptions("--noincompatible_strict_conflict_checks");
write(
"a/defs.bzl",
"def _impl(ctx):",
" if ctx.attr.chain_length < 1:",
" fail('chain_length must be > 0')",
"",
" dir = ctx.actions.declare_directory(ctx.label.name + '.dir')",
" file = ctx.actions.declare_file(ctx.label.name + '.dir/some/path/inside.txt')",
" ctx.actions.run_shell(",
" outputs = [dir, file],",
" command = 'mkdir -p $1/some/path && echo hello > $1/some/path/inside.txt',",
" arguments = [dir.path],",
" )",
"",
" for i in range(ctx.attr.chain_length):",
" sym = ctx.actions.declare_file(ctx.label.name + '.sym' + str(i))",
" ctx.actions.symlink(output = sym, target_file = file)",
" file = sym",
"",
" out = ctx.actions.declare_file(ctx.label.name + '.out')",
" ctx.actions.run_shell(",
" inputs = [sym],",
" outputs = [out],",
" command = '[[ hello == $(cat $1) ]] && touch $2',",
" arguments = [sym.path, out.path],",
" execution_requirements = {'no-remote': ''} if ctx.attr.local else {},",
" )",
"",
" return DefaultInfo(files = depset([out]))",
"",
"my_rule = rule(",
" implementation = _impl,",
" attrs = {",
" 'chain_length': attr.int(),",
" 'local': attr.bool(),",
" },",
")");
write(
"a/BUILD",
"load(':defs.bzl', 'my_rule')",
"",
"my_rule(name = 'one_local', local = True, chain_length = 1)",
"my_rule(name = 'two_local', local = True, chain_length = 2)",
"my_rule(name = 'one_remote', local = False, chain_length = 1)",
"my_rule(name = 'two_remote', local = False, chain_length = 2)");
buildTarget("//a:one_local", "//a:two_local", "//a:one_remote", "//a:two_remote");
}
@Test
public void symlinkToNestedDirectory() throws Exception {
addOptions("--noincompatible_strict_conflict_checks");
write(
"a/defs.bzl",
"def _impl(ctx):",
" if ctx.attr.chain_length < 1:",
" fail('chain_length must be > 0')",
"",
" dir = ctx.actions.declare_directory(ctx.label.name + '.dir')",
" subdir = ctx.actions.declare_directory(ctx.label.name + '.dir/some/path')",
" ctx.actions.run_shell(",
" outputs = [dir, subdir],",
" command = 'mkdir -p $1/some/path && echo hello > $1/some/path/inside.txt',",
" arguments = [dir.path],",
" )",
"",
" for i in range(ctx.attr.chain_length):",
" sym = ctx.actions.declare_directory(ctx.label.name + '.sym' + str(i))",
" ctx.actions.symlink(output = sym, target_file = subdir)",
" subdir = sym",
"",
" out = ctx.actions.declare_file(ctx.label.name + '.out')",
" ctx.actions.run_shell(",
" inputs = [sym],",
" outputs = [out],",
" command = '[[ hello == $(cat $1/inside.txt) ]] && touch $2',",
" arguments = [sym.path, out.path],",
" execution_requirements = {'no-remote': ''} if ctx.attr.local else {},",
" )",
"",
" return DefaultInfo(files = depset([out]))",
"",
"my_rule = rule(",
" implementation = _impl,",
" attrs = {",
" 'chain_length': attr.int(),",
" 'local': attr.bool(),",
" },",
")");
write(
"a/BUILD",
"load(':defs.bzl', 'my_rule')",
"",
"my_rule(name = 'one_local', local = True, chain_length = 1)",
"my_rule(name = 'two_local', local = True, chain_length = 2)",
"my_rule(name = 'one_remote', local = False, chain_length = 1)",
"my_rule(name = 'two_remote', local = False, chain_length = 2)");
buildTarget("//a:one_local", "//a:two_local", "//a:one_remote", "//a:two_remote");
}
@Test
public void outputSymlinkHandledGracefully() throws Exception {
// Symlinks may not be supported on Windows
assumeFalse(OS.getCurrent() == OS.WINDOWS);
write(
"a/defs.bzl",
"def _impl(ctx):",
" out = ctx.actions.declare_symlink(ctx.label.name)",
