blob: 48e85ec9f5ef983ba1f5ed9b01fda7f2582703ad [file] [log] [blame]
Brian Harringf539bc32012-02-06 00:18:37 -08001#!/bin/bash
2
Matt Tennant0a9d32d2012-07-30 16:51:37 -07003# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Brian Harringf539bc32012-02-06 00:18:37 -08004# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
7# This script sets up a Gentoo chroot environment. The script is passed the
8# path to an empty folder, which will be populated with a Gentoo stage3 and
9# setup for development. Once created, the password is set to PASSWORD (below).
10# One can enter the chrooted environment for work by running enter_chroot.sh.
11
12SCRIPT_ROOT=$(readlink -f $(dirname "$0")/..)
13. "${SCRIPT_ROOT}/common.sh" || exit 1
14
Brian Harring35767822012-02-01 23:50:45 -080015ENTER_CHROOT=$(readlink -f $(dirname "$0")/enter_chroot.sh)
16
Zdenek Behan4d21a292012-08-17 04:02:29 +020017if [ -n "${USE}" ]; then
18 echo "$SCRIPT_NAME: Building with a non-empty USE: ${USE}"
19 echo "This modifies the expected behaviour and can fail."
20fi
21
Brian Harringf539bc32012-02-06 00:18:37 -080022# Check if the host machine architecture is supported.
23ARCHITECTURE="$(uname -m)"
24if [[ "$ARCHITECTURE" != "x86_64" ]]; then
25 echo "$SCRIPT_NAME: $ARCHITECTURE is not supported as a host machine architecture."
26 exit 1
27fi
28
David James76764882012-10-24 19:46:29 -070029# Script must be run outside the chroot and as root.
Brian Harringf539bc32012-02-06 00:18:37 -080030assert_outside_chroot
David James76764882012-10-24 19:46:29 -070031assert_root_user
Brian Harringf539bc32012-02-06 00:18:37 -080032
Brian Harring35767822012-02-01 23:50:45 -080033# Define command line flags.
Brian Harringf539bc32012-02-06 00:18:37 -080034# See http://code.google.com/p/shflags/wiki/Documentation10x
35
36DEFINE_string chroot "$DEFAULT_CHROOT_DIR" \
37 "Destination dir for the chroot environment."
38DEFINE_boolean usepkg $FLAGS_TRUE "Use binary packages to bootstrap."
39DEFINE_boolean delete $FLAGS_FALSE "Delete an existing chroot."
40DEFINE_boolean replace $FLAGS_FALSE "Overwrite existing chroot, if any."
41DEFINE_integer jobs -1 "How many packages to build in parallel at maximum."
Brian Harringf539bc32012-02-06 00:18:37 -080042DEFINE_string stage3_path "" \
43 "Use the stage3 located on this path."
Brian Harring7b6f3772012-09-23 14:01:13 -070044DEFINE_string cache_dir "" "Directory to store caches within."
Benjamin Gordon1d5afed2017-06-14 16:35:32 -060045DEFINE_boolean useimage $FLAGS_FALSE "Mount the chroot on a loopback image."
Brian Harringf539bc32012-02-06 00:18:37 -080046
Brian Harring35767822012-02-01 23:50:45 -080047# Parse command line flags.
Brian Harringf539bc32012-02-06 00:18:37 -080048FLAGS_HELP="usage: $SCRIPT_NAME [flags]"
49FLAGS "$@" || exit 1
50eval set -- "${FLAGS_ARGV}"
Brian Harringf539bc32012-02-06 00:18:37 -080051
Peter Mayo4411efe2012-09-21 04:41:27 -040052CROS_LOG_PREFIX=cros_sdk:make_chroot
David Purselld35d7af2015-05-04 16:37:08 -070053SUDO_HOME=$(eval echo ~"${SUDO_USER}")
Brian Harringf539bc32012-02-06 00:18:37 -080054
Brian Harringf539bc32012-02-06 00:18:37 -080055# Set the right umask for chroot creation.
56umask 022
57
58# Only now can we die on error. shflags functions leak non-zero error codes,
Brian Harring7f175a52012-03-02 05:37:00 -080059# so will die prematurely if 'switch_to_strict_mode' is specified before now.
Brian Harringf539bc32012-02-06 00:18:37 -080060# TODO: replace shflags with something less error-prone, or contribute a fix.
Brian Harring7f175a52012-03-02 05:37:00 -080061switch_to_strict_mode
Brian Harringf539bc32012-02-06 00:18:37 -080062
Brian Harring7b6f3772012-09-23 14:01:13 -070063[[ "${FLAGS_delete}" == "${FLAGS_FALSE}" ]] && \
64 [[ -z "${FLAGS_cache_dir}" ]] && \
65 die "--cache_dir is required"
66
J. Richard Barnettee80f6de2012-02-24 14:08:34 -080067. "${SCRIPT_ROOT}"/sdk_lib/make_conf_util.sh
68
David Purselld35d7af2015-05-04 16:37:08 -070069PRIMARY_GROUP=$(id -g -n "${SUDO_USER}")
70PRIMARY_GROUP_ID=$(id -g "${SUDO_USER}")
71
Brian Harringf539bc32012-02-06 00:18:37 -080072FULLNAME="ChromeOS Developer"
David Purselld35d7af2015-05-04 16:37:08 -070073DEFGROUPS="${PRIMARY_GROUP},adm,cdrom,floppy,audio,video,portage"
74
Brian Harringf539bc32012-02-06 00:18:37 -080075USEPKG=""
Manoj Gupta51880b82019-06-19 13:50:57 -070076USEPKGONLY=""
Brian Harringf539bc32012-02-06 00:18:37 -080077if [[ $FLAGS_usepkg -eq $FLAGS_TRUE ]]; then
78 # Use binary packages. Include all build-time dependencies,
79 # so as to avoid unnecessary differences between source
80 # and binary builds.
81 USEPKG="--getbinpkg --usepkg --with-bdeps y"
Manoj Gupta51880b82019-06-19 13:50:57 -070082 # Use --usepkgonly to avoid building toolchain packages from source.
83 USEPKGONLY="--usepkgonly"
Brian Harringf539bc32012-02-06 00:18:37 -080084fi
85
Bertrand SIMONNET4dda4f52015-03-19 13:40:58 -070086EMERGE_CMD="${CHROOT_TRUNK_DIR}/chromite/bin/parallel_emerge"
Brian Harringf539bc32012-02-06 00:18:37 -080087
Brian Harring35767822012-02-01 23:50:45 -080088ENTER_CHROOT_ARGS=(
89 CROS_WORKON_SRCROOT="$CHROOT_TRUNK"
David James76764882012-10-24 19:46:29 -070090 PORTAGE_USERNAME="${SUDO_USER}"
Brian Harring35767822012-02-01 23:50:45 -080091 IGNORE_PREFLIGHT_BINHOST="$IGNORE_PREFLIGHT_BINHOST"
92)
93
94# Invoke enter_chroot. This can only be used after sudo has been installed.
