blob: 7cb96e0749307f48a61ae84a900bb21dfaa9293e [file] [log] [blame]
Brian Harringb938c782012-02-29 15:14:38 -08001#!/usr/bin/env python
2# Copyright (c) 2011-2012 The Chromium OS Authors. All rights reserved.
3# Use of this source code is governed by a BSD-style license that can be
4# found in the LICENSE file.
5
6"""This script fetches and prepares an SDK chroot.
7"""
8
Brian Harring0ebc33c2012-05-25 13:36:19 -07009import logging
Brian Harringb938c782012-02-29 15:14:38 -080010import optparse
11import os
12import sys
13import urlparse
14
15from chromite.buildbot import constants
Brian Harringcfe762a2012-02-29 13:03:53 -080016from chromite.lib import cgroups
Brian Harringb938c782012-02-29 15:14:38 -080017from chromite.lib import cros_build_lib
Brian Harringb938c782012-02-29 15:14:38 -080018from chromite.lib import locking
Brian Harringcfe762a2012-02-29 13:03:53 -080019from chromite.lib import sudo
Brian Harringb938c782012-02-29 15:14:38 -080020
21cros_build_lib.STRICT_SUDO = True
22
23
24DEFAULT_URL = 'https://commondatastorage.googleapis.com/chromiumos-sdk/'
Zdenek Behanfd0efe42012-04-13 04:36:40 +020025SDK_SUFFIXES = ['.tbz2', '.tar.xz']
26
Brian Harringb938c782012-02-29 15:14:38 -080027SRC_ROOT = os.path.realpath(constants.SOURCE_ROOT)
28SDK_DIR = os.path.join(SRC_ROOT, 'sdks')
29OVERLAY_DIR = os.path.join(SRC_ROOT, 'src/third_party/chromiumos-overlay')
30SDK_VERSION_FILE = os.path.join(OVERLAY_DIR,
31 'chromeos/binhost/host/sdk_version.conf')
32
33# TODO(zbehan): Remove the dependency on these, reimplement them in python
34MAKE_CHROOT = [os.path.join(SRC_ROOT, 'src/scripts/sdk_lib/make_chroot.sh')]
35ENTER_CHROOT = [os.path.join(SRC_ROOT, 'src/scripts/sdk_lib/enter_chroot.sh')]
36
37# We need these tools to run. Very common tools (tar,..) are ommited.
38NEEDED_TOOLS = ['curl']
39
40def GetHostArch():
41 """Returns a string for the host architecture"""
42 out = cros_build_lib.RunCommand(['uname', '-m'],
43 redirect_stdout=True, print_cmd=False).output
44 return out.rstrip('\n')
45
46def CheckPrerequisites(needed_tools):
47 """Verifies that the required tools are present on the system.
48
49 This is especially important as this script is intended to run
50 outside the chroot.
51
52 Arguments:
53 needed_tools: an array of string specified binaries to look for.
54
55 Returns:
56 True if all needed tools were found.
57 """
Brian Harring98b54902012-03-23 04:05:42 -070058 missing = []
Brian Harringb938c782012-02-29 15:14:38 -080059 for tool in needed_tools:
60 cmd = ['which', tool]
61 try:
62 cros_build_lib.RunCommand(cmd, print_cmd=False, redirect_stdout=True,
63 combine_stdout_stderr=True)
64 except cros_build_lib.RunCommandError:
Brian Harring98b54902012-03-23 04:05:42 -070065 missing.append(tool)
66 return missing
67
Brian Harringb938c782012-02-29 15:14:38 -080068
69def GetLatestVersion():
70 """Extracts latest version from chromiumos-overlay."""
