blob: 1d623bb19c1fd7dacf769bfd8734ba603f4cb373 [file] [log] [blame]
// Copyright 2014 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.cmdline;
import static com.google.common.util.concurrent.Futures.immediateCancelledFuture;
import static com.google.common.util.concurrent.Futures.immediateVoidFuture;
import com.google.common.annotations.VisibleForTesting;
import com.google.common.base.Joiner;
import com.google.common.base.Preconditions;
import com.google.common.base.Splitter;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableSet;
import com.google.common.util.concurrent.Futures;
import com.google.common.util.concurrent.ListenableFuture;
import com.google.common.util.concurrent.ListeningExecutorService;
import com.google.devtools.build.lib.io.InconsistentFilesystemException;
import com.google.devtools.build.lib.io.ProcessPackageDirectoryException;
import com.google.devtools.build.lib.server.FailureDetails.TargetPatterns;
import com.google.devtools.build.lib.server.FailureDetails.TargetPatterns.Code;
import com.google.devtools.build.lib.supplier.InterruptibleSupplier;
import com.google.devtools.build.lib.util.StringUtilities;
import com.google.devtools.build.lib.vfs.PathFragment;
import com.google.errorprone.annotations.CheckReturnValue;
import com.google.errorprone.annotations.CompileTimeConstant;
import java.util.ArrayList;
import java.util.Iterator;
import java.util.List;
import java.util.Objects;
import java.util.regex.Pattern;
import javax.annotation.Nullable;
import javax.annotation.concurrent.Immutable;
/**
* Represents a target pattern. Target patterns are a generalization of labels to include wildcards
* for finding all packages recursively beneath some root, and for finding all targets within a
* package.
*
* <p>Note that this class does not handle negative patterns ("-//foo/bar"); these must be handled
* one level up. In particular, the query language comes with built-in support for negative
* patterns.
*
* <p>In order to resolve target patterns, you need an implementation of {@link
* TargetPatternResolver}. This class is thread-safe if the corresponding instance is thread-safe.
*
* <p>See lib/blaze/commands/target-syntax.txt for details.
*/
public abstract class TargetPattern {
private static final Splitter SLASH_SPLITTER = Splitter.on('/');
private static final Joiner SLASH_JOINER = Joiner.on('/');
private static final Parser DEFAULT_PARSER = mainRepoParser(PathFragment.EMPTY_FRAGMENT);
private final String originalPattern;
/**
* Returns a parser defaulting to the main repo, with no offset or repo mapping. Note that the
* Parser class is immutable, so this method may return the same instance on subsequent calls.
*/
public static Parser defaultParser() {
return DEFAULT_PARSER;
}
/**
* Returns a parser defaulting to the main repo, with repo mapping, but using the given offset.
*/
// NOTE(wyv): This is only strictly correct within a monorepo. If external repos exist, there
// should always be a proper repo mapping. We should audit calls to this function and add a repo
// mapping wherever appropriate.
public static Parser mainRepoParser(PathFragment offset) {
return new Parser(offset, RepositoryName.MAIN, RepositoryMapping.ALWAYS_FALLBACK);
}
/**
* Normalizes the given relative path by resolving {@code //}, {@code /./} and {@code x/../}
* pieces. Note that leading {@code ".."} segments are not removed, so the returned string can
* have leading {@code ".."} segments.
*
* @throws IllegalArgumentException if the path is absolute, i.e. starts with {@code /}
*/
@VisibleForTesting
static String normalize(String path) {
Preconditions.checkArgument(!path.startsWith("/"), path);
Preconditions.checkArgument(!path.startsWith("@"), path);
Iterator<String> it = SLASH_SPLITTER.split(path).iterator();
List<String> pieces = new ArrayList<>();
while (it.hasNext()) {
String piece = it.next();
if (".".equals(piece) || piece.isEmpty()) {
continue;
}
if ("..".equals(piece)) {
if (pieces.isEmpty()) {
pieces.add(piece);
continue;
}
String predecessor = pieces.remove(pieces.size() - 1);
if ("..".equals(predecessor)) {
pieces.add(piece);
pieces.add(piece);
}
continue;
}
pieces.add(piece);
}
return SLASH_JOINER.join(pieces);
}
private TargetPattern(String originalPattern) {
// Don't allow inheritance outside this class.
this.originalPattern = Preconditions.checkNotNull(originalPattern);
}
/**
* Return the type of the pattern. Examples include "below directory" like "foo/..." and "single
* target" like "//x:y".
