blob: f4ce69b357ea2a87253ea2cf02dc8f50c29d3b1f [file] [log] [blame]
Alex Kleinda35fcf2019-03-07 16:01:15 -07001# Copyright 2019 The Chromium OS Authors. All rights reserved.
2# Use of this source code is governed by a BSD-style license that can be
3# found in the LICENSE file.
4
5"""Sysroot controller."""
6
Chris McDonald1672ddb2021-07-21 11:48:23 -06007import logging
Michael Mortensen4ccfb082020-01-22 16:24:03 -07008import os
9
Alex Klein8cb365a2019-05-15 16:24:53 -060010from chromite.api import controller
Alex Klein076841b2019-08-29 15:19:39 -060011from chromite.api import faux
Alex Klein2b236722019-06-19 15:44:26 -060012from chromite.api import validate
Alex Kleina9d500b2019-04-22 15:37:51 -060013from chromite.api.controller import controller_util
Chris McDonald1672ddb2021-07-21 11:48:23 -060014from chromite.api.gen.chromiumos import common_pb2
Will Bradley7e5b8c12019-07-30 12:44:15 -060015from chromite.api.metrics import deserialize_metrics_log
LaMont Jonesfeffd1b2020-08-05 18:24:59 -060016from chromite.lib import binpkg
George Engelbrechtc9a8e812021-06-16 18:14:17 -060017from chromite.lib import build_target_lib
18from chromite.lib import chroot_lib
Alex Kleinda35fcf2019-03-07 16:01:15 -070019from chromite.lib import cros_build_lib
Michael Mortensen798ee192020-01-17 13:04:43 -070020from chromite.lib import goma_lib
Alex Kleinaef41942022-04-19 14:13:17 -060021from chromite.lib import metrics_lib
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -070022from chromite.lib import osutils
Alex Kleina9d64602019-05-17 14:55:37 -060023from chromite.lib import portage_util
Alex Kleinda35fcf2019-03-07 16:01:15 -070024from chromite.lib import sysroot_lib
25from chromite.service import sysroot
26
Chris McDonald1672ddb2021-07-21 11:48:23 -060027
Alex Kleinda35fcf2019-03-07 16:01:15 -070028_ACCEPTED_LICENSES = '@CHROMEOS'
29
Alex Kleind4e1e422019-03-18 16:00:41 -060030
Yoshiki Iguchia43704b2021-12-16 13:31:48 +090031def _GetGomaLogDirectory():
32 """Get goma's log directory based on the env variables.
33
34 Returns:
35 a string of a directory name where goma's log may exist, or None if no
36 potential directories exist.
37 """
38 # TODO(crbug.com/1045001): Replace environment variable with query to
39 # goma object after goma refactoring allows this.
40 candidates = [
Alex Kleind066b0f2022-07-28 08:47:35 -060041 'GLOG_log_dir',
42 'GOOGLE_LOG_DIR',
43 'TEST_TMPDIR',
44 'TMPDIR',
45 'TMP',
46 ]
Yoshiki Iguchia43704b2021-12-16 13:31:48 +090047 for candidate in candidates:
48 value = os.environ.get(candidate)
49 if value and os.path.isdir(value):
50 return value
51
52 # "/tmp" will always exist.
53 return '/tmp'
54
55
George Engelbrechtc9a8e812021-06-16 18:14:17 -060056def ExampleGetResponse():
57 """Give an example response to assemble upstream in caller artifacts."""
