blob: 4db2421843a6f503dcf47cd3510eee4dd78a353e [file] [log] [blame]
Leopold29400282023-01-04 17:12:46 +01001#!/usr/bin/env bash
2# Both bazelisk and bazel's native wrapper scripts will attempt to use the well-known executable
3# named "tools/bazel" to run Bazel. The path of the original executable is stored in BAZEL_REAL.
4set -euo pipefail
Leopold7fbf1042023-01-06 19:57:37 +01005shopt -s nullglob
Leopold29400282023-01-04 17:12:46 +01006
Tim Windelschmidt246f2fe2023-10-26 04:39:35 +02007DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
8
9# Jump into nix-shell if BAZEL_REAL is set to a /nix/store path and we aren't
10# inside our shell yet.
11if [[ "${BAZEL_REAL:-}" == /nix/store/* && -z "${MONOGON_NIXOS:-}" ]]; then
Tim Windelschmidt5bfdb972023-11-25 06:01:28 +010012 echo "Detected Nix based bazel installation and we are not in a nix-shell, overriding to nix-shell." >&2
13 USE_NIX_SHELL=yes
14fi
Tim Windelschmidt246f2fe2023-10-26 04:39:35 +020015
Tim Windelschmidt5bfdb972023-11-25 06:01:28 +010016# If the wrapper is called directly we check if nix-shell is available
17# to automagically switch into the nix-shell. Otherwise complain and
18# exit.
19if [[ -z "${BAZEL_REAL:-}" ]]; then
20 if [[ -x $(command -v nix-shell) ]]; then
21 echo "BAZEL_REAL is not set and nix-shell is available, overriding to nix-shell" >&2
22 USE_NIX_SHELL=yes
23 else
24 echo "BAZEL_REAL is not set and nix-shell not available. Please check the setup guide." >&2
25 exit 1
26 fi
27fi
28
29if [[ -n "${USE_NIX_SHELL:-}" ]]; then
Tim Windelschmidt246f2fe2023-10-26 04:39:35 +020030 # Jump to project root since bwrap hangs if we aren't there
31 cd "${DIR}/../"
32
33 export COMMAND="bazel $*"
34 exec nix-shell
35fi
36
Leopold7fbf1042023-01-06 19:57:37 +010037# Short circuit if we're rebuilding the sandbox via third_party/sandboxroot/regenerate.sh.
38if [[ -n ${MONOGON_SYSROOT_REBUILD:-} ]]; then
39 echo "Skipping Bazel wrapper" >&2
40 exec -a "$0" "${BAZEL_REAL}" "$@"
Leopold29400282023-01-04 17:12:46 +010041fi
42
Leopold7fbf1042023-01-06 19:57:37 +010043SANDBOX="${DIR}/../.bazeldnf/sandbox/default"
44BAZEL_ARGS="--noworkspace_rc --bazelrc ${DIR}/../.bazelrc.sandboxroot"
Leopold29400282023-01-04 17:12:46 +010045
Leopold7fbf1042023-01-06 19:57:37 +010046prechecks() {
Leopold7fbf1042023-01-06 19:57:37 +010047 # Recommend using Bazelisk instead of Bazel's "bazel.sh" wrapper.
Leopold Schabel9508b122023-07-14 17:54:17 +020048 # Skip if we're inside the Nix shell (which uses a customized Bazel build).
49 if [[ -z "${BAZELISK_SKIP_WRAPPER:-}" && -z "${MONOGON_NIXOS:-}" ]]; then
Leopold7fbf1042023-01-06 19:57:37 +010050 echo "############################################################" >&2
51 echo "# Please use Bazelisk to build the Monorepo. Using Bazel #" >&2
52 echo "# directly may work, but is not recommended or supported. #" >&2
53 echo "############################################################" >&2
54 fi
55
56 # Our local user needs write access to /dev/kvm. Warn if this is not the case.