Mike Frysinger6b1abb22012-05-11 13:44:06 -040095enter_chroot() {
Mike Frysinger7d88be92018-12-20 17:50:07 -050096 echo "[enter_chroot] $*"
Brian Harring7b6f3772012-09-23 14:01:13 -070097 "$ENTER_CHROOT" --cache_dir "${FLAGS_cache_dir}" --chroot "$FLAGS_chroot" \
98 -- "${ENTER_CHROOT_ARGS[@]}" "$@"
Brian Harringf539bc32012-02-06 00:18:37 -080099}
100
Brian Harring35767822012-02-01 23:50:45 -0800101# Invoke enter_chroot running the command as root, and w/out sudo.
102# This should be used prior to sudo being merged.
Mike Frysingerba758452012-04-02 13:28:31 -0400103early_env=()
Mike Frysinger6b1abb22012-05-11 13:44:06 -0400104early_enter_chroot() {
Mike Frysinger7d88be92018-12-20 17:50:07 -0500105 echo "[early_enter_chroot] $*"
Brian Harring35767822012-02-01 23:50:45 -0800106 "$ENTER_CHROOT" --chroot "$FLAGS_chroot" --early_make_chroot \
Brian Harring7b6f3772012-09-23 14:01:13 -0700107 --cache_dir "${FLAGS_cache_dir}" \
Mike Frysingerba758452012-04-02 13:28:31 -0400108 -- "${ENTER_CHROOT_ARGS[@]}" "${early_env[@]}" "$@"
Brian Harringf539bc32012-02-06 00:18:37 -0800109}
110
Mike Frysinger4bb86452013-08-02 13:44:18 -0400111# Run a command within the chroot. The main usage of this is to avoid the
112# overhead of enter_chroot. It's when we do not need access to the source
113# tree, don't need the actual chroot profile env, and can run the command as
114# root. We do have to make sure PATH includes all the right programs as
115# found inside of the chroot since the environment outside of the chroot
116# might be insufficient (like distros with merged /bin /sbin and /usr).
David James76764882012-10-24 19:46:29 -0700117bare_chroot() {
David Purselld35d7af2015-05-04 16:37:08 -0700118 PATH="/bin:/sbin:/usr/bin:/usr/sbin:${PATH}" \
Mike Frysinger4bb86452013-08-02 13:44:18 -0400119 chroot "${FLAGS_chroot}" "$@"
Brian Harringf539bc32012-02-06 00:18:37 -0800120}
121
Mike Frysinger6b1abb22012-05-11 13:44:06 -0400122cleanup() {
Brian Harringf539bc32012-02-06 00:18:37 -0800123 # Clean up mounts
124 safe_umount_tree "${FLAGS_chroot}"
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600125
126 # Destroy LVM loopback setup if we can find a VG associated with our path.
127 local chroot_img="${FLAGS_chroot}.img"
128 [[ -f "$chroot_img" ]] || return 0
129
130 local chroot_dev=$(losetup -j "$chroot_img" | cut -f1 -d:)
131 local chroot_vg=$(find_vg_name "$FLAGS_chroot" "$chroot_dev")
132 if [ -n "$chroot_vg" ] && vgs "$chroot_vg" >&/dev/null; then
133 info "Removing VG $chroot_vg."
134 vgremove -f "$chroot_vg" --noudevsync
135 fi
136 if [ -n "$chroot_dev" ]; then
137 info "Detaching $chroot_dev."
138 losetup -d "$chroot_dev"
139 fi
Brian Harringf539bc32012-02-06 00:18:37 -0800140}
141
Mike Frysinger6b1abb22012-05-11 13:44:06 -0400142delete_existing() {
Brian Harring35767822012-02-01 23:50:45 -0800143 # Delete old chroot dir.
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600144 local chroot_img="${FLAGS_chroot}.img"
145 if [[ ! -e "$FLAGS_chroot" && ! -f "$chroot_img" ]]; then
Brian Harring35767822012-02-01 23:50:45 -0800146 return
Brian Harringf539bc32012-02-06 00:18:37 -0800147 fi
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600148 info "Cleaning up old mount points and loopback device..."
Brian Harring35767822012-02-01 23:50:45 -0800149 cleanup
150 info "Deleting $FLAGS_chroot..."
David James76764882012-10-24 19:46:29 -0700151 rm -rf "$FLAGS_chroot"
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600152 if [[ -f "$chroot_img" ]]; then
153 info "Deleting $chroot_img..."
154 rm -f "$chroot_img"
155 fi
Brian Harring35767822012-02-01 23:50:45 -0800156 info "Done."
Brian Harringf539bc32012-02-06 00:18:37 -0800157}
158
Mike Frysinger6b1abb22012-05-11 13:44:06 -0400159init_users () {
Brian Harring35767822012-02-01 23:50:45 -0800160 info "Set timezone..."
161 # date +%Z has trouble with daylight time, so use host's info.
David James76764882012-10-24 19:46:29 -0700162 rm -f "${FLAGS_chroot}/etc/localtime"
Brian Harringf539bc32012-02-06 00:18:37 -0800163 if [ -f /etc/localtime ] ; then
David James76764882012-10-24 19:46:29 -0700164 cp /etc/localtime "${FLAGS_chroot}/etc"
Brian Harringf539bc32012-02-06 00:18:37 -0800165 else
David James76764882012-10-24 19:46:29 -0700166 ln -sf /usr/share/zoneinfo/PST8PDT "${FLAGS_chroot}/etc/localtime"
Brian Harringf539bc32012-02-06 00:18:37 -0800167 fi
Brian Harring35767822012-02-01 23:50:45 -0800168 info "Adding user/group..."
David Purselld35d7af2015-05-04 16:37:08 -0700169 # Add the necessary groups to the chroot.
170 # Duplicate GIDs are allowed here in order to ensure that the required
171 # groups are the same inside and outside the chroot.
172 # TODO(dpursell): Handle when PRIMARY_GROUP exists in the chroot already
173 # with a different GID; groupadd will not create the new GID in that case.
174 bare_chroot groupadd -f -o -g "${PRIMARY_GROUP_ID}" "${PRIMARY_GROUP}"
Brian Harringf539bc32012-02-06 00:18:37 -0800175 # Add ourselves as a user inside the chroot.
