blob: 9057f387a3c5837e23e611e40bff26ef31bac17e [file] [log] [blame]
Alex Kleinda35fcf2019-03-07 16:01:15 -07001# Copyright 2019 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5"""Sysroot controller."""
6
Chris McDonald1672ddb2021-07-21 11:48:23 -06007import logging
Michael Mortensen4ccfb082020-01-22 16:24:03 -07008import os
9
Alex Klein8cb365a2019-05-15 16:24:53 -060010from chromite.api import controller
Alex Klein076841b2019-08-29 15:19:39 -060011from chromite.api import faux
Alex Klein2b236722019-06-19 15:44:26 -060012from chromite.api import validate
Alex Kleina9d500b2019-04-22 15:37:51 -060013from chromite.api.controller import controller_util
Chris McDonald1672ddb2021-07-21 11:48:23 -060014from chromite.api.gen.chromiumos import common_pb2
Will Bradley7e5b8c12019-07-30 12:44:15 -060015from chromite.api.metrics import deserialize_metrics_log
LaMont Jonesfeffd1b2020-08-05 18:24:59 -060016from chromite.lib import binpkg
George Engelbrechtc9a8e812021-06-16 18:14:17 -060017from chromite.lib import build_target_lib
18from chromite.lib import chroot_lib
Alex Kleinda35fcf2019-03-07 16:01:15 -070019from chromite.lib import cros_build_lib
Michael Mortensen798ee192020-01-17 13:04:43 -070020from chromite.lib import goma_lib
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -070021from chromite.lib import osutils
Alex Kleina9d64602019-05-17 14:55:37 -060022from chromite.lib import portage_util
Alex Kleinda35fcf2019-03-07 16:01:15 -070023from chromite.lib import sysroot_lib
24from chromite.service import sysroot
Will Bradley7e5b8c12019-07-30 12:44:15 -060025from chromite.utils import metrics
Alex Kleinda35fcf2019-03-07 16:01:15 -070026
Chris McDonald1672ddb2021-07-21 11:48:23 -060027
Alex Kleinda35fcf2019-03-07 16:01:15 -070028_ACCEPTED_LICENSES = '@CHROMEOS'
29
Alex Kleind4e1e422019-03-18 16:00:41 -060030
George Engelbrechtc9a8e812021-06-16 18:14:17 -060031def ExampleGetResponse():
32 """Give an example response to assemble upstream in caller artifacts."""
33 uabs = common_pb2.UploadedArtifactsByService
34 cabs = common_pb2.ArtifactsByService
35 return uabs.Sysroot(artifacts=[
Lizzy Preslandb2d60642021-11-12 01:41:58 +000036 uabs.Sysroot.ArtifactPaths(
George Engelbrecht35eeea42021-07-09 14:10:57 -060037 artifact_type=cabs.Sysroot.ArtifactType.SIMPLE_CHROME_SYSROOT,
38 paths=[
39 common_pb2.Path(
40 path='/tmp/sysroot_chromeos-base_chromeos-chrome.tar.xz',
41 location=common_pb2.Path.OUTSIDE)
42 ],
43 ),
George Engelbrechtc9a8e812021-06-16 18:14:17 -060044 uabs.Sysroot.ArtifactPaths(
45 artifact_type=cabs.Sysroot.ArtifactType.DEBUG_SYMBOLS,
46 paths=[
47 common_pb2.Path(
48 path='/tmp/debug.tgz', location=common_pb2.Path.OUTSIDE)
49 ],
50 ),
51 uabs.Sysroot.ArtifactPaths(
52 artifact_type=cabs.Sysroot.ArtifactType.BREAKPAD_DEBUG_SYMBOLS,
53 paths=[
54 common_pb2.Path(
55 path='/tmp/debug_breakpad.tar.xz',
56 location=common_pb2.Path.OUTSIDE)
57 ])
58 ])
59
60
61def GetArtifacts(in_proto: common_pb2.ArtifactsByService.Sysroot,
Lizzy Preslandb2d60642021-11-12 01:41:58 +000062 chroot: chroot_lib.Chroot, sysroot_class: sysroot_lib.Sysroot,
63 build_target: build_target_lib.BuildTarget, output_dir: str
64 ) -> list:
George Engelbrechtc9a8e812021-06-16 18:14:17 -060065 """Builds and copies sysroot artifacts to specified output_dir.
