blob: f687c8645ffb1dec1c6bda6da2ca4785d4a9e622 [file] [log] [blame]
rspangler@google.comd74220d2009-10-09 20:56:14 +00001#!/bin/bash
2
3# Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
4# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
7# Script to enter the chroot environment
8
9# Load common constants. This should be the first executable line.
10# The path to common.sh should be relative to your script's location.
11. "$(dirname "$0")/common.sh"
12
derat@google.com86dcc8e2009-11-21 19:49:49 +000013# Script must be run outside the chroot and as a regular user.
rspangler@google.comd74220d2009-10-09 20:56:14 +000014assert_outside_chroot
derat@google.com86dcc8e2009-11-21 19:49:49 +000015assert_not_root_user
rspangler@google.comd74220d2009-10-09 20:56:14 +000016
17# Define command line flags
18# See http://code.google.com/p/shflags/wiki/Documentation10x
19DEFINE_string chroot "$DEFAULT_CHROOT_DIR" \
20 "The destination dir for the chroot environment." "d"
21DEFINE_string trunk "$GCLIENT_ROOT" \
22 "The source trunk to bind mount within the chroot." "s"
David McMahon03aeb202009-12-08 12:47:08 -080023DEFINE_string build_number "" \
24 "The build-bot build number (when called by buildbot only)." "b"
rspangler@google.comd74220d2009-10-09 20:56:14 +000025
David McMahon857dbb52009-12-09 18:21:05 -080026DEFINE_boolean official_build $FLAGS_FALSE "Set CHROMEOS_OFFICIAL=1 for release builds."
rspangler@google.comd74220d2009-10-09 20:56:14 +000027DEFINE_boolean mount $FLAGS_FALSE "Only set up mounts."
28DEFINE_boolean unmount $FLAGS_FALSE "Only tear down mounts."
rspangler@google.comd74220d2009-10-09 20:56:14 +000029
30# More useful help
31FLAGS_HELP="USAGE: $0 [flags] [VAR=value] [-- \"command\"]
32
33One or more VAR=value pairs can be specified to export variables into
34the chroot environment. For example:
35
36 $0 FOO=bar BAZ=bel
37
38If [-- \"command\"] is present, runs the command inside the chroot,
39after changing directory to /$USER/trunk/src/scripts. Note that the
40command should be enclosed in quotes to prevent interpretation by the
41shell before getting into the chroot. For example:
42
43 $0 -- \"./build_platform_packages.sh\"
44
45Otherwise, provides an interactive shell.
46"
47
48# Parse command line flags
49FLAGS "$@" || exit 1
50eval set -- "${FLAGS_ARGV}"
51
David McMahon857dbb52009-12-09 18:21:05 -080052if [ $FLAGS_official_build -eq $FLAGS_TRUE ]
53then
54 CHROMEOS_OFFICIAL=1
55fi
56
rspangler@google.comd74220d2009-10-09 20:56:14 +000057# Only now can we die on error. shflags functions leak non-zero error codes,
58# so will die prematurely if 'set -e' is specified before now.
59# TODO: replace shflags with something less error-prone, or contribute a fix.
60set -e
61
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080062sudo chmod 0777 "$FLAGS_chroot/var/lock"
63
64LOCKFILE="$FLAGS_chroot/var/lock/enter_chroot"
65
rspangler@google.comd74220d2009-10-09 20:56:14 +000066function setup_env {
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080067 (
68 flock 200
69 echo $$ >> "$LOCKFILE"
rspangler@google.comd74220d2009-10-09 20:56:14 +000070
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080071 echo "Mounting chroot environment."
rspangler@google.comd74220d2009-10-09 20:56:14 +000072
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080073 # Mount only if not already mounted
74 MOUNTED_PATH="$(readlink -f "$FLAGS_chroot/proc")"
75 if [ -z "$(mount | grep -F "on $MOUNTED_PATH")" ]
76 then
77 sudo mount none -t proc "$MOUNTED_PATH"
78 fi
rspangler@google.comd74220d2009-10-09 20:56:14 +000079
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080080 MOUNTED_PATH="$(readlink -f "$FLAGS_chroot/dev/pts")"
81 if [ -z "$(mount | grep -F "on $MOUNTED_PATH")" ]
82 then
83 sudo mount none -t devpts "$MOUNTED_PATH"
84 fi
85
86 MOUNTED_PATH="$(readlink -f "${FLAGS_chroot}$CHROOT_TRUNK_DIR")"
87 if [ -z "$(mount | grep -F "on $MOUNTED_PATH")" ]
88 then
89 sudo mount --bind "$FLAGS_trunk" "$MOUNTED_PATH"
90 fi
91 ) 200>>"$LOCKFILE"
rspangler@google.comd74220d2009-10-09 20:56:14 +000092}
93
94function teardown_env {
Andrew de los Reyesc9317ea2010-02-10 13:16:36 -080095 # Only teardown if we're the last enter_chroot to die
96
97 (
98 flock 200
99
100 # check each pid in $LOCKFILE to see if it's died unexpectedly
101 TMP_LOCKFILE="$LOCKFILE.tmp"
102
103 echo -n > "$TMP_LOCKFILE" # Erase/reset temp file
104 cat "$LOCKFILE" | while read PID; do
105 if [ "$PID" = "$$" ]; then
106 # ourself, leave PROC_NAME empty
107 PROC_NAME=""
108 else
109 PROC_NAME=$(ps --pid $PID -o comm=)
110 fi
111
112 if [ ! -z "$PROC_NAME" ]; then
113 # All good, keep going
114 echo "$PID" >> "$TMP_LOCKFILE"
115 fi
116 done
117 # Remove any dups from lock file while installing new one
118 sort -n "$TMP_LOCKFILE" | uniq > "$LOCKFILE"
119
120 if [ -s "$LOCKFILE" ]; then
121 echo "At least one other pid is running in the chroot, so not"
122 echo "tearing down env."