Brian Harringf539bc32012-02-06 00:18:37 -0800176 # We need the UID to match the host user's. This can conflict with
177 # a particular chroot UID. At the same time, the added user has to
178 # be a primary user for the given UID for sudo to work, which is
179 # determined by the order in /etc/passwd. Let's put ourselves on top
180 # of the file.
David Purselld35d7af2015-05-04 16:37:08 -0700181 bare_chroot useradd -o -G "${DEFGROUPS}" -g "${PRIMARY_GROUP}" \
182 -u "${SUDO_UID}" -s /bin/bash -m -c "${FULLNAME}" "${SUDO_USER}"
Brian Harringf539bc32012-02-06 00:18:37 -0800183 # Because passwd generally isn't sorted and the entry ended up at the
184 # bottom, it is safe to just take it and move it to top instead.
David James76764882012-10-24 19:46:29 -0700185 sed -e '1{h;d};$!{H;d};$G' -i "${FLAGS_chroot}/etc/passwd"
Brian Harringf539bc32012-02-06 00:18:37 -0800186}
187
Mike Frysinger6b1abb22012-05-11 13:44:06 -0400188init_setup () {
Brian Harring35767822012-02-01 23:50:45 -0800189 info "Running init_setup()..."
David James76764882012-10-24 19:46:29 -0700190 mkdir -p -m 755 "${FLAGS_chroot}/usr" \
Mike Frysingerb45dbb52013-12-13 21:14:09 -0500191 "${FLAGS_chroot}${OVERLAYS_ROOT}" \
Mike Frysinger36beaaa2014-09-25 15:52:27 -0400192 "${FLAGS_chroot}"/"${CROSSDEV_OVERLAY}/metadata"
193 # Newer portage complains about bare overlays. Create the file that crossdev
194 # will also create later on.
195 cat <<EOF > "${FLAGS_chroot}/${CROSSDEV_OVERLAY}/metadata/layout.conf"
196# Autogenerated and managed by crossdev
197# Delete the above line if you want to manage this file yourself
198masters = portage-stable chromiumos
199repo-name = crossdev
200use-manifests = true
201thin-manifests = true
202EOF
Mike Frysingerb45dbb52013-12-13 21:14:09 -0500203 ln -sf "${CHROOT_TRUNK_DIR}/src/third_party/eclass-overlay" \
204 "${FLAGS_chroot}"/"${ECLASS_OVERLAY}"
Brian Harring2499bfb2012-12-18 16:23:31 -0800205 ln -sf "${CHROOT_TRUNK_DIR}/src/third_party/chromiumos-overlay" \
Brian Harringf539bc32012-02-06 00:18:37 -0800206 "${FLAGS_chroot}"/"${CHROOT_OVERLAY}"
Brian Harring2499bfb2012-12-18 16:23:31 -0800207 ln -sf "${CHROOT_TRUNK_DIR}/src/third_party/portage-stable" \
Brian Harringf539bc32012-02-06 00:18:37 -0800208 "${FLAGS_chroot}"/"${PORTAGE_STABLE_OVERLAY}"
Brian Harringf539bc32012-02-06 00:18:37 -0800209
Brian Harring35767822012-02-01 23:50:45 -0800210 # Some operations need an mtab.
Mike Frysingerb47a4ff2013-02-20 17:29:05 -0500211 ln -sfT /proc/mounts "${FLAGS_chroot}/etc/mtab"
Brian Harringf539bc32012-02-06 00:18:37 -0800212
213 # Set up sudoers. Inside the chroot, the user can sudo without a password.
214 # (Safe enough, since the only way into the chroot is to 'sudo chroot', so
215 # the user's already typed in one sudo password...)
216 # Make sure the sudoers.d subdir exists as older stage3 base images lack it.
David James76764882012-10-24 19:46:29 -0700217 mkdir -p "${FLAGS_chroot}/etc/sudoers.d"
Brian Harring06d3c2e2012-08-23 07:35:43 -0700218
219 # Use the standardized upgrade script to setup proxied vars.
David James76764882012-10-24 19:46:29 -0700220 load_environment_whitelist
Mike Frysinger6b05da92018-08-05 01:22:12 -0400221 bash "${SCRIPT_ROOT}/chroot_version_hooks.d/153_rewrite_sudoers.d" \
David James76764882012-10-24 19:46:29 -0700222 "${FLAGS_chroot}" "${SUDO_USER}" "${ENVIRONMENT_WHITELIST[@]}"
Brian Harring06d3c2e2012-08-23 07:35:43 -0700223
David James76764882012-10-24 19:46:29 -0700224 find "${FLAGS_chroot}/etc/"sudoers* -type f -exec chmod 0440 {} +
Brian Harring35767822012-02-01 23:50:45 -0800225 # Fix bad group for some.
David James76764882012-10-24 19:46:29 -0700226 chown -R root:root "${FLAGS_chroot}/etc/"sudoers*
Brian Harringf539bc32012-02-06 00:18:37 -0800227
Brian Harring35767822012-02-01 23:50:45 -0800228 info "Setting up hosts/resolv..."
229 # Copy config from outside chroot into chroot.
David James76764882012-10-24 19:46:29 -0700230 cp /etc/{hosts,resolv.conf} "$FLAGS_chroot/etc/"
231 chmod 0644 "$FLAGS_chroot"/etc/{hosts,resolv.conf}
Brian Harringf539bc32012-02-06 00:18:37 -0800232
233 # Setup host make.conf. This includes any overlay that we may be using
234 # and a pointer to pre-built packages.
Brian Harring35767822012-02-01 23:50:45 -0800235 # TODO: This should really be part of a profile in the portage.
236 info "Setting up /etc/make.*..."
Mike Frysinger53f79bb2014-04-05 22:27:52 -0400237 rm -f "${FLAGS_chroot}"/etc/{,portage/}make.{conf,profile}{,.catalyst}
Mike Frysingerc6e1ace2013-03-22 00:49:30 -0400238 mkdir -p "${FLAGS_chroot}/etc/portage"
David James76764882012-10-24 19:46:29 -0700239 ln -sf "${CHROOT_CONFIG}/make.conf.amd64-host" \
Brian Harringf539bc32012-02-06 00:18:37 -0800240 "${FLAGS_chroot}/etc/make.conf"
Mike Frysinger411b2422014-06-04 11:49:17 -0400241 ln -sf "${CHROOT_OVERLAY}/profiles/default/linux/amd64/10.0/sdk" \
Mike Frysingere9b40072015-05-19 05:07:04 -0400242 "${FLAGS_chroot}/etc/portage/make.profile"
Brian Harringf539bc32012-02-06 00:18:37 -0800243
Brian Harring35767822012-02-01 23:50:45 -0800244 # Create make.conf.user .