" ctx.actions.run_shell(",
" inputs = [],",
" outputs = [out],",
" command = 'ln -s hello $1',",
" arguments = [out.path],",
" )",
" return DefaultInfo(files = depset([out]))",
"",
"my_rule = rule(",
" implementation = _impl,",
")");
write("a/BUILD", "load(':defs.bzl', 'my_rule')", "", "my_rule(name = 'hello')");
buildTarget("//a:hello");
Path outputPath = getOutputPath("a/hello");
assertThat(outputPath.stat(Symlinks.NOFOLLOW).isSymbolicLink()).isTrue();
}
@Test
public void replaceOutputDirectoryWithFile() throws Exception {
write(
"a/defs.bzl",
"def _impl(ctx):",
" dir = ctx.actions.declare_directory(ctx.label.name + '.dir')",
" ctx.actions.run_shell(",
" outputs = [dir],",
" command = 'touch $1/hello',",
" arguments = [dir.path],",
" )",
" return DefaultInfo(files = depset([dir]))",
"",
"my_rule = rule(",
" implementation = _impl,",
")");
write("a/BUILD", "load(':defs.bzl', 'my_rule')", "", "my_rule(name = 'hello')");
setDownloadToplevel();
buildTarget("//a:hello");
// Replace the existing output directory of the package with a file.
// A subsequent build should remove this file and replace it with a
// directory.
Path outputPath = getOutputPath("a");
outputPath.deleteTree();
FileSystemUtils.writeContent(outputPath, new byte[] {1, 2, 3, 4, 5});
buildTarget("//a:hello");
}
@Test
public void remoteCacheEvictBlobs_whenPrefetchingInput_exitWithCode39() throws Exception {
// Arrange: Prepare workspace and populate remote cache
write(
"a/BUILD",
"genrule(",
" name = 'foo',",
" srcs = ['foo.in'],",
" outs = ['foo.out'],",
" cmd = 'cat $(SRCS) > $@',",
")",
"genrule(",
" name = 'bar',",
" srcs = ['foo.out', 'bar.in'],",
" outs = ['bar.out'],",
" cmd = 'cat $(SRCS) > $@',",
" tags = ['no-remote-exec'],",
")");
write("a/foo.in", "foo");
write("a/bar.in", "bar");
// Populate remote cache
buildTarget("//a:bar");
var bytes = readContent(getOutputPath("a/foo.out"));
var hashCode = getDigestHashFunction().getHashFunction().hashBytes(bytes);
getOutputPath("a/foo.out").delete();
getOutputPath("a/bar.out").delete();
getOutputBase().getRelative("action_cache").deleteTreesBelow();
restartServer();
// Clean build, foo.out isn't downloaded
buildTarget("//a:bar");
assertOutputDoesNotExist("a/foo.out");
// Act: Evict blobs from remote cache and do an incremental build
evictAllBlobs();
write("a/bar.in", "updated bar");
var error = assertThrows(BuildFailedException.class, () -> buildTarget("//a:bar"));
// Assert: Exit code is 39
assertThat(error)
.hasMessageThat()
.contains("Failed to fetch blobs because they do not exist remotely");
assertThat(error).hasMessageThat().contains(String.format("%s/%s", hashCode, bytes.length));
assertThat(error.getDetailedExitCode().getExitCode().getNumericExitCode()).isEqualTo(39);
}
@Test
public void remoteCacheEvictBlobs_whenUploadingInput_exitWithCode39() throws Exception {
// Arrange: Prepare workspace and populate remote cache
write(
"a/BUILD",
"genrule(",
" name = 'foo',",
" srcs = ['foo.in'],",
" outs = ['foo.out'],",
" cmd = 'cat $(SRCS) > $@',",
")",
"genrule(",
" name = 'bar',",
" srcs = ['foo.out', 'bar.in'],",
" outs = ['bar.out'],",
" cmd = 'cat $(SRCS) > $@',",
")");
write("a/foo.in", "foo");
write("a/bar.in", "bar");
// Populate remote cache
setDownloadAll();
buildTarget("//a:bar");
waitDownloads();
var bytes = readContent(getOutputPath("a/foo.out"));
var hashCode = getDigestHashFunction().getHashFunction().hashBytes(bytes);
