• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1/*
2 * Copyright (C) 2020 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package apex
18
19import (
20	"github.com/google/blueprint"
21
22	"android/soong/android"
23)
24
25func init() {
26	android.RegisterSingletonType("apex_depsinfo_singleton", apexDepsInfoSingletonFactory)
27}
28
29type apexDepsInfoSingleton struct {
30	allowedApexDepsInfoCheckResult android.OutputPath
31}
32
33func apexDepsInfoSingletonFactory() android.Singleton {
34	return &apexDepsInfoSingleton{}
35}
36
37var (
38	// Generate new apex allowed_deps.txt by merging all internal dependencies.
39	generateApexDepsInfoFilesRule = pctx.AndroidStaticRule("generateApexDepsInfoFilesRule", blueprint.RuleParams{
40		Command: "cat $out.rsp | xargs cat" +
41			// Only track non-external dependencies, i.e. those that end up in the binary
42			" | grep -v '(external)'" +
43			// Ignore comments in any of the files
44			" | grep -v '^#'" +
45			" | sort -u -f >$out",
46		Rspfile:        "$out.rsp",
47		RspfileContent: "$in",
48	})
49
50	// Diff two given lists while ignoring comments in the allowed deps file.
51	diffAllowedApexDepsInfoRule = pctx.AndroidStaticRule("diffAllowedApexDepsInfoRule", blueprint.RuleParams{
52		Description: "Diff ${allowed_deps} and ${new_allowed_deps}",
53		Command: `
54			if grep -v '^#' ${allowed_deps} | diff -B - ${new_allowed_deps}; then
55			   touch ${out};
56			else
57				echo -e "\n******************************";
58				echo "ERROR: go/apex-allowed-deps-error";
59				echo "******************************";
60				echo "Detected changes to allowed dependencies in updatable modules.";
61				echo "To fix and update packages/modules/common/build/allowed_deps.txt, please run:";
62				echo "$$ (croot && packages/modules/common/build/update-apex-allowed-deps.sh)";
63				echo "Members of mainline-modularization@google.com will review the changes.";
64				echo -e "******************************\n";
65				exit 1;
66			fi;
67		`,
68	}, "allowed_deps", "new_allowed_deps")
69)
70
71func (s *apexDepsInfoSingleton) GenerateBuildActions(ctx android.SingletonContext) {
72	updatableFlatLists := android.Paths{}
73	ctx.VisitAllModules(func(module android.Module) {
74		if binaryInfo, ok := module.(android.ApexBundleDepsInfoIntf); ok {
75			apexInfo := ctx.ModuleProvider(module, android.ApexInfoProvider).(android.ApexInfo)
76			if path := binaryInfo.FlatListPath(); path != nil {
77				if binaryInfo.Updatable() || apexInfo.Updatable {
78					updatableFlatLists = append(updatableFlatLists, path)
79				}
80			}
81		}
82	})
83
84	allowedDepsSource := android.ExistentPathForSource(ctx, "packages/modules/common/build/allowed_deps.txt")
85	newAllowedDeps := android.PathForOutput(ctx, "apex", "depsinfo", "new-allowed-deps.txt")
86	s.allowedApexDepsInfoCheckResult = android.PathForOutput(ctx, newAllowedDeps.Rel()+".check")
87
88	if !allowedDepsSource.Valid() {
89		// Unbundled projects may not have packages/modules/common/ checked out; ignore those.
90		ctx.Build(pctx, android.BuildParams{
91			Rule:   android.Touch,
92			Output: s.allowedApexDepsInfoCheckResult,
93		})
94	} else {
95		allowedDeps := allowedDepsSource.Path()
96
97		ctx.Build(pctx, android.BuildParams{
98			Rule:   generateApexDepsInfoFilesRule,
99			Inputs: append(updatableFlatLists, allowedDeps),
100			Output: newAllowedDeps,
101		})
102
103		ctx.Build(pctx, android.BuildParams{
104			Rule:   diffAllowedApexDepsInfoRule,
105			Input:  newAllowedDeps,
106			Output: s.allowedApexDepsInfoCheckResult,
107			Args: map[string]string{
108				"allowed_deps":     allowedDeps.String(),
109				"new_allowed_deps": newAllowedDeps.String(),
110			},
111		})
112	}
113
114	ctx.Phony("apex-allowed-deps-check", s.allowedApexDepsInfoCheckResult)
115}
116
117func (s *apexDepsInfoSingleton) MakeVars(ctx android.MakeVarsContext) {
118	// Export check result to Make. The path is added to droidcore.
119	ctx.Strict("APEX_ALLOWED_DEPS_CHECK", s.allowedApexDepsInfoCheckResult.String())
120}
121