*/
public abstract Type getType();
/** Return the string that was parsed into this pattern. */
public String getOriginalPattern() {
return originalPattern;
}
/**
* Evaluates the current target pattern, excluding targets under directories in both {@code
* ignoredSubdirectories} and {@code excludedSubdirectories}, and returns the result.
*
* @throws InconsistentFilesystemException if {@code resolver} makes Skyframe calls and discovers
* a filesystem inconsistency as observed by Skyframe, and this pattern does not have type
* {@code Type.TARGETS_BELOW_DIRECTORY}
* @throws ProcessPackageDirectoryException if {@code resolver} makes Skyframe calls and discovers
* a filesystem inconsistency as observed by Skyframe, and this pattern has type {@code
* Type.TARGETS_BELOW_DIRECTORY}
* @throws IllegalArgumentException if either {@code ignoredSubdirectories} or {@code
* excludedSubdirectories} is nonempty and this pattern does not have type {@code
* Type.TARGETS_BELOW_DIRECTORY}.
*/
public abstract <T, E extends Exception & QueryExceptionMarkerInterface> void eval(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass)
throws TargetParsingException, E, InterruptedException, ProcessPackageDirectoryException,
InconsistentFilesystemException;
/**
* Evaluates this {@link TargetPattern} synchronously, feeding the result to the given {@code
* callback}, and then returns an appropriate immediate {@link ListenableFuture}.
*
* <p>If the returned {@link ListenableFuture}'s {@link ListenableFuture#get} throws an {@code
* ExecutionException}, the cause will be an instance of either {@link TargetParsingException} or
* the given {@code exceptionClass}.
*
* <p>This method must not be called from within Skyframe evaluation. Use {@link
* com.google.devtools.build.lib.skyframe.TargetPatternFunction} and friends for that.
*/
public final <T, E extends Exception & QueryExceptionMarkerInterface>
ListenableFuture<Void> evalAdaptedForAsync(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass) {
try {
eval(resolver, ignoredSubdirectories, excludedSubdirectories, callback, exceptionClass);
return Futures.immediateFuture(null);
} catch (TargetParsingException e) {
return Futures.immediateFailedFuture(e);
} catch (ProcessPackageDirectoryException | InconsistentFilesystemException e) {
throw new IllegalStateException(
"Cannot throw filesystem-related exceptions outside of Skyframe evaluation for " + this,
e);
} catch (InterruptedException e) {
return immediateCancelledFuture();
} catch (Exception e) {
if (exceptionClass.isInstance(e)) {
return Futures.immediateFailedFuture(exceptionClass.cast(e));
}
throw new IllegalStateException(e);
}
}
/**
* Returns a {@link ListenableFuture} representing the asynchronous evaluation of this {@link
* TargetPattern} that feeds the results to the given {@code callback}.
*
* <p>If the returned {@link ListenableFuture}'s {@link ListenableFuture#get} throws an {@code
* ExecutionException}, the cause will be an instance of either {@link TargetParsingException} or
* the given {@code exceptionClass}.
*/
public <T, E extends Exception & QueryExceptionMarkerInterface> ListenableFuture<Void> evalAsync(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass,
ListeningExecutorService executor) {
return evalAdaptedForAsync(
resolver, ignoredSubdirectories, excludedSubdirectories, callback, exceptionClass);
}
/**
* For patterns of type {@link Type#PATH_AS_TARGET}, returns the path in question.
*
* <p>The interpretation of this path, of course, depends on the existence of packages. See {@link
* InterpretPathAsTarget#eval}.
*/
public String getPathForPathAsTarget() {
throw new IllegalStateException();
}
/** For patterns of type {@link Type#SINGLE_TARGET}, returns the label to the target. */
public Label getSingleTargetLabel() {
throw new IllegalStateException();
}
/**
* For patterns of type {@link Type#SINGLE_TARGET}, {@link Type#TARGETS_IN_PACKAGE}, and {@link
* Type#TARGETS_BELOW_DIRECTORY}, returns the {@link PackageIdentifier} of the pattern.
*
* <p>Note that we are using the {@link PackageIdentifier} type as a convenience; there may not
* actually be a package corresponding to this directory!
*
* <p>Examples:
*
* <ul>
* <li>For pattern {@code //foo:bar}, returns package identifier {@code //foo}.
* <li>For pattern {@code //foo:all}, returns package identifier {@code //foo}.
* <li>For pattern {@code //foo/...}, returns package identifier {@code //foo}.