58 uabs = common_pb2.UploadedArtifactsByService
59 cabs = common_pb2.ArtifactsByService
60 return uabs.Sysroot(artifacts=[
Lizzy Preslandb2d60642021-11-12 01:41:58 +000061 uabs.Sysroot.ArtifactPaths(
George Engelbrecht35eeea42021-07-09 14:10:57 -060062 artifact_type=cabs.Sysroot.ArtifactType.SIMPLE_CHROME_SYSROOT,
63 paths=[
64 common_pb2.Path(
65 path='/tmp/sysroot_chromeos-base_chromeos-chrome.tar.xz',
66 location=common_pb2.Path.OUTSIDE)
67 ],
68 ),
George Engelbrechtc9a8e812021-06-16 18:14:17 -060069 uabs.Sysroot.ArtifactPaths(
70 artifact_type=cabs.Sysroot.ArtifactType.DEBUG_SYMBOLS,
71 paths=[
72 common_pb2.Path(
73 path='/tmp/debug.tgz', location=common_pb2.Path.OUTSIDE)
74 ],
75 ),
76 uabs.Sysroot.ArtifactPaths(
77 artifact_type=cabs.Sysroot.ArtifactType.BREAKPAD_DEBUG_SYMBOLS,
78 paths=[
79 common_pb2.Path(
80 path='/tmp/debug_breakpad.tar.xz',
81 location=common_pb2.Path.OUTSIDE)
82 ])
83 ])
84
85
86def GetArtifacts(in_proto: common_pb2.ArtifactsByService.Sysroot,
Lizzy Preslandb2d60642021-11-12 01:41:58 +000087 chroot: chroot_lib.Chroot, sysroot_class: sysroot_lib.Sysroot,
Alex Kleind066b0f2022-07-28 08:47:35 -060088 build_target: build_target_lib.BuildTarget,
89 output_dir: str) -> list:
George Engelbrechtc9a8e812021-06-16 18:14:17 -060090 """Builds and copies sysroot artifacts to specified output_dir.
91
92 Copies sysroot artifacts to output_dir, returning a list of (output_dir: str)
93 paths to the desired files.
94
95 Args:
96 in_proto: Proto request defining reqs.
97 chroot: The chroot class used for these artifacts.
98 sysroot_class: The sysroot class used for these artifacts.
99 build_target: The build target used for these artifacts.
100 output_dir: The path to write artifacts to.
101
102 Returns:
103 A list of dictionary mappings of ArtifactType to list of paths.
104 """
105 generated = []
Jack Neus5e56fef2021-06-18 16:57:28 +0000106 artifact_types = {
Lizzy Preslandb2d60642021-11-12 01:41:58 +0000107 in_proto.ArtifactType.SIMPLE_CHROME_SYSROOT:
108 sysroot.CreateSimpleChromeSysroot,
Alex Kleind066b0f2022-07-28 08:47:35 -0600109 in_proto.ArtifactType.CHROME_EBUILD_ENV:
110 sysroot.CreateChromeEbuildEnv,
Lizzy Preslandb2d60642021-11-12 01:41:58 +0000111 in_proto.ArtifactType.BREAKPAD_DEBUG_SYMBOLS:
112 sysroot.BundleBreakpadSymbols,
Alex Kleind066b0f2022-07-28 08:47:35 -0600113 in_proto.ArtifactType.DEBUG_SYMBOLS:
114 sysroot.BundleDebugSymbols,
Jack Neus5e56fef2021-06-18 16:57:28 +0000115 }
116
George Engelbrechtc9a8e812021-06-16 18:14:17 -0600117 for output_artifact in in_proto.output_artifacts:
Jack Neus5e56fef2021-06-18 16:57:28 +0000118 for artifact_type, func in artifact_types.items():
119 if artifact_type in output_artifact.artifact_types:
120 result = func(chroot, sysroot_class, build_target, output_dir)
121 if result:
122 generated.append({
123 'paths': [result] if isinstance(result, str) else result,
124 'type': artifact_type,
125 })
126
George Engelbrechtc9a8e812021-06-16 18:14:17 -0600127 return generated
128
129
Alex Klein076841b2019-08-29 15:19:39 -0600130@faux.all_empty
Alex Klein2b236722019-06-19 15:44:26 -0600131@validate.require('build_target.name')
Alex Klein231d2da2019-07-22 16:44:45 -0600132@validate.validation_complete
133def Create(input_proto, output_proto, _config):
Alex Kleinda35fcf2019-03-07 16:01:15 -0700134 """Create or replace a sysroot."""