71 sdk_file = open(SDK_VERSION_FILE)
72 buf = sdk_file.readline().rstrip('\n').split('=')
73 if buf[0] != 'SDK_LATEST_VERSION':
74 raise Exception('Malformed version file')
75 return buf[1].strip('"')
76
77
Zdenek Behanfd0efe42012-04-13 04:36:40 +020078def GetArchStageTarballs(tarballArch, version):
Brian Harringb938c782012-02-29 15:14:38 -080079 """Returns the URL for a given arch/version"""
80 D = { 'x86_64': 'cros-sdk-' }
81 try:
Zdenek Behanfd0efe42012-04-13 04:36:40 +020082 return [DEFAULT_URL + D[tarballArch] + version + x for x in SDK_SUFFIXES]
Brian Harringb938c782012-02-29 15:14:38 -080083 except KeyError:
Brian Harring98b54902012-03-23 04:05:42 -070084 raise SystemExit('Unsupported arch: %s' % (tarballArch,))
Brian Harringb938c782012-02-29 15:14:38 -080085
86
Zdenek Behanfd0efe42012-04-13 04:36:40 +020087def FetchRemoteTarballs(urls):
88 """Fetches a tarball given by url, and place it in sdk/.
89
90 Args:
91 urls: List of URLs to try to download. Download will stop on first success.
92
93 Returns:
94 Full path to the downloaded file
95 """
Zdenek Behan9c644dd2012-04-05 06:24:02 +020096
97 def RunCurl(args, **kwargs):
98 """Runs curl and wraps around all necessary hacks."""
99 cmd = ['curl']
100 cmd.extend(args)
101
Brian Harringb45afea2012-05-17 08:10:53 -0700102 # These values were discerned via scraping the curl manpage; they're all
103 # retry related (dns failed, timeout occurred, etc, see the manpage for
104 # exact specifics of each).
105 # Note we allow 22 to deal w/ 500's- they're thrown by google storage
106 # occasionally.
107 # Finally, we do not use curl's --retry option since it generally doesn't
108 # actually retry anything; code 18 for example, it will not retry on.
Brian Harring06d2b272012-05-22 18:42:02 -0700109 retriable_exits = frozenset([5, 6, 7, 15, 18, 22, 26, 28, 52, 56])
Brian Harringb45afea2012-05-17 08:10:53 -0700110 try:
111 return cros_build_lib.RunCommandWithRetries(
112 5, cmd, sleep=3, retry_on=retriable_exits, **kwargs)
113 except cros_build_lib.RunCommandError, e:
114 code = e.result.returncode
Brian Harring06d2b272012-05-22 18:42:02 -0700115 if code in (51, 58, 60):
Brian Harringb45afea2012-05-17 08:10:53 -0700116 # These are the return codes of failing certs as per 'man curl'.
Zdenek Behan9c644dd2012-04-05 06:24:02 +0200117 print 'Download failed with certificate error? Try "sudo c_rehash".'
118 else:
Brian Harringb45afea2012-05-17 08:10:53 -0700119 print "Curl failed w/ exit code %i" % code
Zdenek Behan9c644dd2012-04-05 06:24:02 +0200120 sys.exit(1)
121
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200122 def RemoteTarballExists(url):
123 """Tests if a remote tarball exists."""
124 # We also use this for "local" tarballs using file:// urls. Those will
125 # fail the -I check, so just check the file locally instead.
126 if url.startswith('file://'):
127 return os.path.exists(url.replace('file://', ''))
128
129 result = RunCurl(['-I', url],
130 redirect_stdout=True, redirect_stderr=True,
131 print_cmd=False)
132 header = result.output.splitlines()[0]
133 return header.find('200 OK') != -1
134
135 url = None
136 for url in urls:
137 print 'Attempting download: %s' % url
138 if RemoteTarballExists(url):
139 break
140 else:
141 raise Exception('No valid URLs found!')
142
Brian Harringb45afea2012-05-17 08:10:53 -0700143 # pylint: disable=E1101
Zdenek Behanb2fa72e2012-03-16 04:49:30 +0100144 tarball_name = os.path.basename(urlparse.urlparse(url).path)
145 tarball_dest = os.path.join(SDK_DIR, tarball_name)
146
147 # Cleanup old tarballs.