* </ul>
*/
public PackageIdentifier getDirectory() {
throw new IllegalStateException();
}
/** Returns the repository name of the target pattern. */
public abstract RepositoryName getRepository();
/**
* Returns {@code true} iff this pattern has type {@code Type.TARGETS_BELOW_DIRECTORY} or {@code
* Type.TARGETS_IN_PACKAGE} and the target pattern suffix specified it should match rules only.
*/
public abstract boolean getRulesOnly();
private static final class SingleTarget extends TargetPattern {
private final Label target;
private SingleTarget(Label target, String originalPattern) {
super(originalPattern);
this.target = Preconditions.checkNotNull(target);
}
@Override
public <T, E extends Exception & QueryExceptionMarkerInterface> void eval(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass)
throws TargetParsingException, E, InterruptedException {
callback.process(resolver.getExplicitTarget(target).getTargets());
}
@Override
public PackageIdentifier getDirectory() {
return target.getPackageIdentifier();
}
@Override
public RepositoryName getRepository() {
return target.getRepository();
}
@Override
public boolean getRulesOnly() {
return false;
}
@Override
public Label getSingleTargetLabel() {
return target;
}
@Override
public Type getType() {
return Type.SINGLE_TARGET;
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
}
if (!(o instanceof SingleTarget)) {
return false;
}
SingleTarget that = (SingleTarget) o;
return target.equals(that.target);
}
@Override
public int hashCode() {
return Objects.hash(getType(), target);
}
}
private static final class InterpretPathAsTarget extends TargetPattern {
private final String path;
private InterpretPathAsTarget(String path, String originalPattern) {
super(originalPattern);
this.path = normalize(Preconditions.checkNotNull(path));
}
@Override
public <T, E extends Exception & QueryExceptionMarkerInterface> void eval(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass)
throws TargetParsingException, E, InterruptedException, InconsistentFilesystemException {
PackageIdentifier pathAsPackage = PackageIdentifier.createInMainRepo(path);
if (resolver.isPackage(pathAsPackage)) {
// User has specified a package name. lookout for default target.
callback.process(
resolver
.getExplicitTarget(
label(pathAsPackage, pathAsPackage.getPackageFragment().getBaseName()))
.getTargets());
} else {
List<String> pieces = SLASH_SPLITTER.splitToList(path);
// Interprets the label as a file target. This loop stops as soon as the
// first BUILD file is found (i.e. longest prefix match).
for (int i = pieces.size() - 1; i >= 0; i--) {
PackageIdentifier pkg =
PackageIdentifier.createInMainRepo(SLASH_JOINER.join(pieces.subList(0, i)));
if (resolver.isPackage(pkg)) {
String targetName = SLASH_JOINER.join(pieces.subList(i, pieces.size()));
callback.process(resolver.getExplicitTarget(label(pkg, targetName)).getTargets());
return;
}
}
throw new TargetParsingException(
"couldn't determine target from filename '" + path + "'",
Code.CANNOT_DETERMINE_TARGET_FROM_FILENAME);
}
}
@Override
public String getPathForPathAsTarget() {
return path;
}
@Override
public RepositoryName getRepository() {
// InterpretPathAsTarget is validated by PackageIdentifier.createInMainRepo,
// therefore it must belong to the main repository.
return RepositoryName.MAIN;
}
@Override
public boolean getRulesOnly() {
return false;
}
@Override
public Type getType() {
return Type.PATH_AS_TARGET;
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
}
if (!(o instanceof InterpretPathAsTarget)) {
return false;
}
InterpretPathAsTarget that = (InterpretPathAsTarget) o;
return path.equals(that.path);
}
@Override
public int hashCode() {
return Objects.hash(getType(), path);
}
}
private static final class TargetsInPackage extends TargetPattern {
private final PackageIdentifier packageIdentifier;
private final String suffix;
private final boolean wasOriginallyAbsolute;
private final boolean rulesOnly;
private final boolean checkWildcardConflict;
private TargetsInPackage(
String originalPattern,
PackageIdentifier packageIdentifier,
String suffix,
boolean wasOriginallyAbsolute,
boolean rulesOnly,
boolean checkWildcardConflict) {
super(originalPattern);
this.packageIdentifier = packageIdentifier;
this.suffix = Preconditions.checkNotNull(suffix);
this.wasOriginallyAbsolute = wasOriginallyAbsolute;
this.rulesOnly = rulesOnly;