135 update_chroot = not input_proto.flags.chroot_current
136 replace_sysroot = input_proto.flags.replace
137
Alex Klein26e472b2020-03-10 14:35:01 -0600138 build_target = controller_util.ParseBuildTarget(input_proto.build_target,
139 input_proto.profile)
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600140 package_indexes = [
141 binpkg.PackageIndexInfo.from_protobuf(x)
142 for x in input_proto.package_indexes
143 ]
Alex Kleind4e1e422019-03-18 16:00:41 -0600144 run_configs = sysroot.SetupBoardRunConfig(
Alex Kleind066b0f2022-07-28 08:47:35 -0600145 force=replace_sysroot,
146 upgrade_chroot=update_chroot,
147 package_indexes=package_indexes,
148 )
Alex Kleinda35fcf2019-03-07 16:01:15 -0700149
150 try:
Alex Kleind066b0f2022-07-28 08:47:35 -0600151 created = sysroot.Create(
152 build_target, run_configs, accept_licenses=_ACCEPTED_LICENSES)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700153 except sysroot.Error as e:
Mike Frysinger6b5c3cd2019-08-27 16:51:00 -0400154 cros_build_lib.Die(e)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700155
156 output_proto.sysroot.path = created.path
Alex Klein26e472b2020-03-10 14:35:01 -0600157 output_proto.sysroot.build_target.name = build_target.name
Alex Kleinda35fcf2019-03-07 16:01:15 -0700158
Alex Klein076841b2019-08-29 15:19:39 -0600159 return controller.RETURN_CODE_SUCCESS
Alex Kleinda35fcf2019-03-07 16:01:15 -0700160
Alex Klein076841b2019-08-29 15:19:39 -0600161
Michael Mortensen98592f62019-09-27 13:34:18 -0600162@faux.all_empty
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700163@validate.require('build_target.name', 'packages')
Alex Klein45b73432020-09-23 13:51:20 -0600164@validate.require_each('packages', ['category', 'package_name'])
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700165@validate.validation_complete
166def GenerateArchive(input_proto, output_proto, _config):
167 """Generate a sysroot. Typically used by informational builders."""
168 build_target_name = input_proto.build_target.name
169 pkg_list = []
170 for package in input_proto.packages:
171 pkg_list.append('%s/%s' % (package.category, package.package_name))
172
173 with osutils.TempDir(delete=False) as temp_output_dir:
174 sysroot_tar_path = sysroot.GenerateArchive(temp_output_dir,
Alex Kleind066b0f2022-07-28 08:47:35 -0600175 build_target_name, pkg_list)
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700176
177 # By assigning this Path variable to the tar path, the tar file will be
178 # copied out to the input_proto's ResultPath location.
179 output_proto.sysroot_archive.path = sysroot_tar_path
Alex Klein6b499df2020-11-19 14:26:56 -0700180 output_proto.sysroot_archive.location = common_pb2.Path.INSIDE
Michael Mortensen3f6b4bd2020-02-07 14:16:43 -0700181
182
Alex Klein076841b2019-08-29 15:19:39 -0600183def _MockFailedPackagesResponse(_input_proto, output_proto, _config):
184 """Mock error response that populates failed packages."""
Lizzy Presland7e23a612021-11-09 21:49:42 +0000185 fail = output_proto.failed_package_data.add()
186 fail.name.package_name = 'package'
187 fail.name.category = 'category'
188 fail.name.version = '1.0.0_rc-r1'
189 fail.log_path.path = '/path/to/package:category-1.0.0_rc-r1:20210609-1337.log'
190 fail.log_path.location = common_pb2.Path.INSIDE
191
192 fail2 = output_proto.failed_package_data.add()
193 fail2.name.package_name = 'bar'
194 fail2.name.category = 'foo'
195 fail2.name.version = '3.7-r99'
196 fail2.log_path.path = '/path/to/foo:bar-3.7-r99:20210609-1620.log'
197 fail2.log_path.location = common_pb2.Path.INSIDE
198
Alex Klein076841b2019-08-29 15:19:39 -0600199
200@faux.empty_success
201@faux.error(_MockFailedPackagesResponse)
Alex Klein2b236722019-06-19 15:44:26 -0600202@validate.require('sysroot.path', 'sysroot.build_target.name')
Alex Klein231d2da2019-07-22 16:44:45 -0600203@validate.exists('sysroot.path')
204@validate.validation_complete
205def InstallToolchain(input_proto, output_proto, _config):
Alex Klein2b236722019-06-19 15:44:26 -0600206 """Install the toolchain into a sysroot."""