148 files_to_delete = [f for f in os.listdir(SDK_DIR) if f != tarball_name]
149 if files_to_delete:
150 print 'Cleaning up old tarballs: ' + str(files_to_delete)
151 for f in files_to_delete:
152 f_path = os.path.join(SDK_DIR, f)
153 # Only delete regular files that belong to us.
154 if os.path.isfile(f_path) and os.stat(f_path).st_uid == os.getuid():
155 os.remove(f_path)
Brian Harringb938c782012-02-29 15:14:38 -0800156
Brian Harringb45afea2012-05-17 08:10:53 -0700157 curl_opts = ['-f', '-L', '-y', '30', '--output', tarball_dest]
Brian Harringb938c782012-02-29 15:14:38 -0800158 if not url.startswith('file://') and os.path.exists(tarball_dest):
159 # Only resume for remote URLs. If the file is local, there's no
160 # real speedup, and using the same filename for different files
161 # locally will cause issues.
Zdenek Behan9c644dd2012-04-05 06:24:02 +0200162 curl_opts.extend(['-C', '-'])
Brian Harringb938c782012-02-29 15:14:38 -0800163
164 # Additionally, certain versions of curl incorrectly fail if
165 # told to resume a file that is fully downloaded, thus do a
166 # check on our own.
167 # see:
Brian Harringb45afea2012-05-17 08:10:53 -0700168 # pylint: disable=C0301
Brian Harringb938c782012-02-29 15:14:38 -0800169 # https://sourceforge.net/tracker/?func=detail&atid=100976&aid=3482927&group_id=976
Zdenek Behan9c644dd2012-04-05 06:24:02 +0200170 result = RunCurl(['-I', url],
171 redirect_stdout=True,
172 redirect_stderr=True,
173 print_cmd=False)
174
Brian Harringb938c782012-02-29 15:14:38 -0800175 for x in result.output.splitlines():
176 if x.lower().startswith("content-length:"):
177 length = int(x.split(":", 1)[-1].strip())
178 if length == os.path.getsize(tarball_dest):
179 # Fully fetched; bypass invoking curl, since it can screw up handling
180 # of this (>=7.21.4 and up).
181 return tarball_dest
182 break
Zdenek Behan9c644dd2012-04-05 06:24:02 +0200183 curl_opts.append(url)
184 RunCurl(curl_opts)
Brian Harringb938c782012-02-29 15:14:38 -0800185 return tarball_dest
186
187
188def BootstrapChroot(chroot_path, stage_url, replace):
189 """Builds a new chroot from source"""
190 cmd = MAKE_CHROOT + ['--chroot', chroot_path,
191 '--nousepkg']
192
193 stage = None
194 if stage_url:
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200195 stage = FetchRemoteTarballs([stage_url])
Brian Harringb938c782012-02-29 15:14:38 -0800196
197 if stage:
198 cmd.extend(['--stage3_path', stage])
199
200 if replace:
201 cmd.append('--replace')
202
203 try:
204 cros_build_lib.RunCommand(cmd, print_cmd=False)
205 except cros_build_lib.RunCommandError:
Brian Harring98b54902012-03-23 04:05:42 -0700206 raise SystemExit('Running %r failed!' % cmd)
Brian Harringb938c782012-02-29 15:14:38 -0800207
208
209def CreateChroot(sdk_url, sdk_version, chroot_path, replace):
210 """Creates a new chroot from a given SDK"""
211 if not os.path.exists(SDK_DIR):
212 cros_build_lib.RunCommand(['mkdir', '-p', SDK_DIR], print_cmd=False)
213
214 # Based on selections, fetch the tarball
215 if sdk_url:
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200216 urls = [sdk_url]
Brian Harringb938c782012-02-29 15:14:38 -0800217 else:
218 arch = GetHostArch()
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200219 urls = GetArchStageTarballs(arch, sdk_version)
Brian Harringb938c782012-02-29 15:14:38 -0800220
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200221 sdk = FetchRemoteTarballs(urls)
Brian Harringb938c782012-02-29 15:14:38 -0800222
223 # TODO(zbehan): Unpack and install
224 # For now, we simply call make_chroot on the prebuilt chromeos-sdk.