Alex Kleina28439c2019-01-14 14:48:30 -0700245 cat <<EOF > "${FLAGS_chroot}"/etc/make.conf.user
246# This file is useful for doing global (chroot and all board) changes.
247# Tweak emerge settings, ebuild env, etc...
248#
249# Make sure to append variables unless you really want to clobber all
250# existing settings. e.g. You most likely want:
251# FEATURES="${FEATURES} ..."
252# USE="${USE} foo"
253# and *not*:
254# USE="foo"
255#
256# This also is a good place to setup ACCEPT_LICENSE.
257EOF
David James76764882012-10-24 19:46:29 -0700258 chmod 0644 "${FLAGS_chroot}"/etc/make.conf.user
Brian Harringf539bc32012-02-06 00:18:37 -0800259
260 # Create directories referred to by our conf files.
David James76764882012-10-24 19:46:29 -0700261 mkdir -p -m 775 "${FLAGS_chroot}/var/lib/portage/pkgs" \
Brian Harring7b6f3772012-09-23 14:01:13 -0700262 "${FLAGS_chroot}/var/cache/"chromeos-{cache,chrome} \
263 "${FLAGS_chroot}/etc/profile.d"
264
David James76764882012-10-24 19:46:29 -0700265 echo "export CHROMEOS_CACHEDIR=/var/cache/chromeos-cache" > \
266 "${FLAGS_chroot}/etc/profile.d/chromeos-cachedir.sh"
267 chmod 0644 "${FLAGS_chroot}/etc/profile.d/chromeos-cachedir.sh"
268 rm -rf "${FLAGS_chroot}/var/cache/distfiles"
269 ln -s chromeos-cache/distfiles "${FLAGS_chroot}/var/cache/distfiles"
Brian Harring36b102b2012-02-06 23:34:25 -0800270
271 # Run this from w/in the chroot so we use whatever uid/gid
272 # these are defined as w/in the chroot.
David James76764882012-10-24 19:46:29 -0700273 bare_chroot chown "${SUDO_USER}:portage" /var/cache/chromeos-chrome
Brian Harring7ee892d2012-02-02 09:33:10 -0800274
275 # These are created for compatibility while transitioning
276 # make.conf and friends over to the new location.
Brian Harring7b6f3772012-09-23 14:01:13 -0700277 # TODO(ferringb): remove this 01/13 or so.
David James76764882012-10-24 19:46:29 -0700278 ln -s ../../cache/chromeos-cache/distfiles/host \
Brian Harring7ee892d2012-02-02 09:33:10 -0800279 "${FLAGS_chroot}/var/lib/portage/distfiles"
David James76764882012-10-24 19:46:29 -0700280 ln -s ../../cache/chromeos-cache/distfiles/target \
Brian Harring7ee892d2012-02-02 09:33:10 -0800281 "${FLAGS_chroot}/var/lib/portage/distfiles-target"
Brian Harringf539bc32012-02-06 00:18:37 -0800282
Brian Harringf539bc32012-02-06 00:18:37 -0800283 # Add chromite/bin and depot_tools into the path globally; note that the
284 # chromite wrapper itself might also be found in depot_tools.
285 # We rely on 'env-update' getting called below.
286 target="${FLAGS_chroot}/etc/env.d/99chromiumos"
David James76764882012-10-24 19:46:29 -0700287 cat <<EOF > "${target}"
David Purselld35d7af2015-05-04 16:37:08 -0700288PATH="${CHROOT_TRUNK_DIR}/chromite/bin:${DEPOT_TOOLS_DIR}"
Brian Harring2499bfb2012-12-18 16:23:31 -0800289CROS_WORKON_SRCROOT="${CHROOT_TRUNK_DIR}"
David Purselld35d7af2015-05-04 16:37:08 -0700290PORTAGE_USERNAME="${SUDO_USER}"
Brian Harringf539bc32012-02-06 00:18:37 -0800291EOF
292
293 # TODO(zbehan): Configure stuff that is usually configured in postinst's,
Mike Frysingereb1a9b42012-03-28 16:21:04 -0400294 # but wasn't. Fix the postinst's.
Brian Harring35767822012-02-01 23:50:45 -0800295 info "Running post-inst configuration hacks"
296 early_enter_chroot env-update
Brian Harringf539bc32012-02-06 00:18:37 -0800297
Brian Harring35767822012-02-01 23:50:45 -0800298 # This is basically a sanity check of our chroot. If any of these
299 # don't exist, then either bind mounts have failed, an invocation
300 # from above is broke, or some assumption about the stage3 is no longer
301 # true.
Mike Frysingere9b40072015-05-19 05:07:04 -0400302 early_enter_chroot ls -l /etc/make.conf /etc/portage/make.profile \
Brian Harring35767822012-02-01 23:50:45 -0800303 /usr/local/portage/chromiumos/profiles/default/linux/amd64/10.0
Brian Harringf539bc32012-02-06 00:18:37 -0800304
305 target="${FLAGS_chroot}/etc/profile.d"
David James76764882012-10-24 19:46:29 -0700306 mkdir -p "${target}"
307 cat << EOF > "${target}/chromiumos-niceties.sh"
Brian Harringf539bc32012-02-06 00:18:37 -0800308# Niceties for interactive logins. (cr) denotes this is a chroot, the
309# __git_branch_ps1 prints current git branch in ./ . The $r behavior is to
310# make sure we don't reset the previous $? value which later formats in
311# $PS1 might rely on.
312PS1='\$(r=\$?; __git_branch_ps1 "(%s) "; exit \$r)'"\${PS1}"
313PS1="(cr) \${PS1}"
314EOF
315
316 # Select a small set of locales for the user if they haven't done so
317 # already. This makes glibc upgrades cheap by only generating a small
318 # set of locales. The ones listed here are basically for the buildbots
319 # which always assume these are available. This works in conjunction
320 # with `cros_sdk --enter`.
321 # http://crosbug.com/20378
322 local localegen="$FLAGS_chroot/etc/locale.gen"
323 if ! grep -q -v -e '^#' -e '^$' "${localegen}" ; then
David James76764882012-10-24 19:46:29 -0700324 cat <<EOF >> "${localegen}"
Brian Harringf539bc32012-02-06 00:18:37 -0800325en_US ISO-8859-1
326en_US.UTF-8 UTF-8
327EOF
328 fi
329
Brian Harring35767822012-02-01 23:50:45 -0800330 # Automatically change to scripts directory.
