blob: 32cc2cf145e07a0fcd4e0fa72a5e6938c1af501b [file] [log] [blame]
// Copyright 2014 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.standalone;
import com.google.common.collect.ImmutableList;
import com.google.devtools.build.lib.actions.ActionExecutionContext;
import com.google.devtools.build.lib.actions.ActionInput;
import com.google.devtools.build.lib.actions.ActionInputHelper;
import com.google.devtools.build.lib.actions.Actions;
import com.google.devtools.build.lib.actions.ExecException;
import com.google.devtools.build.lib.actions.ExecutionStrategy;
import com.google.devtools.build.lib.actions.Executor;
import com.google.devtools.build.lib.actions.Spawn;
import com.google.devtools.build.lib.actions.SpawnActionContext;
import com.google.devtools.build.lib.actions.UserExecException;
import com.google.devtools.build.lib.analysis.BlazeDirectories;
import com.google.devtools.build.lib.rules.cpp.CppCompileAction;
import com.google.devtools.build.lib.shell.CommandException;
import com.google.devtools.build.lib.syntax.Label;
import com.google.devtools.build.lib.unix.FilesystemUtils;
import com.google.devtools.build.lib.util.CommandFailureUtils;
import com.google.devtools.build.lib.util.DependencySet;
import com.google.devtools.build.lib.util.io.FileOutErr;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.PathFragment;
import java.io.File;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
import java.util.TreeSet;
/**
* Strategy that uses sandboxing to execute a process.
*/
@ExecutionStrategy(name = {"sandboxed"},
contextType = SpawnActionContext.class)
public class LinuxSandboxedStrategy implements SpawnActionContext {
private final boolean verboseFailures;
private final BlazeDirectories directories;
public LinuxSandboxedStrategy(BlazeDirectories blazeDirectories, boolean verboseFailures) {
this.directories = blazeDirectories;
this.verboseFailures = verboseFailures;
}
/**
* Executes the given {@code spawn}.
*/
@Override
public void exec(Spawn spawn, ActionExecutionContext actionExecutionContext)
throws ExecException {
Executor executor = actionExecutionContext.getExecutor();
if (executor.reportsSubcommands()) {
executor.reportSubcommand(Label.print(spawn.getOwner().getLabel()),
spawn.asShellCommand(executor.getExecRoot()));
}
boolean processHeaders = spawn.getResourceOwner() instanceof CppCompileAction;
Path execPath = this.directories.getExecRoot();
List<String> spawnArguments = new ArrayList<>();
for (String arg : spawn.getArguments()) {
if (arg.startsWith(execPath.getPathString())) {
// make all paths relative for the sandbox
spawnArguments.add(arg.substring(execPath.getPathString().length()));
} else {
spawnArguments.add(arg);
}
}
List<? extends ActionInput> expandedInputs =
ActionInputHelper.expandMiddlemen(spawn.getInputFiles(),
actionExecutionContext.getMiddlemanExpander());
String cwd = executor.getExecRoot().getPathString();
FileOutErr outErr = actionExecutionContext.getFileOutErr();
try {
PathFragment includePrefix = null; // null when there's no include mangling to do
List<PathFragment> includeDirectories = ImmutableList.of();
if (processHeaders) {
CppCompileAction cppAction = (CppCompileAction) spawn.getResourceOwner();
// headers are mounted in the sandbox in a separate include dir, so their names are mangled
// when running the compilation and will have to be unmangled after it's done in the *.pic.d
includeDirectories = extractIncludeDirs(execPath, cppAction, spawnArguments);
includePrefix = getSandboxIncludeDir(cppAction);
}
NamespaceSandboxRunner runner = new NamespaceSandboxRunner(directories, spawn, includePrefix,
includeDirectories, verboseFailures);
runner.setupSandbox(expandedInputs, spawn.getOutputFiles());
runner.run(spawnArguments, spawn.getEnvironment(), new File(cwd), outErr);
runner.copyOutputs(spawn.getOutputFiles(), outErr);
if (processHeaders) {
CppCompileAction cppAction = (CppCompileAction) spawn.getResourceOwner();
unmangleHeaderFiles(cppAction);
}
runner.cleanup();
} catch (CommandException e) {
String message = CommandFailureUtils.describeCommandFailure(verboseFailures,
spawn.getArguments(), spawn.getEnvironment(), cwd);
throw new UserExecException(String.format("%s: %s", message, e));
} catch (IOException e) {
throw new UserExecException(e.getMessage());
