| import bb.siggen |
| import oe |
| |
| def sstate_rundepfilter(siggen, fn, recipename, task, dep, depname, dataCache): |
| # Return True if we should keep the dependency, False to drop it |
| def isNative(x): |
| return x.endswith("-native") |
| def isCross(x): |
| return "-cross-" in x |
| def isNativeSDK(x): |
| return x.startswith("nativesdk-") |
| def isKernel(fn): |
| inherits = " ".join(dataCache.inherits[fn]) |
| return inherits.find("/module-base.bbclass") != -1 or inherits.find("/linux-kernel-base.bbclass") != -1 |
| def isPackageGroup(fn): |
| inherits = " ".join(dataCache.inherits[fn]) |
| return "/packagegroup.bbclass" in inherits |
| def isAllArch(fn): |
| inherits = " ".join(dataCache.inherits[fn]) |
| return "/allarch.bbclass" in inherits |
| def isImage(fn): |
| return "/image.bbclass" in " ".join(dataCache.inherits[fn]) |
| |
| # (Almost) always include our own inter-task dependencies. |
| # The exception is the special do_kernel_configme->do_unpack_and_patch |
| # dependency from archiver.bbclass. |
| if recipename == depname: |
| if task == "do_kernel_configme" and dep.endswith(".do_unpack_and_patch"): |
| return False |
| return True |
| |
| # Exclude well defined recipe->dependency |
| if "%s->%s" % (recipename, depname) in siggen.saferecipedeps: |
| return False |
| |
| # Check for special wildcard |
| if "*->%s" % depname in siggen.saferecipedeps and recipename != depname: |
| return False |
| |
| # Don't change native/cross/nativesdk recipe dependencies any further |
| if isNative(recipename) or isCross(recipename) or isNativeSDK(recipename): |
| return True |
| |
| # Only target packages beyond here |
| |
| # allarch packagegroups are assumed to have well behaved names which don't change between architecures/tunes |
| if isPackageGroup(fn) and isAllArch(fn) and not isNative(depname): |
| return False |
| |
| # Exclude well defined machine specific configurations which don't change ABI |
| if depname in siggen.abisaferecipes and not isImage(fn): |
| return False |
| |
| # Kernel modules are well namespaced. We don't want to depend on the kernel's checksum |
| # if we're just doing an RRECOMMENDS_xxx = "kernel-module-*", not least because the checksum |
| # is machine specific. |
| # Therefore if we're not a kernel or a module recipe (inheriting the kernel classes) |
| # and we reccomend a kernel-module, we exclude the dependency. |
| depfn = dep.rsplit(".", 1)[0] |
| if dataCache and isKernel(depfn) and not isKernel(fn): |
| for pkg in dataCache.runrecs[fn]: |
| if " ".join(dataCache.runrecs[fn][pkg]).find("kernel-module-") != -1: |
| return False |
| |
| # Default to keep dependencies |
| return True |
| |
| def sstate_lockedsigs(d): |
| sigs = {} |
| types = (d.getVar("SIGGEN_LOCKEDSIGS_TYPES") or "").split() |
| for t in types: |
| siggen_lockedsigs_var = "SIGGEN_LOCKEDSIGS_%s" % t |
| lockedsigs = (d.getVar(siggen_lockedsigs_var) or "").split() |
| for ls in lockedsigs: |
| pn, task, h = ls.split(":", 2) |
| if pn not in sigs: |
| sigs[pn] = {} |
| sigs[pn][task] = [h, siggen_lockedsigs_var] |
| return sigs |
| |
| class SignatureGeneratorOEBasic(bb.siggen.SignatureGeneratorBasic): |
| name = "OEBasic" |
| def init_rundepcheck(self, data): |
| self.abisaferecipes = (data.getVar("SIGGEN_EXCLUDERECIPES_ABISAFE") or "").split() |
| self.saferecipedeps = (data.getVar("SIGGEN_EXCLUDE_SAFE_RECIPE_DEPS") or "").split() |
| pass |
| def rundep_check(self, fn, recipename, task, dep, depname, dataCache = None): |
| return sstate_rundepfilter(self, fn, recipename, task, dep, depname, dataCache) |
| |
| class SignatureGeneratorOEBasicHash(bb.siggen.SignatureGeneratorBasicHash): |
| name = "OEBasicHash" |
| def init_rundepcheck(self, data): |
| self.abisaferecipes = (data.getVar("SIGGEN_EXCLUDERECIPES_ABISAFE") or "").split() |
| self.saferecipedeps = (data.getVar("SIGGEN_EXCLUDE_SAFE_RECIPE_DEPS") or "").split() |
| self.lockedsigs = sstate_lockedsigs(data) |
| self.lockedhashes = {} |
| self.lockedpnmap = {} |
| self.lockedhashfn = {} |
| self.machine = data.getVar("MACHINE") |
| self.mismatch_msgs = [] |
| self.unlockedrecipes = (data.getVar("SIGGEN_UNLOCKED_RECIPES") or |
| "").split() |