this.checkWildcardConflict = checkWildcardConflict;
}
@Override
public <T, E extends Exception & QueryExceptionMarkerInterface> void eval(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass)
throws TargetParsingException, E, InterruptedException, InconsistentFilesystemException {
if (checkWildcardConflict) {
ResolvedTargets<T> targets = getWildcardConflict(resolver);
if (targets != null) {
callback.process(targets.getTargets());
return;
}
}
callback.process(
resolver.getTargetsInPackage(getOriginalPattern(), packageIdentifier, rulesOnly));
}
@Override
public PackageIdentifier getDirectory() {
return packageIdentifier;
}
@Override
public RepositoryName getRepository() {
return packageIdentifier.getRepository();
}
@Override
public boolean getRulesOnly() {
return rulesOnly;
}
@Override
public Type getType() {
return Type.TARGETS_IN_PACKAGE;
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
}
if (!(o instanceof TargetsInPackage)) {
return false;
}
TargetsInPackage that = (TargetsInPackage) o;
return wasOriginallyAbsolute == that.wasOriginallyAbsolute
&& rulesOnly == that.rulesOnly
&& checkWildcardConflict == that.checkWildcardConflict
&& getOriginalPattern().equals(that.getOriginalPattern())
&& packageIdentifier.equals(that.packageIdentifier)
&& suffix.equals(that.suffix);
}
@Override
public int hashCode() {
return Objects.hash(
getType(),
getOriginalPattern(),
packageIdentifier,
suffix,
wasOriginallyAbsolute,
rulesOnly,
checkWildcardConflict);
}
/**
* There's a potential ambiguity if '//foo/bar:all' refers to an actual target. In this case, we
* use the target but print a warning.
*
* @return the Target corresponding to the given pattern, if the pattern is absolute and there
* is such a target. Otherwise, return null.
*/
@Nullable
private <T> ResolvedTargets<T> getWildcardConflict(TargetPatternResolver<T> resolver)
throws InconsistentFilesystemException, InterruptedException {
if (!wasOriginallyAbsolute) {
return null;
}
T target;
Label label;
try {
label = Label.create(packageIdentifier, suffix);
target = resolver.getTargetOrNull(label);
} catch (LabelSyntaxException e) {
return null;
}
if (target != null) {
resolver.warn(
String.format(
"The target pattern '%s' is ambiguous: '%s' is "
+ "both a wildcard, and the name of an existing %s; "
+ "using the latter interpretation",
getOriginalPattern(), ":" + suffix, resolver.getTargetKind(target)));
try {
return resolver.getExplicitTarget(label);
} catch (TargetParsingException e) {
throw new IllegalStateException(
"getTargetOrNull() returned non-null, so target should exist", e);
}
}
return null;
}
}
/**
* Specialization of {@link TargetPattern} for {@link Type#TARGETS_BELOW_DIRECTORY}. Exposed
* because it has a considerable number of specific methods. If {@link TargetPattern#getType}
* returns {@link Type#TARGETS_BELOW_DIRECTORY} the instance can safely be cast to {@code
* TargetsBelowDirectory}.
*/
public static final class TargetsBelowDirectory extends TargetPattern {
private final PackageIdentifier directory;
private final boolean rulesOnly;
private TargetsBelowDirectory(
String originalPattern, PackageIdentifier directory, boolean rulesOnly) {
super(originalPattern);
this.directory = Preconditions.checkNotNull(directory);
this.rulesOnly = rulesOnly;
}
@Override
public <T, E extends Exception & QueryExceptionMarkerInterface> void eval(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass)
throws TargetParsingException, E, InterruptedException, ProcessPackageDirectoryException {
Preconditions.checkState(
!excludedSubdirectories.contains(directory.getPackageFragment()),
"Fully excluded target pattern %s should have already been filtered out (%s)",
this,
excludedSubdirectories);
IgnoredPathFragmentsInScopeOrFilteringIgnorer ignoredIntersection =
getAllIgnoredSubdirectoriesToExclude(ignoredSubdirectories);
if (warnIfFiltered(ignoredIntersection, resolver)) {
return;
}
resolver.findTargetsBeneathDirectory(
directory.getRepository(),
getOriginalPattern(),
directory.getPackageFragment().getPathString(),
rulesOnly,
ignoredIntersection.ignoredPathFragments(),
excludedSubdirectories,
callback,
exceptionClass);
}
@Override
public <T, E extends Exception & QueryExceptionMarkerInterface>
ListenableFuture<Void> evalAsync(
TargetPatternResolver<T> resolver,
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredSubdirectories,
ImmutableSet<PathFragment> excludedSubdirectories,