57 if ! touch /dev/kvm; then
58 echo "###################################################################" >&2
59 echo "# Cannot write to /dev/kvm - please verify permissions. #" >&2
60 echo "# Most tests require KVM and will not work. Builds still work. #" >&2
61 echo "# On most systems, add your user to the kvm group and re-login. #" >&2
62 echo "###################################################################" >&2
63 fi
64}
65
66intellij_patch() {
67 # When IntelliJ's Bazel plugin uses //scripts/bin/bazel to either build targets
68 # or run syncs, it adds a --override_repository flag to the bazel command
69 # line that points @intellij_aspect into a path on the filesystem. This
70 # external repository contains a Bazel Aspect definition which Bazel
71 # executes to provide the IntelliJ Bazel plugin with information about the
72 # workspace / build targets / etc...
73 #
74 # We need to patch the aspect definition to fix a number of bugs
75 # to make it work with the Monogon monorepo.
76
77 # Find all IntelliJ installation/config directories.
78 local ij_home_paths=("${HOME}/.local/share/JetBrains/IntelliJIdea"*)
79 # Get the newest one, if any.
80 local ij_home=""
81 if ! [[ ${#ij_home_paths[@]} -eq 0 ]]; then
82 # Reverse sort paths by name, with the first being the newest IntelliJ
83 # installation.
84 IFS=$'\n'
85 local sorted=($(sort -r <<<"${ij_home_paths[*]}"))
86 unset IFS
87 ij_home="${sorted[0]}"
88 fi
89
90 # If we don't have or can't find ij_home, don't bother with attempting to patch anything.
91 if [[ -d "${ij_home}" ]]; then
92 # aspect_path is the path to the aspect external repository that IntelliJ will
93 # inject into bazel via --override_repository.
94 local aspect_path="${ij_home}/ijwb/aspect"
95 # Our copy of it.
96 local patched_path="${ij_home}/ijwb/aspect-monogon"
97 # Checksum of the patch that was used to create patched_path.
98 local checksum_file="${patched_path}/checksum"
99 # The patch
100 local patch_file="${DIR}/../intellij/patches/bazel_intellij_aspect_filter.patch"
101 # The checksum of the patch we're about to apply.
102 local checksum
103 checksum=$(sha256sum "$patch_file" | cut -d' ' -f1)
104
105 # If the patched aspect repository doesn't exist, or the checksum of the patch
106 # we're about to apply doesn't match the checksum of the patch that was used
107 # to create the patched aspect repository, apply the patch.
108
109 if ! [[ -d "${patched_path}" ]] || ! [[ "$(cat "${checksum_file}")" == "${checksum}" ]]; then
110 echo "IntelliJ found at ${ij_home}, patching aspect repository." >&2
111 # Copy the aspect repository to the patched path.
112 rm -rf "${patched_path}"
113 cp -r "${aspect_path}" "${patched_path}"
114 # Apply the patch.
115 patch -d "${patched_path}" -p1 < "${patch_file}"
116 # Write the checksum of the patch to the checksum file.
117 echo "${checksum}" > "${checksum_file}"
118 else
119 echo "IntelliJ found at ${ij_home}, aspect repository already patched." >&2
120 fi
121 fi
122}
123
124regenerate_sysroot() {
125 local checksum_file="${SANDBOX}/checksum"
126 local checksum_input=(
127 ${DIR}/../third_party/sandboxroot/{repositories.bzl,BUILD.bazel}
Leopold7fbf1042023-01-06 19:57:37 +0100128 ${DIR}/../.bazelrc.sandboxroot
129 ${DIR}/../tools/bazel
130 )
131 local checksum
132 checksum="$(sha256sum <(cat "${checksum_input[@]}") | cut -d' ' -f1)"
133
134 if [[ -f "${checksum_file}" ]] && [[ "$(cat "${checksum_file}")" == "${checksum}" ]]; then
135 # Sysroot is up to date.