getOutputPath("a/foo.out").delete();
getOutputPath("a/bar.out").delete();
getOutputBase().getRelative("action_cache").deleteTreesBelow();
restartServer();
// Clean build, foo.out isn't downloaded
buildTarget("//a:bar");
assertOutputDoesNotExist("a/foo.out");
// Act: Evict blobs from remote cache and do an incremental build
evictAllBlobs();
write("a/bar.in", "updated bar");
var error = assertThrows(BuildFailedException.class, () -> buildTarget("//a:bar"));
// Assert: Exit code is 39
assertThat(error).hasMessageThat().contains(String.format("%s/%s", hashCode, bytes.length));
assertThat(error.getDetailedExitCode().getExitCode().getNumericExitCode()).isEqualTo(39);
}
@Test
public void remoteCacheEvictBlobs_whenUploadingInputFile_incrementalBuildCanContinue()
throws Exception {
// Arrange: Prepare workspace and populate remote cache
write(
"a/BUILD",
"genrule(",
" name = 'foo',",
" srcs = ['foo.in'],",
" outs = ['foo.out'],",
" cmd = 'cat $(SRCS) > $@',",
")",
"genrule(",
" name = 'bar',",
" srcs = ['foo.out', 'bar.in'],",
" outs = ['bar.out'],",
" cmd = 'cat $(SRCS) > $@',",
")");
write("a/foo.in", "foo");
write("a/bar.in", "bar");
// Populate remote cache
buildTarget("//a:bar");
getOutputPath("a/foo.out").delete();
getOutputPath("a/bar.out").delete();
getOutputBase().getRelative("action_cache").deleteTreesBelow();
restartServer();
// Clean build, foo.out isn't downloaded
setDownloadToplevel();
buildTarget("//a:bar");
assertOutputDoesNotExist("a/foo.out");
// Evict blobs from remote cache
evictAllBlobs();
// trigger build error
write("a/bar.in", "updated bar");
// Build failed because of remote cache eviction
assertThrows(BuildFailedException.class, () -> buildTarget("//a:bar"));
// Act: Do an incremental build without "clean" or "shutdown"
buildTarget("//a:bar");
waitDownloads();
// Assert: target was successfully built
assertValidOutputFile("a/bar.out", "foo" + lineSeparator() + "updated bar" + lineSeparator());
}
@Test
public void remoteCacheEvictBlobs_whenUploadingInputTree_incrementalBuildCanContinue()
throws Exception {
// Arrange: Prepare workspace and populate remote cache
write("BUILD");
writeOutputDirRule();
write(
"a/BUILD",
"load('//:output_dir.bzl', 'output_dir')",
"output_dir(",
" name = 'foo.out',",
" content_map = {'file-inside': 'hello world'},",
")",
"genrule(",
" name = 'bar',",
" srcs = ['foo.out', 'bar.in'],",
" outs = ['bar.out'],",
" cmd = '( ls $(location :foo.out); cat $(location :bar.in) ) > $@',",
")");
write("a/bar.in", "bar");
// Populate remote cache
buildTarget("//a:bar");
getOutputPath("a/foo.out").deleteTreesBelow();
getOutputPath("a/bar.out").delete();
getOutputBase().getRelative("action_cache").deleteTreesBelow();
restartServer();
// Clean build, foo.out isn't downloaded
buildTarget("//a:bar");
assertOutputDoesNotExist("a/foo.out/file-inside");
// Evict blobs from remote cache
evictAllBlobs();
// trigger build error
setDownloadToplevel();
write("a/bar.in", "updated bar");
// Build failed because of remote cache eviction
assertThrows(BuildFailedException.class, () -> buildTarget("//a:bar"));
// Act: Do an incremental build without "clean" or "shutdown"
buildTarget("//a:bar");
waitDownloads();
// Assert: target was successfully built
assertValidOutputFile("a/bar.out", "file-inside\nupdated bar" + lineSeparator());
}
@Test
public void downloadToplevel_symlinkFile() throws Exception {
// TODO(chiwang): Make metadata for downloaded symlink non-remote.