BatchCallback<T, E> callback,
Class<E> exceptionClass,
ListeningExecutorService executor) {
Preconditions.checkState(
!excludedSubdirectories.contains(directory.getPackageFragment()),
"Fully excluded target pattern %s should have already been filtered out (%s)",
this,
excludedSubdirectories);
IgnoredPathFragmentsInScopeOrFilteringIgnorer ignoredIntersection;
try {
ignoredIntersection = getAllIgnoredSubdirectoriesToExclude(ignoredSubdirectories);
} catch (InterruptedException e) {
return immediateCancelledFuture();
}
if (warnIfFiltered(ignoredIntersection, resolver)) {
return immediateVoidFuture();
}
return resolver.findTargetsBeneathDirectoryAsync(
directory.getRepository(),
getOriginalPattern(),
directory.getPackageFragment().getPathString(),
rulesOnly,
ignoredIntersection.ignoredPathFragments(),
excludedSubdirectories,
callback,
exceptionClass,
executor);
}
private boolean warnIfFiltered(
IgnoredPathFragmentsInScopeOrFilteringIgnorer ignoredIntersection,
TargetPatternResolver<?> resolver) {
if (ignoredIntersection.wasFiltered()) {
resolver.warn(
"Pattern '"
+ getOriginalPattern()
+ "' was filtered out by ignored directory '"
+ ignoredIntersection.filteringIgnorer().getPathString()
+ "'");
return true;
}
return false;
}
public IgnoredPathFragmentsInScopeOrFilteringIgnorer getAllIgnoredSubdirectoriesToExclude(
InterruptibleSupplier<ImmutableSet<PathFragment>> ignoredPackagePrefixes)
throws InterruptedException {
ImmutableSet.Builder<PathFragment> ignoredPathsBuilder =
ImmutableSet.builderWithExpectedSize(0);
for (PathFragment ignoredPackagePrefix : ignoredPackagePrefixes.get()) {
if (this.containedIn(ignoredPackagePrefix)) {
return new IgnoredPathFragmentsInScopeOrFilteringIgnorer.FilteringIgnorer(
ignoredPackagePrefix);
}
PackageIdentifier pkgIdForIgnoredDirectorPrefix =
PackageIdentifier.create(directory.getRepository(), ignoredPackagePrefix);
if (this.containsAllTransitiveSubdirectories(pkgIdForIgnoredDirectorPrefix)) {
ignoredPathsBuilder.add(ignoredPackagePrefix);
}
}
return IgnoredPathFragmentsInScopeOrFilteringIgnorer.IgnoredPathFragments.of(
ignoredPathsBuilder.build());
}
/**
* Morally an {@code Either<ImmutableSet<PathFragment>, PathFragment>}, saying whether the given
* set of ignored directories intersected a directory (in which case the directories that were
* in the intersection are returned) or completely contained it (in which case a containing
* directory is returned).
*/
public abstract static class IgnoredPathFragmentsInScopeOrFilteringIgnorer {
public abstract boolean wasFiltered();
public abstract ImmutableSet<PathFragment> ignoredPathFragments();
public abstract PathFragment filteringIgnorer();
private static class IgnoredPathFragments
extends IgnoredPathFragmentsInScopeOrFilteringIgnorer {
private static final IgnoredPathFragments EMPTYSET_IGNORED =
new IgnoredPathFragments(ImmutableSet.of());
private final ImmutableSet<PathFragment> ignoredPathFragments;
private IgnoredPathFragments(ImmutableSet<PathFragment> ignoredPathFragments) {
this.ignoredPathFragments = ignoredPathFragments;
}
static IgnoredPathFragments of(ImmutableSet<PathFragment> ignoredPathFragments) {
if (ignoredPathFragments.isEmpty()) {
return EMPTYSET_IGNORED;
}
return new IgnoredPathFragments(ignoredPathFragments);
}
@Override
public boolean wasFiltered() {
return false;
}
@Override
public ImmutableSet<PathFragment> ignoredPathFragments() {
return ignoredPathFragments;
}
@Override
public PathFragment filteringIgnorer() {
throw new UnsupportedOperationException("No filter: " + ignoredPathFragments);
}
}
private static class FilteringIgnorer extends IgnoredPathFragmentsInScopeOrFilteringIgnorer {
private final PathFragment filteringIgnorer;
FilteringIgnorer(PathFragment filteringIgnorer) {
this.filteringIgnorer = filteringIgnorer;
}
@Override
public boolean wasFiltered() {
return true;
}
@Override
public ImmutableSet<PathFragment> ignoredPathFragments() {
throw new UnsupportedOperationException("was filtered: " + filteringIgnorer);
}
@Override
public PathFragment filteringIgnorer() {
return filteringIgnorer;
}
}
}
/** Is {@code containingDirectory} an ancestor of or equal to this {@link #directory}? */
public boolean containedIn(PathFragment containingDirectory) {
return directory.getPackageFragment().startsWith(containingDirectory);
}
/**
* Returns true if {@code containedDirectory} is contained by or equals this pattern's
* directory.