Brian Harringf539bc32012-02-06 00:18:37 -0800331 echo 'cd ${CHROOT_CWD:-~/trunk/src/scripts}' \
David Purselld35d7af2015-05-04 16:37:08 -0700332 | user_append "${FLAGS_chroot}/home/${SUDO_USER}/.bash_profile"
Brian Harringf539bc32012-02-06 00:18:37 -0800333
Brian Harring35767822012-02-01 23:50:45 -0800334 # Enable bash completion for build scripts.
Brian Harringf539bc32012-02-06 00:18:37 -0800335 echo ". ~/trunk/src/scripts/bash_completion" \
David Purselld35d7af2015-05-04 16:37:08 -0700336 | user_append "${FLAGS_chroot}/home/${SUDO_USER}/.bashrc"
Brian Harringf539bc32012-02-06 00:18:37 -0800337
Peter Mayoe18c7d42013-06-06 13:41:03 -0400338 if [[ "${SUDO_USER}" = "chrome-bot" && -d "${SUDO_HOME}/.ssh" ]]; then
Brian Harringf539bc32012-02-06 00:18:37 -0800339 # Copy ssh keys, so chroot'd chrome-bot can scp files from chrome-web.
Peter Mayo31056952013-06-06 16:22:55 -0400340 user_cp -rp "${SUDO_HOME}/.ssh" "$FLAGS_chroot/home/${SUDO_USER}/"
Brian Harringf539bc32012-02-06 00:18:37 -0800341 fi
342
David Purselld35d7af2015-05-04 16:37:08 -0700343 if [[ -f "${SUDO_HOME}/.cros_chroot_init" ]]; then
344 sudo -u "${SUDO_USER}" -- /bin/bash "${SUDO_HOME}/.cros_chroot_init" \
David James76764882012-10-24 19:46:29 -0700345 "${FLAGS_chroot}"
Luigi Semenzato2443fdd2012-05-29 10:34:04 -0700346 fi
Yunlian Jiangf219bb32018-04-30 16:24:22 -0700347
348 # Update nsswitch.conf to make glibc-2.26 and after builds. See
349 # https://wiki.gentoo.org/wiki/Project:Toolchain/nsswitch.conf_in_glibc-2.26
350 if ! grep compat "${FLAGS_chroot}/etc/nsswitch.conf" | grep -q files; then
351 sed -i 's/\<compat\>/compat files/g' "${FLAGS_chroot}/etc/nsswitch.conf"
352 fi
Brian Harringf539bc32012-02-06 00:18:37 -0800353}
354
Gilad Arnold01d458b2015-05-28 06:41:08 -0700355unpack_tarball() {
356 local tarball_path="$1"
357 local dest_dir="$2"
358 local decompress
359 case "${tarball_path}" in
360 *.tbz2|*.tar.bz2) decompress=$(type -p pbzip2 || echo bzip2) ;;
Mike Frysinger978efbf2018-12-20 16:43:26 -0500361 *.tar.xz) decompress=$(type -p pixz || echo xz) ;;
Gilad Arnold01d458b2015-05-28 06:41:08 -0700362 *) die "Unknown tarball compression: ${tarball_path}" ;;
363 esac
Mike Frysinger978efbf2018-12-20 16:43:26 -0500364 ${decompress} -dc <"${tarball_path}" | tar -xp -C "${dest_dir}"
Gilad Arnold01d458b2015-05-28 06:41:08 -0700365}
366
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600367# Find a usable VG name for a given path and device. If there is an existing
368# VG associated with the device, it will be returned. If not, find an unused
369# name in the format cros_<safe_path>_NNN, where safe_path is an escaped version
370# of the last 90 characters of the path and NNN is a counter. Example:
371# /home/user/chromiumos/chroot/ -> cros_home+user+chromiumos+chroot_000.
372# If no unused name with this pattern can be found, return an empty string.
373find_vg_name() {
374 local chroot_path="$1"
375 local chroot_dev="$2"
376 chroot_path=${chroot_path##/}
377 chroot_path=${chroot_path%%/}
378 chroot_path=${chroot_path//[^A-Za-z0-9_+.-]/+}
379 chroot_path=${chroot_path: -$((${#chroot_path} < 90 ? ${#chroot_path} : 90))}
380 local vg_name=""
381 if [ -n "$chroot_dev" ]; then
382 vg_name=$(pvs -q --noheadings -o vg_name "$chroot_dev" 2>/dev/null | \
383 sed -e 's/^ *//')
384 fi
385 if [ -z "$vg_name" ]; then
386 local counter=0
387 vg_name=$(printf "cros_%s_%03d" "$chroot_path" "$counter")
388 while [ "$counter" -lt 1000 ] && vgs "$vg_name" >&/dev/null; do
389 counter=$((counter + 1))
390 vg_name=$(printf "cros_%s_%03d" "$chroot_path" "$counter")
391 done
392 if [ "$counter" -gt 999 ]; then
393 vg_name=""
394 fi
395 fi
396 echo "$vg_name"
397}
398
399# Create a loopback image and mount it on the chroot path so that we can take
400# snapshots before building. If an image already exists, try to mount it. The
401# chroot is initially mounted inside a temporary shared chroot.build subtree
402# that should have already been set up by the parent process, and then bind
403# mounted into the correct final location. The purpose of this indirection is
404# so that processes outside our mount namespace can see the top-level chroot
405# after we finish.
406mount_chroot_image() {
407 local chroot_image="$1"
408 local mount_path="$2"
409
410 # Make sure there's an image.
411 local existing_chroot=0
412 local chroot_dev=""
413 if [ -f "$chroot_image" ]; then
414 info "Attempting to reuse existing image file ${chroot_image}"
415 chroot_dev=$(losetup -j "$chroot_image" | cut -f1 -d:)
416 existing_chroot=1
417 else
418 dd if=/dev/null of="$chroot_image" bs=1G seek=500 >&/dev/null
419 fi
420
421 # Get/scan a loopback device attached to our image.
422 if [ -n "$chroot_dev" ]; then
423 pvscan -q "$chroot_dev" >&/dev/null
424 else
425 chroot_dev=$(losetup -f "$chroot_image" --show)
426 fi
427
428 # Find/create a VG on the loopback device.
429 chroot_vg=$(find_vg_name "$mount_path" "$chroot_dev")
430 if [ -z "$chroot_vg" ]; then
431 die_notrace "Unable to find usable VG name for ${mount_path}."
432 fi
433 if vgs "$chroot_vg" >&/dev/null; then
Benjamin Gordonf68aa942017-07-21 17:00:20 -0600434 vgchange -q -a y --noudevsync "$chroot_vg" >/dev/null || :
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600435 else
436 vgcreate -q "$chroot_vg" "$chroot_dev" >/dev/null
437 fi
438
439 # Find/create an LV inside our VG. If the LV is new, also create the FS.