123 else
124 echo "Unmounting chroot environment."
125 mount | grep "on $(readlink -f "$FLAGS_chroot")" | awk '{print $3}' \
126 | xargs -r -L1 sudo umount
127 fi
128 ) 200>>"$LOCKFILE"
rspangler@google.comd74220d2009-10-09 20:56:14 +0000129}
130
131if [ $FLAGS_mount -eq $FLAGS_TRUE ]
132then
133 setup_env
134 echo "Make sure you run"
135 echo " $0 --unmount"
136 echo "before deleting $FLAGS_chroot"
137 echo "or you'll end up deleting $FLAGS_trunk too!"
138 exit 0
139fi
140
141if [ $FLAGS_unmount -eq $FLAGS_TRUE ]
142then
143 teardown_env
144 exit 0
145fi
146
147# Make sure we unmount before exiting
148trap teardown_env EXIT
149setup_env
150
David McMahon03aeb202009-12-08 12:47:08 -0800151# Get the git revision to pass into the chroot.
152#
153# This must be determined outside the chroot because (1) there is no
154# git inside the chroot, and (2) if there were it would likely be
155# the wrong version, which would mess up the .git directories.
156#
157# Note that this fixes $CHROMEOS_REVISION at the time the chroot is
158# entered. That's ok for the main use case of automated builds,
159# which pass each command line into a separate call to enter_chroot
David McMahon857dbb52009-12-09 18:21:05 -0800160# so always have up-to-date info. For developer builds, there may not
161# be a single revision, since the developer may have
David McMahon03aeb202009-12-08 12:47:08 -0800162# hand-sync'd some subdirs and edited files in others.
David McMahon857dbb52009-12-09 18:21:05 -0800163# In that case, check against origin/HEAD and mark** revision.
David McMahon03aeb202009-12-08 12:47:08 -0800164# Use git:8 chars of sha1
165REVISION=$(git rev-parse HEAD)
166ORIGIN_REVISION=$(git rev-parse origin/HEAD)
David McMahon857dbb52009-12-09 18:21:05 -0800167# Do not check for clean revision on official builds. They are coming directly
168# from a branch rev and cannot compare to origin/HEAD.
169if [ $FLAGS_official_build != $FLAGS_TRUE ] && \
170 [ "$REVISION" != "$ORIGIN_REVISION" ]
rspangler@google.comd74220d2009-10-09 20:56:14 +0000171then
David McMahon03aeb202009-12-08 12:47:08 -0800172 # Mark dirty tree with "**"
David McMahon857dbb52009-12-09 18:21:05 -0800173 REVISION="${REVISION:0:8}**"
David McMahon03aeb202009-12-08 12:47:08 -0800174else
175 REVISION="${REVISION:0:8}"
rspangler@google.comd74220d2009-10-09 20:56:14 +0000176fi
David McMahon857dbb52009-12-09 18:21:05 -0800177CHROOT_PASSTHRU="CHROMEOS_REVISION=$REVISION BUILDBOT_BUILD=$FLAGS_build_number CHROMEOS_OFFICIAL=$CHROMEOS_OFFICIAL"
rspangler@google.comd74220d2009-10-09 20:56:14 +0000178
derat@google.com4e7a92b2009-11-21 23:44:14 +0000179# Run command or interactive shell. Also include the non-chrooted path to
180# the source trunk for scripts that may need to print it (e.g.
181# build_image.sh).
David McMahon857dbb52009-12-09 18:21:05 -0800182sudo chroot "$FLAGS_chroot" sudo -i -u $USER $CHROOT_PASSTHRU \
Colin Watson3a3566b2010-01-07 07:36:32 +0000183 EXTERNAL_TRUNK_PATH="${FLAGS_trunk}" LANG=C "$@"
rspangler@google.comd74220d2009-10-09 20:56:14 +0000184
185# Remove trap and explicitly unmount
186trap - EXIT
187teardown_env