66
67 Copies sysroot artifacts to output_dir, returning a list of (output_dir: str)
68 paths to the desired files.
69
70 Args:
71 in_proto: Proto request defining reqs.
72 chroot: The chroot class used for these artifacts.
73 sysroot_class: The sysroot class used for these artifacts.
74 build_target: The build target used for these artifacts.
75 output_dir: The path to write artifacts to.
76
77 Returns:
78 A list of dictionary mappings of ArtifactType to list of paths.
79 """
80 generated = []
Jack Neus5e56fef2021-06-18 16:57:28 +000081 artifact_types = {
Lizzy Preslandb2d60642021-11-12 01:41:58 +000082 in_proto.ArtifactType.SIMPLE_CHROME_SYSROOT:
83 sysroot.CreateSimpleChromeSysroot,
84 in_proto.ArtifactType.CHROME_EBUILD_ENV: sysroot.CreateChromeEbuildEnv,
85 in_proto.ArtifactType.BREAKPAD_DEBUG_SYMBOLS:
86 sysroot.BundleBreakpadSymbols,
87 in_proto.ArtifactType.DEBUG_SYMBOLS: sysroot.BundleDebugSymbols,
Jack Neus5e56fef2021-06-18 16:57:28 +000088 }
89
George Engelbrechtc9a8e812021-06-16 18:14:17 -060090 for output_artifact in in_proto.output_artifacts:
Jack Neus5e56fef2021-06-18 16:57:28 +000091 for artifact_type, func in artifact_types.items():
92 if artifact_type in output_artifact.artifact_types:
93 result = func(chroot, sysroot_class, build_target, output_dir)
94 if result:
95 generated.append({
96 'paths': [result] if isinstance(result, str) else result,
97 'type': artifact_type,
98 })
99
George Engelbrechtc9a8e812021-06-16 18:14:17 -0600100 return generated
101
102
Alex Klein076841b2019-08-29 15:19:39 -0600103@faux.all_empty
Alex Klein2b236722019-06-19 15:44:26 -0600104@validate.require('build_target.name')
Alex Klein231d2da2019-07-22 16:44:45 -0600105@validate.validation_complete
106def Create(input_proto, output_proto, _config):
Alex Kleinda35fcf2019-03-07 16:01:15 -0700107 """Create or replace a sysroot."""
108 update_chroot = not input_proto.flags.chroot_current
109 replace_sysroot = input_proto.flags.replace
110
Alex Klein26e472b2020-03-10 14:35:01 -0600111 build_target = controller_util.ParseBuildTarget(input_proto.build_target,
112 input_proto.profile)
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600113 package_indexes = [
114 binpkg.PackageIndexInfo.from_protobuf(x)
115 for x in input_proto.package_indexes
116 ]
Alex Kleind4e1e422019-03-18 16:00:41 -0600117 run_configs = sysroot.SetupBoardRunConfig(
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600118 force=replace_sysroot, upgrade_chroot=update_chroot,
119 package_indexes=package_indexes)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700120
121 try:
122 created = sysroot.Create(build_target, run_configs,
123 accept_licenses=_ACCEPTED_LICENSES)
124 except sysroot.Error as e:
Mike Frysinger6b5c3cd2019-08-27 16:51:00 -0400125 cros_build_lib.Die(e)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700126
127 output_proto.sysroot.path = created.path
Alex Klein26e472b2020-03-10 14:35:01 -0600128 output_proto.sysroot.build_target.name = build_target.name
Alex Kleinda35fcf2019-03-07 16:01:15 -0700129
Alex Klein076841b2019-08-29 15:19:39 -0600130 return controller.RETURN_CODE_SUCCESS
Alex Kleinda35fcf2019-03-07 16:01:15 -0700131
Alex Klein076841b2019-08-29 15:19:39 -0600132
Michael Mortensen98592f62019-09-27 13:34:18 -0600133@faux.all_empty
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700134@validate.require('build_target.name', 'packages')
Alex Klein45b73432020-09-23 13:51:20 -0600135@validate.require_each('packages', ['category', 'package_name'])
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700136@validate.validation_complete
137def GenerateArchive(input_proto, output_proto, _config):
138 """Generate a sysroot. Typically used by informational builders."""