225 # make_chroot provides a variety of hacks to make the chroot useable.
226 # These should all be eliminated/minimised, after which, we can change
227 # this to just unpacking the sdk.
228 cmd = MAKE_CHROOT + ['--stage3_path', sdk,
229 '--chroot', chroot_path]
230
231 if replace:
232 cmd.append('--replace')
233
234 try:
235 cros_build_lib.RunCommand(cmd, print_cmd=False)
236 except cros_build_lib.RunCommandError:
Brian Harring98b54902012-03-23 04:05:42 -0700237 raise SystemExit('Running %r failed!' % cmd)
Brian Harringb938c782012-02-29 15:14:38 -0800238
239
240def DeleteChroot(chroot_path):
241 """Deletes an existing chroot"""
242 cmd = MAKE_CHROOT + ['--chroot', chroot_path,
243 '--delete']
244 try:
245 cros_build_lib.RunCommand(cmd, print_cmd=False)
246 except cros_build_lib.RunCommandError:
Brian Harring98b54902012-03-23 04:05:42 -0700247 raise SystemExit('Running %r failed!' % cmd)
Brian Harringb938c782012-02-29 15:14:38 -0800248
249
250def _CreateLockFile(path):
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200251 """Create a lockfile via sudo that is writable by current user."""
252 cros_build_lib.SudoRunCommand(['touch', path], print_cmd=False)
253 cros_build_lib.SudoRunCommand(['chown', str(os.getuid()), path],
254 print_cmd=False)
255 cros_build_lib.SudoRunCommand(['chmod', '644', path], print_cmd=False)
Brian Harringb938c782012-02-29 15:14:38 -0800256
257
258def EnterChroot(chroot_path, chrome_root, chrome_root_mount, additional_args):
259 """Enters an existing SDK chroot"""
260 cmd = ENTER_CHROOT + ['--chroot', chroot_path]
261 if chrome_root:
262 cmd.extend(['--chrome_root', chrome_root])
263 if chrome_root_mount:
264 cmd.extend(['--chrome_root_mount', chrome_root_mount])
265 if len(additional_args) > 0:
266 cmd.append('--')
267 cmd.extend(additional_args)
Brian Harring7199e7d2012-03-23 04:10:08 -0700268
269 ret = cros_build_lib.RunCommand(cmd, print_cmd=False, error_code_ok=True)
270 # If we were in interactive mode, ignore the exit code; it'll be whatever
271 # they last ran w/in the chroot and won't matter to us one way or another.
272 # Note this does allow chroot entrance to fail and be ignored during
273 # interactive; this is however a rare case and the user will immediately
274 # see it (nor will they be checking the exit code manually).
275 if ret.returncode != 0 and additional_args:
276 raise SystemExit('Running %r failed with exit code %i'
277 % (cmd, ret.returncode))
Brian Harringb938c782012-02-29 15:14:38 -0800278
279
Brian Harring6be2efc2012-03-01 05:04:00 -0800280def main(argv):
Brian Harringb938c782012-02-29 15:14:38 -0800281 # TODO(ferringb): make argv required once depot_tools is fixed.
Zdenek Behanfd0efe42012-04-13 04:36:40 +0200282 usage = """usage: %prog [options] [VAR1=val1 .. VARn=valn -- <args>]
Brian Harringb938c782012-02-29 15:14:38 -0800283
284This script manages a local CrOS SDK chroot. Depending on the flags,
285it can download, build or enter a chroot.