assumeFalse(OS.getCurrent() == OS.WINDOWS);
setDownloadToplevel();
writeSymlinkRule();
write(
"BUILD",
"load(':symlink.bzl', 'symlink')",
"genrule(",
" name = 'foo',",
" srcs = [],",
" outs = ['out/foo.txt'],",
" cmd = 'echo foo > $@',",
")",
"symlink(",
" name = 'foo-link',",
" target = ':foo'",
")");
buildTarget("//:foo-link");
assertValidOutputFile("foo-link", "foo\n");
// Delete link, re-plant symlink
getOutputPath("foo-link").delete();
buildTarget("//:foo-link");
assertValidOutputFile("foo-link", "foo\n");
// Delete target, re-download it
getOutputPath("foo").delete();
assertValidOutputFile("foo-link", "foo\n");
}
@Test
public void downloadToplevel_symlinkSourceFile() throws Exception {
// TODO(chiwang): Make metadata for downloaded symlink non-remote.
assumeFalse(OS.getCurrent() == OS.WINDOWS);
setDownloadToplevel();
writeSymlinkRule();
write(
"BUILD",
"load(':symlink.bzl', 'symlink')",
"symlink(",
" name = 'foo-link',",
" target = ':foo.txt'",
")");
write("foo.txt", "foo");
buildTarget("//:foo-link");
assertOnlyOutputContent("//:foo-link", "foo-link", "foo" + lineSeparator());
// Delete link, re-plant symlink
getOutputPath("foo-link").delete();
buildTarget("//:foo-link");
assertOnlyOutputContent("//:foo-link", "foo-link", "foo" + lineSeparator());
}
@Test
public void downloadToplevel_symlinkTree() throws Exception {
// TODO(chiwang): Make metadata for downloaded symlink non-remote.
assumeFalse(OS.getCurrent() == OS.WINDOWS);
setDownloadToplevel();
writeSymlinkRule();
writeOutputDirRule();
write(
"BUILD",
"load(':output_dir.bzl', 'output_dir')",
"load(':symlink.bzl', 'symlink')",
"output_dir(",
" name = 'foo',",
" content_map = {'file-1': '1', 'file-2': '2', 'file-3': '3'},",
")",
"symlink(",
" name = 'foo-link',",
" target = ':foo'",
")");
buildTarget("//:foo-link");
assertValidOutputFile("foo-link/file-1", "1");
assertValidOutputFile("foo-link/file-2", "2");
assertValidOutputFile("foo-link/file-3", "3");
getOutputPath("foo-link").deleteTree();
// Delete link, re-plant symlink
buildTarget("//:foo-link");
assertValidOutputFile("foo-link/file-1", "1");
assertValidOutputFile("foo-link/file-2", "2");
assertValidOutputFile("foo-link/file-3", "3");
// Delete target, re-download them
getOutputPath("foo").deleteTree();
buildTarget("//:foo-link");
assertValidOutputFile("foo-link/file-1", "1");
assertValidOutputFile("foo-link/file-2", "2");
assertValidOutputFile("foo-link/file-3", "3");
}
}