// Copyright 2015 The Bazel Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package com.google.devtools.build.lib.sandbox; import com.google.common.collect.ImmutableList; import com.google.devtools.build.lib.actions.ActionContext; import com.google.devtools.build.lib.buildtool.BuildRequest; import com.google.devtools.build.lib.exec.ActionContextProvider; import com.google.devtools.build.lib.exec.ExecutionOptions; import com.google.devtools.build.lib.runtime.CommandEnvironment; import com.google.devtools.build.lib.vfs.Path; import java.io.IOException; /** * Provides the sandboxed spawn strategy. */ final class SandboxActionContextProvider extends ActionContextProvider { private final ImmutableList contexts; private SandboxActionContextProvider(ImmutableList contexts) { this.contexts = contexts; } public static SandboxActionContextProvider create( CommandEnvironment cmdEnv, BuildRequest buildRequest, Path sandboxBase) throws IOException { ImmutableList.Builder contexts = ImmutableList.builder(); boolean verboseFailures = buildRequest.getOptions(ExecutionOptions.class).verboseFailures; String productName = cmdEnv.getRuntime().getProductName(); // This works on most platforms, but isn't the best choice, so we put it first and let later // platform-specific sandboxing strategies become the default. if (ProcessWrapperSandboxedStrategy.isSupported(cmdEnv)) { contexts.add( new ProcessWrapperSandboxedStrategy( cmdEnv, buildRequest, sandboxBase, verboseFailures, productName)); } // This is the preferred sandboxing strategy on Linux. if (LinuxSandboxedStrategy.isSupported(cmdEnv)) { contexts.add( LinuxSandboxedStrategy.create(cmdEnv, buildRequest, sandboxBase, verboseFailures)); } // This is the preferred sandboxing strategy on macOS. if (DarwinSandboxedStrategy.isSupported(cmdEnv)) { contexts.add( DarwinSandboxedStrategy.create( cmdEnv, buildRequest, sandboxBase, verboseFailures, productName)); } return new SandboxActionContextProvider(contexts.build()); } @Override public Iterable getActionContexts() { return contexts; } }