Chris McDonald68faa2a2020-01-13 12:23:05 -0700207 compile_source = (
208 input_proto.flags.compile_source or input_proto.flags.toolchain_changed)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700209
210 sysroot_path = input_proto.sysroot.path
Alex Kleinda35fcf2019-03-07 16:01:15 -0700211
Alex Klein26e472b2020-03-10 14:35:01 -0600212 build_target = controller_util.ParseBuildTarget(
213 input_proto.sysroot.build_target)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700214 target_sysroot = sysroot_lib.Sysroot(sysroot_path)
Alex Klein6682ae12019-06-25 13:50:32 -0600215 run_configs = sysroot.SetupBoardRunConfig(usepkg=not compile_source)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700216
Alex Kleina9d64602019-05-17 14:55:37 -0600217 _LogBinhost(build_target.name)
218
Alex Kleinda35fcf2019-03-07 16:01:15 -0700219 try:
220 sysroot.InstallToolchain(build_target, target_sysroot, run_configs)
221 except sysroot_lib.ToolchainInstallError as e:
Lizzy Presland084c20f2022-03-30 19:13:50 +0000222 controller_util.retrieve_package_log_paths(e.failed_toolchain_info,
223 output_proto, target_sysroot)
Alex Kleinda35fcf2019-03-07 16:01:15 -0700224
Alex Klein8cb365a2019-05-15 16:24:53 -0600225 return controller.RETURN_CODE_UNSUCCESSFUL_RESPONSE_AVAILABLE
Alex Kleind4e1e422019-03-18 16:00:41 -0600226
Alex Klein076841b2019-08-29 15:19:39 -0600227 return controller.RETURN_CODE_SUCCESS
Alex Kleind4e1e422019-03-18 16:00:41 -0600228
Alex Klein076841b2019-08-29 15:19:39 -0600229
230@faux.empty_success
231@faux.error(_MockFailedPackagesResponse)
Alex Klein566d80e2019-09-24 12:27:58 -0600232@validate.require('sysroot.build_target.name')
233@validate.exists('sysroot.path')
Alex Klein45b73432020-09-23 13:51:20 -0600234@validate.require_each('packages', ['category', 'package_name'])
235@validate.require_each('use_flags', ['flag'])
Alex Klein231d2da2019-07-22 16:44:45 -0600236@validate.validation_complete
Alex Kleinaef41942022-04-19 14:13:17 -0600237@metrics_lib.collect_metrics
Alex Klein231d2da2019-07-22 16:44:45 -0600238def InstallPackages(input_proto, output_proto, _config):
Alex Klein2b236722019-06-19 15:44:26 -0600239 """Install packages into a sysroot, building as necessary and permitted."""
Chris McDonald68faa2a2020-01-13 12:23:05 -0700240 compile_source = (
241 input_proto.flags.compile_source or input_proto.flags.toolchain_changed)
Joanna Wang1ec0c812021-11-17 17:41:27 -0800242
Joanna Wangf773c1b2021-12-09 11:46:44 -0800243 use_remoteexec = bool(input_proto.remoteexec_config.reproxy_cfg_file and
244 input_proto.remoteexec_config.reclient_dir)
Joanna Wang1ec0c812021-11-17 17:41:27 -0800245
LaMont Jones6dc755b2020-07-17 12:06:29 -0600246 # Testing if Goma will support unknown compilers now.
Joanna Wang1ec0c812021-11-17 17:41:27 -0800247 use_goma = input_proto.flags.use_goma and not use_remoteexec
Alex Kleind4e1e422019-03-18 16:00:41 -0600248
Alex Klein566d80e2019-09-24 12:27:58 -0600249 target_sysroot = sysroot_lib.Sysroot(input_proto.sysroot.path)
250 build_target = controller_util.ParseBuildTarget(
251 input_proto.sysroot.build_target)
Alex Kleinca572ee2020-09-03 10:47:14 -0600252
253 # Get the package atom for each specified package. The field is optional, so
254 # error only when we cannot parse an atom for each of the given packages.
Alex Kleind066b0f2022-07-28 08:47:35 -0600255 packages = [
256 controller_util.PackageInfoToCPV(x).cp for x in input_proto.packages
257 ]
Alex Kleinca572ee2020-09-03 10:47:14 -0600258
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600259 package_indexes = [
260 binpkg.PackageIndexInfo.from_protobuf(x)
261 for x in input_proto.package_indexes
262 ]
Alex Kleind4e1e422019-03-18 16:00:41 -0600263
Navil Perez5766d1b2021-05-26 17:38:15 +0000264 # Calculate which packages would have been merged, but don't install anything.
265 dryrun = input_proto.flags.dryrun
266
Alex Kleind4e1e422019-03-18 16:00:41 -0600267 if not target_sysroot.IsToolchainInstalled():
268 cros_build_lib.Die('Toolchain must first be installed.')