139 build_target_name = input_proto.build_target.name
140 pkg_list = []
141 for package in input_proto.packages:
142 pkg_list.append('%s/%s' % (package.category, package.package_name))
143
144 with osutils.TempDir(delete=False) as temp_output_dir:
145 sysroot_tar_path = sysroot.GenerateArchive(temp_output_dir,
146 build_target_name,
147 pkg_list)
148
149 # By assigning this Path variable to the tar path, the tar file will be
150 # copied out to the input_proto's ResultPath location.
151 output_proto.sysroot_archive.path = sysroot_tar_path
Alex Klein6b499df2020-11-19 14:26:56 -0700152 output_proto.sysroot_archive.location = common_pb2.Path.INSIDE
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700153
154
Alex Klein076841b2019-08-29 15:19:39 -0600155def _MockFailedPackagesResponse(_input_proto, output_proto, _config):
156 """Mock error response that populates failed packages."""
157 pkg = output_proto.failed_packages.add()
158 pkg.package_name = 'package'
159 pkg.category = 'category'
160 pkg.version = '1.0.0_rc-r1'
161
162 pkg2 = output_proto.failed_packages.add()
163 pkg2.package_name = 'bar'
164 pkg2.category = 'foo'
165 pkg2.version = '3.7-r99'
166
167
168@faux.empty_success
169@faux.error(_MockFailedPackagesResponse)
Alex Klein2b236722019-06-19 15:44:26 -0600170@validate.require('sysroot.path', 'sysroot.build_target.name')
Alex Klein231d2da2019-07-22 16:44:45 -0600171@validate.exists('sysroot.path')
172@validate.validation_complete
173def InstallToolchain(input_proto, output_proto, _config):
Alex Klein2b236722019-06-19 15:44:26 -0600174 """Install the toolchain into a sysroot."""
Chris McDonald68faa2a2020-01-13 12:23:05 -0700175 compile_source = (
176 input_proto.flags.compile_source or input_proto.flags.toolchain_changed)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700177
178 sysroot_path = input_proto.sysroot.path
Alex Kleinda35fcf2019-03-07 16:01:15 -0700179
Alex Klein26e472b2020-03-10 14:35:01 -0600180 build_target = controller_util.ParseBuildTarget(
181 input_proto.sysroot.build_target)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700182 target_sysroot = sysroot_lib.Sysroot(sysroot_path)
Alex Klein6682ae12019-06-25 13:50:32 -0600183 run_configs = sysroot.SetupBoardRunConfig(usepkg=not compile_source)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700184
Alex Kleina9d64602019-05-17 14:55:37 -0600185 _LogBinhost(build_target.name)
186
Alex Kleinda35fcf2019-03-07 16:01:15 -0700187 try:
188 sysroot.InstallToolchain(build_target, target_sysroot, run_configs)
189 except sysroot_lib.ToolchainInstallError as e:
190 # Error installing - populate the failed package info.