136 return
137 fi
138
139 echo "Regenerating sysroot $SANDBOX ..." >&2
140 rm -rf "$SANDBOX"
141 "$BAZEL_REAL" ${BAZEL_ARGS} run //third_party/sandboxroot:sandboxroot
142
143 # Manually resolve alternatives (https://github.com/rmohr/bazeldnf/issues/28)
144 ln -r -s -f "${SANDBOX}/root/usr/bin/ld.bfd" "${SANDBOX}/root/usr/bin/ld"
145
146 # Write checksum of the sysroot to a file in order to detect changes.
147 echo "$checksum" > "${SANDBOX}/checksum"
148
149 # Write Bazel config
150 ROOT=$(realpath "$DIR/..")
151
152 # We need the host's resolv.conf for some E2E tests which require internet access.
153 cp /etc/resolv.conf "${ROOT}/.bazeldnf/sandbox/default/root/etc/resolv.conf"
154
155 cat > "${DIR}/../.bazelrc.sandbox" <<EOF
Leopoldd2668122023-02-01 15:15:59 +0100156# Autogenerated by tools/bazel. Manual changes can result in stale caches.
157# Modify the generator instead.
158
Leopold Schabel9508b122023-07-14 17:54:17 +0200159# Mount directories from the generated Fedora sandbox root.
Leopold7fbf1042023-01-06 19:57:37 +0100160build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/etc:/etc
161build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/usr:/usr
162build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/var:/var
163build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/run:/run
164build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/tmp:/tmp
165build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/lib64:/lib64
166build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/lib:/lib
167build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/bin:/bin
168build --sandbox_add_mount_pair=${ROOT}/.bazeldnf/sandbox/default/root/sbin:/sbin
Leopold Schabel9508b122023-07-14 17:54:17 +0200169
170# Needed for the Go SDK shipped by rules_go to resolve its own GOROOT via /proc/self/exe.
171build --sandbox_add_mount_pair=/proc
172
173# Needed for python's multiprocessing lock implementation
174# (_multiprocessing.SemLock for eg. mp.Queue), as used in EDK2's build system.
175build --sandbox_add_mount_pair=/dev/shm
176
177# Needed for qemu for tests.
178build --sandbox_add_mount_pair=/dev/kvm
179
180# Put a tmpfs on /tmp for better performance.
181build --sandbox_tmpfs_path=/tmp
Leopold7fbf1042023-01-06 19:57:37 +0100182EOF
183
184 echo "Done regenerating sysroot." >&2
185}
186
187prechecks
188intellij_patch
189regenerate_sysroot
190
191# Find the --override_repository=intellij_aspect=[path]
192# argument in $@ and replace the path with the patched version.
193# This is surprisingly tricky - bash special-cases "$@" to expand
194# as "$1" "$2" ... "$n" so that argv is preserved, so we need to
195# modify the real $@ array.
196
197for i in $(seq 1 $#); do
198 if [[ "${!i}" == "--override_repository=intellij_aspect="* ]]; then
199 new_arg="${!i/\/aspect/\/aspect-monogon}"
200 set -- "${@:1:$((i-1))}" "${new_arg}" "${@:$((i+1))}"
201 fi
202done
203
204# Bazel does not track the ambient environment, so we need to invalidate
205# the entire build via an --action_env whenever the sandbox digest changes.
206# This is strictly necessary to guarantee correctness.
207export MONOGON_SANDBOX_DIGEST="$(cat "${SANDBOX}/checksum")"
208
Leopold Schabel9508b122023-07-14 17:54:17 +0200209# Ignore the host TMPDIR - it might be something funny like /run/user/1000,
210# we want it to be /tmp inside the sandbox.
211export TMPDIR=/tmp
212
Leopold7fbf1042023-01-06 19:57:37 +0100213exec -a "$0" "${BAZEL_REAL}" "$@"