269
Alex Kleina9d64602019-05-17 14:55:37 -0600270 _LogBinhost(build_target.name)
271
Alex Kleinbe0bae42019-05-06 13:01:49 -0600272 use_flags = [u.flag for u in input_proto.use_flags]
Alex Kleind4e1e422019-03-18 16:00:41 -0600273 build_packages_config = sysroot.BuildPackagesRunConfig(
Cindy Lin7487daa2022-02-23 04:14:10 +0000274 use_any_chrome=False,
Alex Klein566d80e2019-09-24 12:27:58 -0600275 usepkg=not compile_source,
276 install_debug_symbols=True,
277 packages=packages,
LaMont Jonesfeffd1b2020-08-05 18:24:59 -0600278 package_indexes=package_indexes,
Alex Klein566d80e2019-09-24 12:27:58 -0600279 use_flags=use_flags,
Alex Klein5b940482019-12-26 10:38:39 -0700280 use_goma=use_goma,
Joanna Wang1ec0c812021-11-17 17:41:27 -0800281 use_remoteexec=use_remoteexec,
Alex Kleineb76da72021-03-19 10:43:09 -0600282 incremental_build=False,
Navil Perez5766d1b2021-05-26 17:38:15 +0000283 dryrun=dryrun)
Alex Kleind4e1e422019-03-18 16:00:41 -0600284
285 try:
286 sysroot.BuildPackages(build_target, target_sysroot, build_packages_config)
287 except sysroot_lib.PackageInstallError as e:
Alex Klein2557b4f2019-07-11 14:34:00 -0600288 if not e.failed_packages:
289 # No packages to report, so just exit with an error code.
290 return controller.RETURN_CODE_COMPLETED_UNSUCCESSFULLY
291
Lizzy Presland084c20f2022-03-30 19:13:50 +0000292 controller_util.retrieve_package_log_paths(e.failed_packages, output_proto,
293 target_sysroot)
Alex Kleind4e1e422019-03-18 16:00:41 -0600294
Alex Klein8cb365a2019-05-15 16:24:53 -0600295 return controller.RETURN_CODE_UNSUCCESSFUL_RESPONSE_AVAILABLE
Yoshiki Iguchi6d2e3052021-12-13 11:06:04 +0900296 finally:
297 # Copy goma logs to specified directory if there is a goma_config and
298 # it contains a log_dir to store artifacts.
299 if input_proto.goma_config.log_dir.dir:
Yoshiki Iguchia43704b2021-12-16 13:31:48 +0900300 log_source_dir = _GetGomaLogDirectory()
Yoshiki Iguchi6d2e3052021-12-13 11:06:04 +0900301 archiver = goma_lib.LogsArchiver(
302 log_source_dir,
303 dest_dir=input_proto.goma_config.log_dir.dir,
304 stats_file=input_proto.goma_config.stats_file,
305 counterz_file=input_proto.goma_config.counterz_file)
306 archiver_tuple = archiver.Archive()
307 if archiver_tuple.stats_file:
308 output_proto.goma_artifacts.stats_file = archiver_tuple.stats_file
309 if archiver_tuple.counterz_file:
310 output_proto.goma_artifacts.counterz_file = archiver_tuple.counterz_file
311 output_proto.goma_artifacts.log_files[:] = archiver_tuple.log_files
Alex Kleina9d64602019-05-17 14:55:37 -0600312
Navil Perez5766d1b2021-05-26 17:38:15 +0000313 # Return without populating the response if it is a dryrun.
314 if dryrun:
315 return controller.RETURN_CODE_SUCCESS
316
Will Bradley7e5b8c12019-07-30 12:44:15 -0600317 # Read metric events log and pipe them into output_proto.events.
Alex Klein566d80e2019-09-24 12:27:58 -0600318 deserialize_metrics_log(output_proto.events, prefix=build_target.name)
Will Bradley7e5b8c12019-07-30 12:44:15 -0600319
Alex Kleina9d64602019-05-17 14:55:37 -0600320
321def _LogBinhost(board):
322 """Log the portage binhost for the given board."""
Alex Kleind066b0f2022-07-28 08:47:35 -0600323 binhost = portage_util.PortageqEnvvar(
324 'PORTAGE_BINHOST', board=board, allow_undefined=True)
Alex Kleina9d64602019-05-17 14:55:37 -0600325 if not binhost:
326 logging.warning('Portage Binhost not found.')
327 else:
328 logging.info('Portage Binhost: %s', binhost)