Alex Kleinea0c89e2021-09-09 15:17:35 -0600191 for pkg_info in e.failed_toolchain_info:
192 package_info_msg = output_proto.failed_packages.add()
193 controller_util.serialize_package_info(pkg_info, package_info_msg)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700194
Alex Klein8cb365a2019-05-15 16:24:53 -0600195 return controller.RETURN_CODE_UNSUCCESSFUL_RESPONSE_AVAILABLE
Alex Kleind4e1e422019-03-18 16:00:41 -0600196
Alex Klein076841b2019-08-29 15:19:39 -0600197 return controller.RETURN_CODE_SUCCESS
Alex Kleind4e1e422019-03-18 16:00:41 -0600198
Alex Klein076841b2019-08-29 15:19:39 -0600199
200@faux.empty_success
201@faux.error(_MockFailedPackagesResponse)
Alex Klein566d80e2019-09-24 12:27:58 -0600202@validate.require('sysroot.build_target.name')
203@validate.exists('sysroot.path')
Alex Klein45b73432020-09-23 13:51:20 -0600204@validate.require_each('packages', ['category', 'package_name'])
205@validate.require_each('use_flags', ['flag'])
Alex Klein231d2da2019-07-22 16:44:45 -0600206@validate.validation_complete
Will Bradley7e5b8c12019-07-30 12:44:15 -0600207@metrics.collect_metrics
Alex Klein231d2da2019-07-22 16:44:45 -0600208def InstallPackages(input_proto, output_proto, _config):
Alex Klein2b236722019-06-19 15:44:26 -0600209 """Install packages into a sysroot, building as necessary and permitted."""
Chris McDonald68faa2a2020-01-13 12:23:05 -0700210 compile_source = (
211 input_proto.flags.compile_source or input_proto.flags.toolchain_changed)
LaMont Jones6dc755b2020-07-17 12:06:29 -0600212 # Testing if Goma will support unknown compilers now.
213 use_goma = input_proto.flags.use_goma
Alex Kleind4e1e422019-03-18 16:00:41 -0600214
Alex Klein566d80e2019-09-24 12:27:58 -0600215 target_sysroot = sysroot_lib.Sysroot(input_proto.sysroot.path)
216 build_target = controller_util.ParseBuildTarget(
217 input_proto.sysroot.build_target)
Alex Kleinca572ee2020-09-03 10:47:14 -0600218
219 # Get the package atom for each specified package. The field is optional, so
220 # error only when we cannot parse an atom for each of the given packages.
221 packages = [controller_util.PackageInfoToCPV(x).cp
Mike Frysinger66ce4132019-07-17 22:52:52 -0400222 for x in input_proto.packages]
Alex Kleinca572ee2020-09-03 10:47:14 -0600223
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600224 package_indexes = [
225 binpkg.PackageIndexInfo.from_protobuf(x)
226 for x in input_proto.package_indexes
227 ]
Alex Kleind4e1e422019-03-18 16:00:41 -0600228
Navil Perez5766d1b2021-05-26 17:38:15 +0000229 # Calculate which packages would have been merged, but don't install anything.
230 dryrun = input_proto.flags.dryrun
231
Alex Kleind4e1e422019-03-18 16:00:41 -0600232 if not target_sysroot.IsToolchainInstalled():
233 cros_build_lib.Die('Toolchain must first be installed.')
234
Alex Kleina9d64602019-05-17 14:55:37 -0600235 _LogBinhost(build_target.name)
236
Alex Kleinbe0bae42019-05-06 13:01:49 -0600237 use_flags = [u.flag for u in input_proto.use_flags]
Alex Kleind4e1e422019-03-18 16:00:41 -0600238 build_packages_config = sysroot.BuildPackagesRunConfig(
Alex Klein566d80e2019-09-24 12:27:58 -0600239 usepkg=not compile_source,
240 install_debug_symbols=True,
241 packages=packages,
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600242 package_indexes=package_indexes,
Alex Klein566d80e2019-09-24 12:27:58 -0600243 use_flags=use_flags,
Alex Klein5b940482019-12-26 10:38:39 -0700244 use_goma=use_goma,
Alex Kleineb76da72021-03-19 10:43:09 -0600245 incremental_build=False,
Navil Perez5766d1b2021-05-26 17:38:15 +0000246 setup_board=False,
247 dryrun=dryrun)
Alex Kleind4e1e422019-03-18 16:00:41 -0600248
249 try:
250 sysroot.BuildPackages(build_target, target_sysroot, build_packages_config)
251 except sysroot_lib.PackageInstallError as e:
Alex Klein2557b4f2019-07-11 14:34:00 -0600252 if not e.failed_packages:
253 # No packages to report, so just exit with an error code.