440 # We need to pass --noudevsync to lvcreate because we're running inside
441 # a separate IPC namespace from the udev process.
442 if lvs "$chroot_vg/chroot" >&/dev/null; then
Benjamin Gordonf68aa942017-07-21 17:00:20 -0600443 lvchange -q -ay "$chroot_vg/chroot" --noudevsync >/dev/null || :
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600444 else
445 lvcreate -q -L 499G -T "${chroot_vg}/thinpool" -V500G -n chroot \
446 --noudevsync >/dev/null
447 mke2fs -q -m 0 -t ext4 "/dev/${chroot_vg}/chroot"
448 fi
449
450 # Mount the FS into a directory that should have been set up as a shared
451 # subtree by our parent process, then bind mount it into the place where
452 # it belongs. The parent will take care of moving the mount to the correct
453 # final place on the outside of our mount namespace after we exit.
454 local temp_chroot="${FLAGS_chroot}.build/chroot"
455 if ! mount -text4 -onoatime "/dev/${chroot_vg}/chroot" "$temp_chroot"; then
456 local chroot_example_opt=""
457 if [[ "$mount_path" != "$DEFAULT_CHROOT_DIR" ]]; then
458 chroot_example_opt="--chroot=$FLAGS_chroot"
459 fi
460
461 die_notrace <<EOF
462
463Unable to mount ${chroot_vg}/chroot on ${temp_chroot}. Check for corrupted
464image ${chroot_image}, or run
465
466cros_sdk --delete $chroot_example_opt
467
468to clean up an old chroot first.
469
470EOF
471 fi
472 mount --make-private "$temp_chroot"
473 mount --bind "$temp_chroot" "$mount_path"
474 mount --make-private "$mount_path"
475 if [ "$existing_chroot" = "1" ]; then
476 info "Mounted existing chroot image."
477 fi
478}
479
Brian Harring35767822012-02-01 23:50:45 -0800480# Handle deleting an existing environment.
Brian Harringf539bc32012-02-06 00:18:37 -0800481if [[ $FLAGS_delete -eq $FLAGS_TRUE || \
Brian Harring35767822012-02-01 23:50:45 -0800482 $FLAGS_replace -eq $FLAGS_TRUE ]]; then
Brian Harringf539bc32012-02-06 00:18:37 -0800483 delete_existing
484 [[ $FLAGS_delete -eq $FLAGS_TRUE ]] && exit 0
485fi
486
487CHROOT_TRUNK="${CHROOT_TRUNK_DIR}"
488PORTAGE="${SRC_ROOT}/third_party/portage"
489OVERLAY="${SRC_ROOT}/third_party/chromiumos-overlay"
490CONFIG_DIR="${OVERLAY}/chromeos/config"
Brian Harring2499bfb2012-12-18 16:23:31 -0800491CHROOT_CONFIG="${CHROOT_TRUNK_DIR}/src/third_party/chromiumos-overlay/chromeos/config"
Mike Frysingerb45dbb52013-12-13 21:14:09 -0500492OVERLAYS_ROOT="/usr/local/portage"
493ECLASS_OVERLAY="${OVERLAYS_ROOT}/eclass-overlay"
494PORTAGE_STABLE_OVERLAY="${OVERLAYS_ROOT}/stable"
495CROSSDEV_OVERLAY="${OVERLAYS_ROOT}/crossdev"
496CHROOT_OVERLAY="${OVERLAYS_ROOT}/chromiumos"
Brian Harringf539bc32012-02-06 00:18:37 -0800497CHROOT_STATE="${FLAGS_chroot}/etc/debian_chroot"
Vincent Palatin5ce24062014-02-26 12:08:23 -0800498CHROOT_VERSION="${FLAGS_chroot}/etc/cros_chroot_version"
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600499CHROOT_IMAGE="${FLAGS_chroot}.img"
Brian Harringf539bc32012-02-06 00:18:37 -0800500
501# Pass proxy variables into the environment.
502for type in http ftp all; do
David Purselld35d7af2015-05-04 16:37:08 -0700503 value=$(env | grep "${type}_proxy" || true)
Brian Harringf539bc32012-02-06 00:18:37 -0800504 if [ -n "${value}" ]; then
505 CHROOT_PASSTHRU+=("$value")
506 fi
507done
508
Brian Harring35767822012-02-01 23:50:45 -0800509# Create the destination directory.
Brian Harringf539bc32012-02-06 00:18:37 -0800510mkdir -p "$FLAGS_chroot"
511
Benjamin Gordon1d5afed2017-06-14 16:35:32 -0600512[[ $FLAGS_useimage -eq $FLAGS_TRUE ]] && \
513 mount_chroot_image "$CHROOT_IMAGE" "$FLAGS_chroot"
514
515# If the version contains something non-zero, we were already created and this
516# is just a re-mount.
517[[ -f "$CHROOT_VERSION" && "$(<$CHROOT_VERSION)" != "0" ]] && exit 0
518
Brian Harringf539bc32012-02-06 00:18:37 -0800519echo
David Purselld35d7af2015-05-04 16:37:08 -0700520if [[ -f "${CHROOT_STATE}" ]]; then
Mike Frysinger51930072014-04-05 13:01:45 -0400521 info "stage3 already set up. Skipping..."
David Purselld35d7af2015-05-04 16:37:08 -0700522elif [[ -z "${FLAGS_stage3_path}" ]]; then
Mike Frysinger51930072014-04-05 13:01:45 -0400523 die_notrace "Please use --stage3_path when bootstrapping"
Brian Harringf539bc32012-02-06 00:18:37 -0800524else
Mike Frysinger51930072014-04-05 13:01:45 -0400525 info "Unpacking stage3..."
Gilad Arnold01d458b2015-05-28 06:41:08 -0700526 unpack_tarball "${FLAGS_stage3_path}" "${FLAGS_chroot}"
David James76764882012-10-24 19:46:29 -0700527 rm -f "$FLAGS_chroot/etc/"make.{globals,conf.user}
Brian Harringf539bc32012-02-06 00:18:37 -0800528fi
529
Vincent Palatin5ce24062014-02-26 12:08:23 -0800530# Ensure that we properly detect when we are inside the chroot.
531# We'll force this to the latest version at the end as needed.
David Purselld35d7af2015-05-04 16:37:08 -0700532if [[ ! -e "${CHROOT_VERSION}" ]]; then
Vincent Palatin5ce24062014-02-26 12:08:23 -0800533 echo "0" > "${CHROOT_VERSION}"
534fi
535
Brian Harring35767822012-02-01 23:50:45 -0800536# Set up users, if needed, before mkdir/mounts below.
