blob: bfc280c42d8b736db4a1a07ba783356ffab3e86c [file] [log] [blame]
// Copyright 2018 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.sandbox;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSet;
import com.google.common.collect.Iterables;
import com.google.devtools.build.lib.exec.TreeDeleter;
import com.google.devtools.build.lib.profiler.Profiler;
import com.google.devtools.build.lib.profiler.SilentCloseable;
import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxInputs;
import com.google.devtools.build.lib.sandbox.SandboxHelpers.SandboxOutputs;
import com.google.devtools.build.lib.vfs.FileSystemUtils;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.PathFragment;
import java.io.IOException;
import java.util.LinkedHashSet;
import java.util.Set;
import java.util.stream.Collectors;
import javax.annotation.Nullable;
/**
* Implements the general flow of a sandboxed spawn that uses a container directory to build an
* execution root for a spawn.
*/
public abstract class AbstractContainerizingSandboxedSpawn implements SandboxedSpawn {
final Path sandboxPath;
final Path sandboxExecRoot;
private final ImmutableList<String> arguments;
private final ImmutableMap<String, String> environment;
final SandboxInputs inputs;
final SandboxOutputs outputs;
private final Set<Path> writableDirs;
protected final TreeDeleter treeDeleter;
@Nullable private final Path sandboxDebugPath;
@Nullable private final Path statisticsPath;
private final String mnemonic;
public AbstractContainerizingSandboxedSpawn(
Path sandboxPath,
Path sandboxExecRoot,
ImmutableList<String> arguments,
ImmutableMap<String, String> environment,
SandboxInputs inputs,
SandboxOutputs outputs,
Set<Path> writableDirs,
TreeDeleter treeDeleter,
@Nullable Path sandboxDebugPath,
@Nullable Path statisticsPath,
String mnemonic) {
this.sandboxPath = sandboxPath;
this.sandboxExecRoot = sandboxExecRoot;
this.arguments = arguments;
this.environment = environment;
this.inputs = inputs;
this.outputs = outputs;
this.writableDirs = writableDirs;
this.treeDeleter = treeDeleter;
this.sandboxDebugPath = sandboxDebugPath;
this.statisticsPath = statisticsPath;
this.mnemonic = mnemonic;
}
@Override
public Path getSandboxExecRoot() {
return sandboxExecRoot;
}
@Override
public ImmutableList<String> getArguments() {
return arguments;
}
@Override
public ImmutableMap<String, String> getEnvironment() {
return environment;
}
@Override
@Nullable
public Path getSandboxDebugPath() {
return sandboxDebugPath;
}
@Override
@Nullable
public Path getStatisticsPath() {
return statisticsPath;
}
@Override
public String getMnemonic() {
return mnemonic;
}
@Override
public void createFileSystem() throws IOException, InterruptedException {
// First compute all the inputs and directories that we need. This is based only on
// `workerFiles`, `inputs` and `outputs` and won't do any I/O.
Set<PathFragment> inputsToCreate = new LinkedHashSet<>();
Set<PathFragment> dirsToCreate = new LinkedHashSet<>();
Set<PathFragment> writableSandboxDirs =
writableDirs.stream()
.filter(p -> p.startsWith(sandboxExecRoot))
.map(p -> p.relativeTo(sandboxExecRoot))
.collect(Collectors.toSet());
try (SilentCloseable c = Profiler.instance().profile("sandbox.populateInputsAndDirsToCreate")) {
SandboxHelpers.populateInputsAndDirsToCreate(
writableSandboxDirs,
inputsToCreate,
dirsToCreate,
Iterables.concat(
ImmutableSet.of(), inputs.getFiles().keySet(), inputs.getSymlinks().keySet()),
outputs);
}
try (SilentCloseable c = Profiler.instance().profile("sandbox.filterInputsAndDirsToCreate")) {
// Allow subclasses to filter out inputs and dirs that don't need to be created.
filterInputsAndDirsToCreate(inputsToCreate, dirsToCreate);
}
// Finally create what needs creating.
try (SilentCloseable c = Profiler.instance().profile("sandbox.createDirectories")) {
SandboxHelpers.createDirectories(dirsToCreate, sandboxExecRoot, /* strict= */ true);
}
try (SilentCloseable c = Profiler.instance().profile("sandbox.createInputs")) {
createInputs(inputsToCreate, inputs);
}
}
protected void filterInputsAndDirsToCreate(
Set<PathFragment> inputsToCreate, Set<PathFragment> dirsToCreate)
throws IOException, InterruptedException {}
/**
* Creates all inputs needed for this spawn's sandbox.
*
* @param inputsToCreate The inputs that actually need to be created. Some inputs may already
* exist if we're reusing a previously existing sandbox.
* @param inputs All the inputs for this spawn.
*/
void createInputs(Iterable<PathFragment> inputsToCreate, SandboxInputs inputs)
throws IOException, InterruptedException {
for (PathFragment fragment : inputsToCreate) {
if (Thread.interrupted()) {
throw new InterruptedException("Interrupted creating inputs");
}
Path key = sandboxExecRoot.getRelative(fragment);
if (inputs.getFiles().containsKey(fragment)) {
Path fileDest = inputs.getFiles().get(fragment);
if (fileDest != null) {
copyFile(fileDest, key);
} else {
FileSystemUtils.createEmptyFile(key);
}
} else if (inputs.getSymlinks().containsKey(fragment)) {
PathFragment symlinkDest = inputs.getSymlinks().get(fragment);
if (symlinkDest != null) {
key.createSymbolicLink(symlinkDest);
}
}
}
}
protected abstract void copyFile(Path source, Path target) throws IOException;
@Override
public void copyOutputs(Path execRoot) throws IOException {
SandboxHelpers.moveOutputs(outputs, sandboxExecRoot, execRoot);
}
@Override
public void delete() {
try {
treeDeleter.deleteTree(sandboxPath);
} catch (IOException e) {
// This usually means that the Spawn itself exited, but still has children running that
// we couldn't wait for, which now block deletion of the sandbox directory. On Linux this
// should never happen, as we use PID namespaces and where they are not available the
// subreaper feature to make sure all children have been reliably killed before returning,
// but on other OS this might not always work. The SandboxModule will try to delete them
// again when the build is all done, at which point it hopefully works, so let's just go
// on here.
}
}
}