*
* <p>For example, returns {@code true} for {@code this = TargetPattern ("//...")} and {@code
* directory = "foo")}.
*/
public boolean containsAllTransitiveSubdirectories(PackageIdentifier containedDirectory) {
// Note that merely checking to see if the directory startsWith the TargetsBelowDirectory's
// directory is insufficient. "food" begins with "foo", but "//foo/..." does not contain
// "//food/...".
return containedDirectory.getRepository().equals(directory.getRepository())
&& containedDirectory.getPackageFragment().startsWith(directory.getPackageFragment());
}
/**
* Determines how, if it all, the evaluation of this pattern with a directory exclusion of the
* given {@code containedPattern}'s directory relates to the evaluation of the subtraction of
* the given {@code containedPattern} from this one.
*/
public ContainsResult contains(TargetsBelowDirectory containedPattern) {
if (containsAllTransitiveSubdirectories(containedPattern.directory)) {
return !rulesOnly && containedPattern.rulesOnly
? ContainsResult.DIRECTORY_EXCLUSION_WOULD_BE_TOO_BROAD
: ContainsResult.DIRECTORY_EXCLUSION_WOULD_BE_EXACT;
} else {
return ContainsResult.NOT_CONTAINED;
}
}
/** A tristate return value for {@link #contains}. */
public enum ContainsResult {
/**
* Evaluating this pattern with a directory exclusion of the other pattern's directory would
* result in exactly the same set of targets as evaluating the subtraction of the other
* pattern from this one.
*/
DIRECTORY_EXCLUSION_WOULD_BE_EXACT,
/**
* A directory exclusion of the other pattern's directory would be too broad because this
* pattern is not "rules only" and the other one is, meaning that this pattern potentially
* matches more targets underneath the directory in question than the other one does. Thus, a
* directory exclusion would incorrectly exclude non-rule targets.
*/
DIRECTORY_EXCLUSION_WOULD_BE_TOO_BROAD,
/** None of the above. The other pattern isn't contained by this pattern. */
NOT_CONTAINED,
}
@Override
public PackageIdentifier getDirectory() {
return directory;
}
@Override
public RepositoryName getRepository() {
return directory.getRepository();
}
@Override
public boolean getRulesOnly() {
return rulesOnly;
}
@Override
public Type getType() {
return Type.TARGETS_BELOW_DIRECTORY;
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
}
if (!(o instanceof TargetsBelowDirectory)) {
return false;
}
TargetsBelowDirectory that = (TargetsBelowDirectory) o;
return rulesOnly == that.rulesOnly
&& getOriginalPattern().equals(that.getOriginalPattern())
&& directory.equals(that.directory);
}
@Override
public int hashCode() {
return Objects.hash(getType(), getOriginalPattern(), directory, rulesOnly);
}
}
@Immutable
public static final class Parser {
// A valid pattern either starts with exactly 0 slashes (relative pattern) or exactly two
// slashes (absolute pattern).
private static final Pattern VALID_SLASH_PREFIX = Pattern.compile("(//)?([^/]|$)");
// TODO(bazel-team): Merge the Label functionality that requires similar constants into this
// class.
/**
* The set of target-pattern suffixes which indicate wildcards over all <em>rules</em> in a
* single package.
*/
private static final ImmutableList<String> ALL_RULES_IN_SUFFIXES = ImmutableList.of("all");
/**
* The set of target-pattern suffixes which indicate wildcards over all <em>targets</em> in a
* single package.
*/
private static final ImmutableList<String> ALL_TARGETS_IN_SUFFIXES =
ImmutableList.of("*", "all-targets");
private static final List<String> SUFFIXES;
static {
SUFFIXES =
ImmutableList.<String>builder()
.addAll(ALL_RULES_IN_SUFFIXES)
.addAll(ALL_TARGETS_IN_SUFFIXES)
.add("/...")
.build();
}
/**
* Returns whether the given pattern is simple, i.e., not starting with '-' and using none of
* the target matching suffixes.