286
287Action taken is the following:
288--enter (default) .. Installs and enters a chroot
289--download .. Just download a chroot (enter if combined with --enter)
290--bootstrap .. Builds a chroot from source (enter if --enter)
291--delete .. Removes a chroot
292"""
293 sdk_latest_version = GetLatestVersion()
294 parser = optparse.OptionParser(usage)
295 # Actions:
Brian Harring0ebc33c2012-05-25 13:36:19 -0700296 parser.add_option('--bootstrap',
Brian Harringb938c782012-02-29 15:14:38 -0800297 action='store_true', dest='bootstrap', default=False,
298 help=('Build a new SDK chroot from source'))
Brian Harring0ebc33c2012-05-25 13:36:19 -0700299 parser.add_option('--delete',
Brian Harringb938c782012-02-29 15:14:38 -0800300 action='store_true', dest='delete', default=False,
301 help=('Delete the current SDK chroot'))
Brian Harring0ebc33c2012-05-25 13:36:19 -0700302 parser.add_option('--download',
Brian Harringb938c782012-02-29 15:14:38 -0800303 action='store_true', dest='download', default=False,
304 help=('Download and install a prebuilt SDK'))
Brian Harring0ebc33c2012-05-25 13:36:19 -0700305 parser.add_option('--enter',
Brian Harringb938c782012-02-29 15:14:38 -0800306 action='store_true', dest='enter', default=False,
307 help=('Enter the SDK chroot, possibly (re)create first'))
308
309 # Global options:
Brian Harring0ebc33c2012-05-25 13:36:19 -0700310 parser.add_option('--chroot',
Brian Harringb938c782012-02-29 15:14:38 -0800311 dest='chroot', default=constants.DEFAULT_CHROOT_DIR,
312 help=('SDK chroot dir name [%s]' %
313 constants.DEFAULT_CHROOT_DIR))
314
315 # Additional options:
Brian Harring0ebc33c2012-05-25 13:36:19 -0700316 parser.add_option('--chrome_root',
Brian Harringb938c782012-02-29 15:14:38 -0800317 dest='chrome_root', default='',
318 help=('Mount this chrome root into the SDK chroot'))
Brian Harring0ebc33c2012-05-25 13:36:19 -0700319 parser.add_option('--chrome_root_mount',
Brian Harringb938c782012-02-29 15:14:38 -0800320 dest='chrome_root_mount', default='',
321 help=('Mount chrome into this path inside SDK chroot'))
322 parser.add_option('-r', '--replace',
323 action='store_true', dest='replace', default=False,
324 help=('Replace an existing SDK chroot'))
325 parser.add_option('-u', '--url',
326 dest='sdk_url', default='',
327 help=('''Use sdk tarball located at this url.
328 Use file:// for local files.'''))
329 parser.add_option('-v', '--version',
330 dest='sdk_version', default='',
331 help=('Use this sdk version [%s]' % sdk_latest_version))
Brian Harring0ebc33c2012-05-25 13:36:19 -0700332 parser.add_option('--debug', action='store_true', default=False,
333 help="Show debugging messages.")
Brian Harringb938c782012-02-29 15:14:38 -0800334 (options, remaining_arguments) = parser.parse_args(argv)
335
Brian Harring0ebc33c2012-05-25 13:36:19 -0700336 # Setup logging levels first so any parsing triggered log messages
337 # are appropriately filtered.
338 logging.getLogger().setLevel(
339 logging.DEBUG if options.debug else logging.INFO)
340
Brian Harringb938c782012-02-29 15:14:38 -0800341 # Some sanity checks first, before we ask for sudo credentials.
342 if cros_build_lib.IsInsideChroot():
Brian Harring98b54902012-03-23 04:05:42 -0700343 parser.error("This needs to be ran outside the chroot")
Brian Harringb938c782012-02-29 15:14:38 -0800344
Brian Harring98b54902012-03-23 04:05:42 -0700345 missing = CheckPrerequisites(NEEDED_TOOLS)
346 if missing:
347 parser.error((
348 'The tool(s) %s were not found.'
349 'Please install the appropriate package in your host.'
350 'Example(ubuntu):'
351 ' sudo apt-get install <packagename>'
352 % (', '.join(missing))))
Brian Harringb938c782012-02-29 15:14:38 -0800353
354 # Default action is --enter, if no other is selected.