Brian Harringf539bc32012-02-06 00:18:37 -0800537[ -f $CHROOT_STATE ] || init_users
538
Brian Harring2499bfb2012-12-18 16:23:31 -0800539# Reset internal vars to force them to the 'inside the chroot' value;
540# since user directories now exist, this can do the upgrade in place.
541set_chroot_trunk_dir "${FLAGS_chroot}" poppycock
542
Brian Harringf539bc32012-02-06 00:18:37 -0800543echo
Brian Harring35767822012-02-01 23:50:45 -0800544info "Setting up mounts..."
545# Set up necessary mounts and make sure we clean them up on exit.
Brian Harring2499bfb2012-12-18 16:23:31 -0800546mkdir -p "${FLAGS_chroot}/${CHROOT_TRUNK_DIR}" \
547 "${FLAGS_chroot}/${DEPOT_TOOLS_DIR}" "${FLAGS_chroot}/run"
Brian Harring35767822012-02-01 23:50:45 -0800548
J. Richard Barnettee80f6de2012-02-24 14:08:34 -0800549# Create a special /etc/make.conf.host_setup that we use to bootstrap
550# the chroot. The regular content for the file will be generated the
551# first time we invoke update_chroot (further down in this script).
552create_bootstrap_host_setup "${FLAGS_chroot}"
Brian Harringf539bc32012-02-06 00:18:37 -0800553
554if ! [ -f "$CHROOT_STATE" ];then
555 INITIALIZE_CHROOT=1
556fi
557
Mike Frysingerba758452012-04-02 13:28:31 -0400558if ! early_enter_chroot bash -c 'type -P pbzip2' >/dev/null ; then
559 # This chroot lacks pbzip2 early on, so we need to disable it.
560 early_env+=(
561 PORTAGE_BZIP2_COMMAND="bzip2"
562 PORTAGE_BUNZIP2_COMMAND="bunzip2"
563 )
564fi
565
Brian Harringf539bc32012-02-06 00:18:37 -0800566if [ -z "${INITIALIZE_CHROOT}" ];then
Brian Harring35767822012-02-01 23:50:45 -0800567 info "chroot already initialized. Skipping..."
Brian Harringf539bc32012-02-06 00:18:37 -0800568else
Brian Harring35767822012-02-01 23:50:45 -0800569 # Run all the init stuff to setup the env.
Brian Harringf539bc32012-02-06 00:18:37 -0800570 init_setup
571fi
572
Brian Harring35767822012-02-01 23:50:45 -0800573# Add file to indicate that it is a chroot.
Mike Frysinger51930072014-04-05 13:01:45 -0400574# Add version of stage3 for update checks.
575echo "STAGE3=${FLAGS_stage3_path}" > "${CHROOT_STATE}"
Brian Harringf539bc32012-02-06 00:18:37 -0800576
Daniel Kurtz51244842017-07-25 01:32:04 +0800577# TODO(crbug.com/747810): Remove this once stage3 is updated past 2015-Q1.
578# The 2014.09.18 stage3 uses app-admin/eselect-python, but in 2015-Q1 it moved
579# to app-eselect/eselect-python. Since portage depends on python-exec, and
580# python-exec depends on eselect-python, update python and related packages
581# before portage.
582info "Updating python"
Daniel Campello124b75f2019-02-05 14:33:34 -0700583early_enter_chroot emerge -uNv --quiet python:2.7 python setuptools
Daniel Kurtz51244842017-07-25 01:32:04 +0800584
585# New versions of the stage3 have Python 3 set as the default. Make sure we
586# default to 2.x as our scripts are only compatible with Python 2. We leave
587# Python 3 installed though as we've started including it in our SDK.
588# We can't just "set 1" because the option order changes for different stage3
589# tarballs.
590early_enter_chroot eselect python update --ignore "3*"
591
Brian Harring35767822012-02-01 23:50:45 -0800592info "Updating portage"
Mike Frysinger66fd81f2012-02-28 13:13:20 -0500593early_enter_chroot emerge -uNv --quiet portage
Brian Harringf539bc32012-02-06 00:18:37 -0800594
Mike Frysinger9a2978c2013-08-04 11:38:43 -0400595# Clear out openrc if it's installed as we don't want it.
David Purselld35d7af2015-05-04 16:37:08 -0700596if [[ -e "${FLAGS_chroot}/usr/share/openrc" ]]; then
Mike Frysinger9a2978c2013-08-04 11:38:43 -0400597 info "Uninstalling openrc"
598 early_enter_chroot env CLEAN_DELAY=0 emerge -qC sys-apps/openrc
Mike Frysinger47e599e2013-10-28 13:30:12 -0400599 # Now update baselayout to get our functions.sh. The unmerge
600 # above removed our copy in the process.
601 early_enter_chroot emerge -uNvq sys-apps/baselayout
Mike Frysinger9a2978c2013-08-04 11:38:43 -0400602fi
603
Bertrand SIMONNET85c96c72014-08-20 12:10:48 -0700604# Add chromite into python path.
Bertrand SIMONNET85c96c72014-08-20 12:10:48 -0700605for python_path in "${FLAGS_chroot}/usr/lib/"python2.*; do
606 python_path+="/site-packages"
607 sudo mkdir -p "${python_path}"
608 sudo ln -s -fT "${CHROOT_TRUNK_DIR}"/chromite "${python_path}"/chromite
609done
610
Chirantan Ekboteaf1b9502016-07-14 11:29:16 -0700611# The stage3 contains an old version of ncurses, which causes a slot conflict
612# later when we try to setup the toolchains. Update it here to the latest
613# version, which gracefully handles the slot issues.
614info "Updating ncurses"
615early_enter_chroot emerge -uNvq sys-libs/ncurses
616
Manoj Gupta63ee9f52018-05-11 18:09:37 -0700617# Update these packages early because they cause build failures when they're
618# concurrently emerged during the main update below.
619# Specific packages:
620# sys-apps/sandbox upgrade breaks dev-libs/nss, also needed by newer libtool.
621# sys-devel/patch 2.6 misapplies git patches in dev-embedded/coreboot-sdk.
622# older sys-devel/automake makes media-libs/freetype build flaky.
623# glibc 2.26+ needs a newer bison.
624info "Updating preinstalled build tools"
625early_enter_chroot ${EMERGE_CMD} -uNv ${USEPKG} --select ${EMERGE_JOBS} \
626 sys-apps/sandbox '>=sys-devel/patch-2.7' sys-devel/automake sys-devel/bison
627
Mike Frysingeraf95b612018-12-20 17:08:19 -0500628# Now that many of the fundamental packages should be in a good state, update
629# the host toolchain. We have to do this step by step ourselves to avoid races
630# when building tools that are actively used (e.g. updating the assembler while
631# also compiling other packages that use the assembler).