}
}
private void unmangleHeaderFiles(CppCompileAction cppCompileAction) throws IOException {
Path execPath = this.directories.getExecRoot();
CppCompileAction.DotdFile dotdfile = cppCompileAction.getDotdFile();
DependencySet depset = new DependencySet(execPath).read(dotdfile.getPath());
DependencySet unmangled = new DependencySet(execPath);
PathFragment sandboxIncludeDir = getSandboxIncludeDir(cppCompileAction);
PathFragment prefix = sandboxIncludeDir.getRelative(execPath.asFragment().relativeTo("/"));
for (PathFragment dep : depset.getDependencies()) {
if (dep.startsWith(prefix)) {
dep = dep.relativeTo(prefix);
}
unmangled.addDependency(dep);
}
unmangled.write(execPath.getRelative(depset.getOutputFileName()), ".d");
}
private PathFragment getSandboxIncludeDir(CppCompileAction cppCompileAction) {
return new PathFragment(
"include-" + Actions.escapedPath(cppCompileAction.getPrimaryOutput().toString()));
}
private ImmutableList<PathFragment> extractIncludeDirs(Path execPath,
CppCompileAction cppCompileAction, List<String> spawnArguments) throws IOException {
List<PathFragment> includes = new ArrayList<>();
includes.addAll(cppCompileAction.getQuoteIncludeDirs());
includes.addAll(cppCompileAction.getIncludeDirs());
includes.addAll(cppCompileAction.getSystemIncludeDirs());
// gcc implicitly includes headers in the same dir as .cc file
PathFragment sourceDirectory =
cppCompileAction.getSourceFile().getPath().getParentDirectory().asFragment();
includes.add(sourceDirectory);
spawnArguments.add("-iquote");
spawnArguments.add(sourceDirectory.toString());
TreeSet<PathFragment> processedIncludes = new TreeSet<>();
for (int i = 0; i < includes.size(); i++) {
PathFragment absolutePath;
if (!includes.get(i).isAbsolute()) {
absolutePath = execPath.getRelative(includes.get(i)).asFragment();
} else {
absolutePath = includes.get(i);
}
// CppCompileAction may provide execPath as one of the include directories. This is a big
// overestimation of what is actually needed and doesn't make for very hermetic sandbox
// (since everything from the workspace will be somehow accessed in the sandbox). To have
// some more hermeticity in this situation we mount all the include dirs in:
// sandbox-directory/include-prefix/actual-include-dir
// (where include-prefix is obtained from this.getSandboxIncludeDir(cppCompileAction))
// and make so gcc looks there for includes. This should prevent the user from accessing
// files that technically should not be in the sandbox.
// TODO(bazel-team): change CppCompileAction so that include dirs contain only subsets of the
// execPath
if (absolutePath.equals(execPath.asFragment())) {
// we can't mount execPath because it will lead to a circular mount; instead mount its
// subdirs inside (other than the ones containing sandbox)
String[] subdirs = FilesystemUtils.readdir(absolutePath.toString());
for (String dirName : subdirs) {
if (dirName.equals("_bin") || dirName.equals("bazel-out")) {
continue;
}
PathFragment child = absolutePath.getChild(dirName);
processedIncludes.add(child);
}
} else {
processedIncludes.add(absolutePath);
}
}
// pseudo random name for include directory inside sandbox, so it won't be accessed by accident
String prefix = getSandboxIncludeDir(cppCompileAction).toString();
// change names in the invocation
for (int i = 0; i < spawnArguments.size(); i++) {
if (spawnArguments.get(i).startsWith("-I")) {
String argument = spawnArguments.get(i).substring(2);
spawnArguments.set(i, setIncludeDirSandboxPath(execPath, argument, "-I" + prefix));
}
if (spawnArguments.get(i).equals("-iquote") || spawnArguments.get(i).equals("-isystem")) {
spawnArguments.set(i + 1, setIncludeDirSandboxPath(execPath,
spawnArguments.get(i + 1), prefix));
}
}
return ImmutableList.copyOf(processedIncludes);
}
private String setIncludeDirSandboxPath(Path execPath, String argument, String prefix) {
StringBuilder builder = new StringBuilder(prefix);
if (argument.charAt(0) != '/') {
// relative path
builder.append(execPath);
builder.append('/');
}
builder.append(argument);
return builder.toString();
}
@Override
public String strategyLocality(String mnemonic, boolean remotable) {
return "linux-sandboxing";
}
@Override
public boolean isRemotable(String mnemonic, boolean remotable) {
return false;
}
}