254 return controller.RETURN_CODE_COMPLETED_UNSUCCESSFULLY
255
256 # We need to report the failed packages.
Alex Kleinea0c89e2021-09-09 15:17:35 -0600257 for pkg_info in e.failed_packages:
258 package_info_msg = output_proto.failed_packages.add()
259 controller_util.serialize_package_info(pkg_info, package_info_msg)
Alex Kleind4e1e422019-03-18 16:00:41 -0600260
Alex Klein8cb365a2019-05-15 16:24:53 -0600261 return controller.RETURN_CODE_UNSUCCESSFUL_RESPONSE_AVAILABLE
Alex Kleina9d64602019-05-17 14:55:37 -0600262
Navil Perez5766d1b2021-05-26 17:38:15 +0000263 # Return without populating the response if it is a dryrun.
264 if dryrun:
265 return controller.RETURN_CODE_SUCCESS
266
Michael Mortensen798ee192020-01-17 13:04:43 -0700267 # Copy goma logs to specified directory if there is a goma_config and
268 # it contains a log_dir to store artifacts.
269 if input_proto.goma_config.log_dir.dir:
Michael Mortensen4ccfb082020-01-22 16:24:03 -0700270 # Get the goma log directory based on the GLOG_log_dir env variable.
271 # TODO(crbug.com/1045001): Replace environment variable with query to
272 # goma object after goma refactoring allows this.
273 log_source_dir = os.getenv('GLOG_log_dir')
274 if not log_source_dir:
275 cros_build_lib.Die('GLOG_log_dir must be defined.')
Michael Mortensen798ee192020-01-17 13:04:43 -0700276 archiver = goma_lib.LogsArchiver(
Michael Mortensen4ccfb082020-01-22 16:24:03 -0700277 log_source_dir,
Michael Mortensen798ee192020-01-17 13:04:43 -0700278 dest_dir=input_proto.goma_config.log_dir.dir,
279 stats_file=input_proto.goma_config.stats_file,
280 counterz_file=input_proto.goma_config.counterz_file)
281 archiver_tuple = archiver.Archive()
282 if archiver_tuple.stats_file:
283 output_proto.goma_artifacts.stats_file = archiver_tuple.stats_file
284 if archiver_tuple.counterz_file:
Michael Mortensen1c7439c2020-01-24 14:43:19 -0700285 output_proto.goma_artifacts.counterz_file = archiver_tuple.counterz_file
Michael Mortensen798ee192020-01-17 13:04:43 -0700286 output_proto.goma_artifacts.log_files[:] = archiver_tuple.log_files
287
Will Bradley7e5b8c12019-07-30 12:44:15 -0600288 # Read metric events log and pipe them into output_proto.events.
Alex Klein566d80e2019-09-24 12:27:58 -0600289 deserialize_metrics_log(output_proto.events, prefix=build_target.name)
Will Bradley7e5b8c12019-07-30 12:44:15 -0600290
Alex Kleina9d64602019-05-17 14:55:37 -0600291
292def _LogBinhost(board):
293 """Log the portage binhost for the given board."""
294 binhost = portage_util.PortageqEnvvar('PORTAGE_BINHOST', board=board,
295 allow_undefined=True)
296 if not binhost:
297 logging.warning('Portage Binhost not found.')
298 else:
299 logging.info('Portage Binhost: %s', binhost)