632# https://crbug.com/715788
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100633info "Updating host toolchain"
David Purselld35d7af2015-05-04 16:37:08 -0700634if [[ ! -e "${FLAGS_chroot}/usr/bin/crossdev" ]]; then
Manoj Gupta9b8f8bc2019-06-19 14:17:35 -0700635 early_enter_chroot ${EMERGE_CMD} -uNv crossdev
Mike Frysinger5e07dc72014-11-05 14:40:04 -0500636fi
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100637TOOLCHAIN_ARGS=( --deleteold )
David Purselld35d7af2015-05-04 16:37:08 -0700638if [[ "${FLAGS_usepkg}" == "${FLAGS_FALSE}" ]]; then
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100639 TOOLCHAIN_ARGS+=( --nousepkg )
640fi
Mike Frysingeraf95b612018-12-20 17:08:19 -0500641# First the low level compiler tools. These should be fairly independent of
642# the C library, so we can do it first.
Manoj Gupta51880b82019-06-19 13:50:57 -0700643early_enter_chroot ${EMERGE_CMD} -uNv ${USEPKG} ${USEPKGONLY} ${EMERGE_JOBS} \
Mike Frysingeraf95b612018-12-20 17:08:19 -0500644 sys-devel/binutils
645# Next the C library. The compilers often use newer features, but the C library
646# is often designed to work with older compilers.
Manoj Gupta51880b82019-06-19 13:50:57 -0700647early_enter_chroot ${EMERGE_CMD} -uNv ${USEPKG} ${USEPKGONLY} ${EMERGE_JOBS} \
Mike Frysingeraf95b612018-12-20 17:08:19 -0500648 sys-kernel/linux-headers sys-libs/glibc
649# Now we can let the rest of the compiler packages build in parallel as they
650# don't generally rely on each other.
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100651# Note: early_enter_chroot executes as root.
Brian Harring2499bfb2012-12-18 16:23:31 -0800652early_enter_chroot "${CHROOT_TRUNK_DIR}/chromite/bin/cros_setup_toolchains" \
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100653 --hostonly "${TOOLCHAIN_ARGS[@]}"
Brian Harringf539bc32012-02-06 00:18:37 -0800654
Ben Chan0c9da662017-05-15 17:29:51 -0700655info "Running emerge curl sudo gentoolkit ..."
Manoj Gupta9b8f8bc2019-06-19 14:17:35 -0700656early_enter_chroot ${EMERGE_CMD} -uNv ${USEPKG} --select ${EMERGE_JOBS} \
Ben Chan0c9da662017-05-15 17:29:51 -0700657 pbzip2 dev-libs/openssl net-misc/curl sudo app-portage/gentoolkit
658
659info "Updating Perl modules"
660early_enter_chroot \
661 "${CHROOT_TRUNK_DIR}/src/scripts/build_library/perl_rebuild.sh"
Paul Drews8bae3b52012-10-10 11:18:13 -0700662
Brian Harringf539bc32012-02-06 00:18:37 -0800663if [ -n "${INITIALIZE_CHROOT}" ]; then
664 # If we're creating a new chroot, we also want to set it to the latest
665 # version.
Alex Kleine5e0ea92018-09-13 17:18:15 -0600666 enter_chroot run_chroot_version_hooks --init-latest
Brian Harringf539bc32012-02-06 00:18:37 -0800667fi
668
Brian Harring35767822012-02-01 23:50:45 -0800669# Update chroot.
Zdenek Behan2fbd5af2012-03-12 19:38:50 +0100670# Skip toolchain update because it already happened above, and the chroot is
671# not ready to emerge all cross toolchains.
672UPDATE_ARGS=( --skip_toolchain_update )
David Purselld35d7af2015-05-04 16:37:08 -0700673if [[ "${FLAGS_usepkg}" == "${FLAGS_TRUE}" ]]; then
Brian Harring35767822012-02-01 23:50:45 -0800674 UPDATE_ARGS+=( --usepkg )
Brian Harringf539bc32012-02-06 00:18:37 -0800675else
Brian Harring35767822012-02-01 23:50:45 -0800676 UPDATE_ARGS+=( --nousepkg )
Brian Harringf539bc32012-02-06 00:18:37 -0800677fi
David James184e3902012-02-23 20:19:28 -0800678if [[ "${FLAGS_jobs}" -ne -1 ]]; then
David Purselld35d7af2015-05-04 16:37:08 -0700679 UPDATE_ARGS+=( --jobs="${FLAGS_jobs}" )
David James184e3902012-02-23 20:19:28 -0800680fi
Brian Harring2499bfb2012-12-18 16:23:31 -0800681enter_chroot "${CHROOT_TRUNK_DIR}/src/scripts/update_chroot" "${UPDATE_ARGS[@]}"
Brian Harringf539bc32012-02-06 00:18:37 -0800682
Stefan Zager48c776b2013-10-09 13:01:25 -0700683# The java-config package atm does not support $ROOT. Select a default
684# VM ourselves until that gets fixed upstream.
685enter_chroot sudo java-config --set-system-vm 1
686
Brian Harring35767822012-02-01 23:50:45 -0800687CHROOT_EXAMPLE_OPT=""
688if [[ "$FLAGS_chroot" != "$DEFAULT_CHROOT_DIR" ]]; then
Brian Harringf539bc32012-02-06 00:18:37 -0800689 CHROOT_EXAMPLE_OPT="--chroot=$FLAGS_chroot"
690fi
691
Matt Tennant0a9d32d2012-07-30 16:51:37 -0700692command_completed
Brian Harringf539bc32012-02-06 00:18:37 -0800693
Brian Harring35767822012-02-01 23:50:45 -0800694cat <<EOF
Mike Frysingerbdc4fb12012-02-10 11:20:03 -0500695
696${CROS_LOG_PREFIX:-cros_sdk}: All set up. To enter the chroot, run:
697$ cros_sdk --enter $CHROOT_EXAMPLE_OPT
Brian Harring35767822012-02-01 23:50:45 -0800698
699CAUTION: Do *NOT* rm -rf the chroot directory; if there are stale bind
700mounts you may end up deleting your source tree too. To unmount and
701delete the chroot cleanly, use:
702$ cros_sdk --delete $CHROOT_EXAMPLE_OPT
Mike Frysingerbdc4fb12012-02-10 11:20:03 -0500703
Brian Harring35767822012-02-01 23:50:45 -0800704EOF
David James22dc2ba2012-11-29 15:46:58 -0800705
706warn_if_nfs "${SUDO_HOME}"