*/
public static boolean isSimpleTargetPattern(String pattern) {
if (pattern.startsWith("-")) {
return false;
}
for (String suffix : SUFFIXES) {
if (pattern.endsWith(":" + suffix)) {
return false;
}
}
return true;
}
/**
* Directory prefix to use when resolving relative labels (rather than absolute ones). For
* example, if the working directory is "<workspace root>/foo", then this should be "foo", which
* will make patterns such as "bar:bar" be resolved as "//foo/bar:bar". This makes the command
* line a bit more convenient to use.
*/
private final PathFragment relativeDirectory;
// The repo to use for any repo-relative target patterns (so "//foo" becomes
// "@currentRepo//foo").
private final RepositoryName currentRepo;
// The repo mapping to use for the @repo part of target patterns.
private final RepositoryMapping repoMapping;
/** Creates a new parser with the given offset for relative patterns. */
public Parser(
PathFragment relativeDirectory, RepositoryName currentRepo, RepositoryMapping repoMapping) {
this.relativeDirectory = relativeDirectory;
this.currentRepo = currentRepo;
this.repoMapping = repoMapping;
}
/**
* Parses the given pattern, and throws an exception if the pattern is invalid.
*
* @return a target pattern corresponding to the pattern parsed
* @throws TargetParsingException if the pattern is invalid
*/
public TargetPattern parse(String pattern) throws TargetParsingException {
// The structure of this method is by cases, according to the usage string
// constant (see lib/blaze/commands/target-syntax.txt).
String originalPattern = pattern;
final boolean includesRepo = pattern.startsWith("@");
RepositoryName repository;
if (!includesRepo) {
repository = currentRepo;
} else {
int pkgStart = pattern.indexOf("//");
if (pkgStart < 0) {
throw new TargetParsingException(
"Couldn't find package in target " + pattern, TargetPatterns.Code.PACKAGE_NOT_FOUND);
}
boolean isCanonicalRepoName = pattern.startsWith("@@");
String repoPart = pattern.substring(isCanonicalRepoName ? 2 : 1, pkgStart);
try {
RepositoryName.validate(repoPart);
} catch (LabelSyntaxException e) {
throw new TargetParsingException(e.getMessage(), TargetPatterns.Code.LABEL_SYNTAX_ERROR);
}
if (isCanonicalRepoName) {
repository = RepositoryName.createUnvalidated(repoPart);
} else {
repository = repoMapping.get(repoPart);
if (!repository.isVisible()) {
throw new TargetParsingException(
String.format(
"No repository visible as '@%s' from %s",
repository.getName(), repository.getOwnerRepoDisplayString()),
Code.PACKAGE_NOT_FOUND);
}
}
pattern = pattern.substring(pkgStart);
}
if (!VALID_SLASH_PREFIX.matcher(pattern).lookingAt()) {
throw new TargetParsingException(
"not a valid absolute pattern (absolute target patterns "
+ "must start with exactly two slashes): '"
+ pattern
+ "'",
TargetPatterns.Code.ABSOLUTE_TARGET_PATTERN_INVALID);
}
final boolean wasOriginallyAbsolute = pattern.startsWith("//");
// We now ensure the relativeDirectory is applied to relative patterns.
pattern = absolutize(pattern).substring(2);
if (pattern.isEmpty()) {
throw new TargetParsingException(
"the empty string is not a valid target",
TargetPatterns.Code.TARGET_CANNOT_BE_EMPTY_STRING);
}
int colonIndex = pattern.lastIndexOf(':');
String packagePart = colonIndex < 0 ? pattern : pattern.substring(0, colonIndex);
String targetPart = colonIndex < 0 ? "" : pattern.substring(colonIndex + 1);
if (packagePart.equals("...")) {
packagePart = "/..."; // special case this for easier parsing
}
if (packagePart.endsWith("/")) {
throw new TargetParsingException(
"The package part of '" + originalPattern + "' should not end in a slash",
TargetPatterns.Code.PACKAGE_PART_CANNOT_END_IN_SLASH);
}
if (packagePart.endsWith("/...")) {
String realPackagePart = packagePart.substring(0, packagePart.length() - "/...".length());
PackageIdentifier packageIdentifier = createPackageIdentifier(repository, realPackagePart);
if (targetPart.isEmpty() || ALL_RULES_IN_SUFFIXES.contains(targetPart)) {
return new TargetsBelowDirectory(originalPattern, packageIdentifier, true);
} else if (ALL_TARGETS_IN_SUFFIXES.contains(targetPart)) {
return new TargetsBelowDirectory(originalPattern, packageIdentifier, false);
}
}
if (ALL_RULES_IN_SUFFIXES.contains(targetPart)) {
return new TargetsInPackage(
originalPattern,
createPackageIdentifier(repository, packagePart),
targetPart,
wasOriginallyAbsolute,
true,
true);
}
if (ALL_TARGETS_IN_SUFFIXES.contains(targetPart)) {
return new TargetsInPackage(
originalPattern,
createPackageIdentifier(repository, packagePart),
targetPart,
wasOriginallyAbsolute,
false,
true);
}
if (includesRepo || wasOriginallyAbsolute || pattern.contains(":")) {
Label label;
try {
label = Label.parseCanonical(repository.getNameWithAt() + "//" + pattern);
} catch (LabelSyntaxException e) {
throw new TargetParsingException(
"invalid target format '" + originalPattern + "': " + e.getMessage(),
TargetPatterns.Code.TARGET_FORMAT_INVALID);
}
return new SingleTarget(label, originalPattern);
}
// This is a stripped-down version of interpretPathAsTarget that does no I/O. We have a basic
// relative path. e.g. "foo/bar/Wiz.java". The strictest correct check we can do here (without
// I/O) is just to ensure that there is *some* prefix that is a valid package-name. It's
// sufficient to test the first segment. This is really a rather weak check; perhaps we should
// just eliminate it.