355 if not (options.bootstrap or options.download or options.delete):
356 options.enter = True
357
358 # Only --enter can process additional args as passthrough commands.
359 # Warn and exit for least surprise.
360 if len(remaining_arguments) > 0 and not options.enter:
Brian Harring98b54902012-03-23 04:05:42 -0700361 parser.error("Additional arguments are not permitted, unless running "
362 "with --enter")
Brian Harringb938c782012-02-29 15:14:38 -0800363
364 # Some actions can be combined, as they merely modify how is the chroot
365 # going to be made. The only option that hates all others is --delete.
366 if options.delete and \
367 (options.enter or options.download or options.bootstrap):
Brian Harring98b54902012-03-23 04:05:42 -0700368 parser.error("--delete cannot be combined with --enter, "
369 "--download or --bootstrap")
Brian Harringb938c782012-02-29 15:14:38 -0800370 # NOTE: --delete is a true hater, it doesn't like other options either, but
371 # those will hardly lead to confusion. Nobody can expect to pass --version to
372 # delete and actually change something.
373
374 if options.bootstrap and options.download:
Brian Harring98b54902012-03-23 04:05:42 -0700375 parser.error("Either --bootstrap or --download, not both")
Brian Harringb938c782012-02-29 15:14:38 -0800376
377 # Bootstrap will start off from a non-selectable stage3 tarball. Attempts to
378 # select sdk by version are confusing. Warn and exit. We can still specify a
379 # tarball by path or URL though.
380 if options.bootstrap and options.sdk_version:
Brian Harring98b54902012-03-23 04:05:42 -0700381 parser.error("Cannot use --version when bootstrapping")
Brian Harringb938c782012-02-29 15:14:38 -0800382
383 chroot_path = os.path.join(SRC_ROOT, options.chroot)
384 chroot_path = os.path.abspath(chroot_path)
385 chroot_path = os.path.normpath(chroot_path)
386
387 if not options.sdk_version:
388 sdk_version = sdk_latest_version
389 else:
390 sdk_version = options.sdk_version
391
392 if options.delete and not os.path.exists(chroot_path):
393 print "Not doing anything. The chroot you want to remove doesn't exist."
Brian Harring98b54902012-03-23 04:05:42 -0700394 return 0
Brian Harringb938c782012-02-29 15:14:38 -0800395
396 lock_path = os.path.dirname(chroot_path)
397 lock_path = os.path.join(lock_path,
398 '.%s_lock' % os.path.basename(chroot_path))
399 with sudo.SudoKeepAlive():
Brian Harring4e6412d2012-03-09 20:54:02 -0800400 with cgroups.SimpleContainChildren('cros_sdk'):
Brian Harringcfe762a2012-02-29 13:03:53 -0800401 _CreateLockFile(lock_path)
402 with locking.FileLock(lock_path, 'chroot lock') as lock:
403 if options.delete:
404 lock.write_lock()
405 DeleteChroot(chroot_path)
Brian Harring98b54902012-03-23 04:05:42 -0700406 return 0
Brian Harringb938c782012-02-29 15:14:38 -0800407
Brian Harringcfe762a2012-02-29 13:03:53 -0800408 # Print a suggestion for replacement, but not if running just --enter.
409 if os.path.exists(chroot_path) and not options.replace and \
410 (options.bootstrap or options.download):
411 print "Chroot already exists. Run with --replace to re-create."
Brian Harringb938c782012-02-29 15:14:38 -0800412
Brian Harringcfe762a2012-02-29 13:03:53 -0800413 # Chroot doesn't exist or asked to replace.
414 if not os.path.exists(chroot_path) or options.replace:
415 lock.write_lock()
416 if options.bootstrap:
417 BootstrapChroot(chroot_path, options.sdk_url,
418 options.replace)
419 else:
420 CreateChroot(options.sdk_url, sdk_version,
421 chroot_path, options.replace)
422 if options.enter:
423 lock.read_lock()
424 EnterChroot(chroot_path, options.chrome_root,
425 options.chrome_root_mount, remaining_arguments)