1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
|
// Copyright 2016 The Bazel Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package com.google.devtools.build.lib.sandbox;
import com.google.devtools.build.lib.runtime.CommandEnvironment;
import com.google.devtools.build.lib.shell.Command;
import com.google.devtools.build.lib.util.OsUtils;
import com.google.devtools.build.lib.vfs.Path;
import com.google.devtools.build.lib.vfs.PathFragment;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
/**
* This runner runs process-wrapper inside a sandboxed execution root, which should work on most
* platforms and gives at least some isolation between running actions.
*/
final class ProcessWrapperRunner extends SandboxRunner {
private static final String PROCESS_WRAPPER = "process-wrapper" + OsUtils.executableExtension();
private final Path sandboxExecRoot;
ProcessWrapperRunner(Path sandboxExecRoot, boolean verboseFailures) {
super(verboseFailures);
this.sandboxExecRoot = sandboxExecRoot;
}
static boolean isSupported(CommandEnvironment cmdEnv) {
// We can only use this runner, if the process-wrapper exists in the embedded tools.
// This might not always be the case, e.g. while bootstrapping.
return getProcessWrapper(cmdEnv) != null;
}
/** Returns the PathFragment of the process wrapper binary, or null if it doesn't exist. */
static Path getProcessWrapper(CommandEnvironment cmdEnv) {
PathFragment execPath = cmdEnv.getBlazeWorkspace().getBinTools().getExecPath(PROCESS_WRAPPER);
return execPath != null ? cmdEnv.getExecRoot().getRelative(execPath) : null;
}
@Override
protected Command getCommand(
CommandEnvironment cmdEnv,
List<String> spawnArguments,
Map<String, String> env,
int timeout,
boolean allowNetwork,
boolean useFakeHostname,
boolean useFakeUsername) {
List<String> commandLineArgs = getCommandLine(cmdEnv, spawnArguments, timeout);
return new Command(commandLineArgs.toArray(new String[0]), env, sandboxExecRoot.getPathFile());
}
static List<String> getCommandLine(
CommandEnvironment cmdEnv, List<String> spawnArguments, int timeout) {
List<String> commandLineArgs = new ArrayList<>(5 + spawnArguments.size());
commandLineArgs.add(getProcessWrapper(cmdEnv).getPathString());
commandLineArgs.add("--timeout=" + timeout);
commandLineArgs.add("--kill_delay=5"); /* give some time to print stacktraces and whatnot. */
commandLineArgs.addAll(spawnArguments);
return commandLineArgs;
}
}
|