int slashIndex = pattern.indexOf('/');
String packageName = pattern;
if (slashIndex > 0) {
packageName = pattern.substring(0, slashIndex);
}
String pkgError = LabelValidator.validatePackageName(packageName);
if (pkgError != null) {
throw new TargetParsingException(
"Bad target pattern '" + originalPattern + "': " + pkgError,
TargetPatterns.Code.LABEL_SYNTAX_ERROR);
}
return new InterpretPathAsTarget(pattern, originalPattern);
}
public RepositoryMapping getRepoMapping() {
return repoMapping;
}
public PathFragment getRelativeDirectory() {
return relativeDirectory;
}
private PackageIdentifier createPackageIdentifier(RepositoryName repoName, String pkg)
throws TargetParsingException {
String pkgError = LabelValidator.validatePackageName(pkg);
if (pkgError != null) {
throw new TargetParsingException(
"Invalid package name '" + pkg + "': " + pkgError, Code.LABEL_SYNTAX_ERROR);
}
return PackageIdentifier.create(repoName, PathFragment.create(pkg));
}
/**
* Parses a constant string TargetPattern, throwing IllegalStateException on invalid pattern.
*/
@CheckReturnValue
public TargetPattern parseConstantUnchecked(@CompileTimeConstant String pattern) {
try {
return parse(pattern);
} catch (TargetParsingException e) {
throw new IllegalStateException(e);
}
}
/**
* Absolutizes the target pattern to the offset. Patterns starting with "//" are absolute and
* not modified. Assumes the given pattern is not invalid wrt leading "/"s.
*
* <p>If the offset is "foo": absolutize(":bar") --> "//foo:bar" absolutize("bar") -->
* "//foo/bar" absolutize("//biz/bar") --> "//biz/bar" (absolute) absolutize("biz:bar") -->
* "//foo/biz:bar"
*
* @param pattern The target pattern to parse.
* @return the pattern, absolutized to the offset if approprate.
*/
public String absolutize(String pattern) {
if (pattern.startsWith("//")) {
return pattern;
}
// PathFragment#getRelative doesn't work when the pattern starts with ":".
// "foo".getRelative(":all") would return "foo/:all", where we really want "foo:all".
return pattern.startsWith(":") || relativeDirectory.isEmpty()
? "//" + relativeDirectory.getPathString() + pattern
: "//" + relativeDirectory.getPathString() + "/" + pattern;
}
}
// Creates a label from parts, mapping LabelSyntaxException into TargetParsingException.
private static Label label(PackageIdentifier pkg, String targetName)
throws TargetParsingException {
try {
return Label.create(pkg, targetName);
} catch (LabelSyntaxException e) {
throw new TargetParsingException(
"invalid target name: '"
+ StringUtilities.sanitizeControlChars(targetName)
+ "'; "
+ StringUtilities.sanitizeControlChars(e.getMessage()),
TargetPatterns.Code.TARGET_FORMAT_INVALID);
}
}
/** The target pattern type (targets below package, in package, explicit target, etc.) */
public enum Type {
/** A path interpreted as a target, eg "foo/bar/baz" */
PATH_AS_TARGET,
/** An explicit target, eg "//foo:bar." */
SINGLE_TARGET,
/** Targets below a directory, eg "foo/...". */
TARGETS_BELOW_DIRECTORY,
/** Target in a package, eg "foo:all". */
TARGETS_IN_PACKAGE
}
}