| self.unlockedrecipes = { k: "" for k in self.unlockedrecipes } |
| pass |
| |
| def tasks_resolved(self, virtmap, virtpnmap, dataCache): |
| # Translate virtual/xxx entries to PN values |
| newabisafe = [] |
| for a in self.abisaferecipes: |
| if a in virtpnmap: |
| newabisafe.append(virtpnmap[a]) |
| else: |
| newabisafe.append(a) |
| self.abisaferecipes = newabisafe |
| newsafedeps = [] |
| for a in self.saferecipedeps: |
| a1, a2 = a.split("->") |
| if a1 in virtpnmap: |
| a1 = virtpnmap[a1] |
| if a2 in virtpnmap: |
| a2 = virtpnmap[a2] |
| newsafedeps.append(a1 + "->" + a2) |
| self.saferecipedeps = newsafedeps |
| |
| def rundep_check(self, fn, recipename, task, dep, depname, dataCache = None): |
| return sstate_rundepfilter(self, fn, recipename, task, dep, depname, dataCache) |
| |
| def get_taskdata(self): |
| data = super(bb.siggen.SignatureGeneratorBasicHash, self).get_taskdata() |
| return (data, self.lockedpnmap, self.lockedhashfn) |
| |
| def set_taskdata(self, data): |
| coredata, self.lockedpnmap, self.lockedhashfn = data |
| super(bb.siggen.SignatureGeneratorBasicHash, self).set_taskdata(coredata) |
| |
| def dump_sigs(self, dataCache, options): |
| sigfile = os.getcwd() + "/locked-sigs.inc" |
| bb.plain("Writing locked sigs to %s" % sigfile) |
| self.dump_lockedsigs(sigfile) |
| return super(bb.siggen.SignatureGeneratorBasicHash, self).dump_sigs(dataCache, options) |
| |
| def get_taskhash(self, fn, task, deps, dataCache): |
| h = super(bb.siggen.SignatureGeneratorBasicHash, self).get_taskhash(fn, task, deps, dataCache) |
| |
| recipename = dataCache.pkg_fn[fn] |
| self.lockedpnmap[fn] = recipename |
| self.lockedhashfn[fn] = dataCache.hashfn[fn] |
| |
| unlocked = False |
| if recipename in self.unlockedrecipes: |
| unlocked = True |
| else: |
| def get_mc(tid): |
| tid = tid.rsplit('.', 1)[0] |
| if tid.startswith('multiconfig:'): |
| elems = tid.split(':') |
| return elems[1] |
| def recipename_from_dep(dep): |
| # The dep entry will look something like |
| # /path/path/recipename.bb.task, virtual:native:/p/foo.bb.task, |
| # ... |
| |
| fn = dep.rsplit('.', 1)[0] |
| return dataCache.pkg_fn[fn] |
| |
| mc = get_mc(fn) |
| # If any unlocked recipe is in the direct dependencies then the |
| # current recipe should be unlocked as well. |
| depnames = [ recipename_from_dep(x) for x in deps if mc == get_mc(x)] |
| if any(x in y for y in depnames for x in self.unlockedrecipes): |
| self.unlockedrecipes[recipename] = '' |
| unlocked = True |
| |
| if not unlocked and recipename in self.lockedsigs: |
| if task in self.lockedsigs[recipename]: |
| k = fn + "." + task |
| h_locked = self.lockedsigs[recipename][task][0] |
| var = self.lockedsigs[recipename][task][1] |
| self.lockedhashes[k] = h_locked |
| self.taskhash[k] = h_locked |
| #bb.warn("Using %s %s %s" % (recipename, task, h)) |
| |
| if h != h_locked: |
| self.mismatch_msgs.append('The %s:%s sig is computed to be %s, but the sig is locked to %s in %s' |
| % (recipename, task, h, h_locked, var)) |
| |
| return h_locked |
| #bb.warn("%s %s %s" % (recipename, task, h)) |
| return h |
| |
| def dump_sigtask(self, fn, task, stampbase, runtime): |
| k = fn + "." + task |
| if k in self.lockedhashes: |
| return |
| super(bb.siggen.SignatureGeneratorBasicHash, self).dump_sigtask(fn, task, stampbase, runtime) |
| |
| def dump_lockedsigs(self, sigfile, taskfilter=None): |
| types = {} |
| for k in self.runtaskdeps: |
| if taskfilter: |
| if not k in taskfilter: |
| continue |
| fn = k.rsplit(".",1)[0] |
| t = self.lockedhashfn[fn].split(" ")[1].split(":")[5] |
| t = 't-' + t.replace('_', '-') |
| if t not in types: |
| types[t] = [] |
| types[t].append(k) |
| |
| with open(sigfile, "w") as f: |
| l = sorted(types) |
| for t in l: |
| f.write('SIGGEN_LOCKEDSIGS_%s = "\\\n' % t) |
| types[t].sort() |
| sortedk = sorted(types[t], key=lambda k: self.lockedpnmap[k.rsplit(".",1)[0]]) |
| for k in sortedk: |
| fn = k.rsplit(".",1)[0] |
| task = k.rsplit(".",1)[1] |
| if k not in self.taskhash: |
| continue |
| f.write(" " + self.lockedpnmap[fn] + ":" + task + ":" + self.taskhash[k] + " \\\n") |
| f.write(' "\n') |
| f.write('SIGGEN_LOCKEDSIGS_TYPES_%s = "%s"' % (self.machine, " ".join(l))) |
| |
| def dump_siglist(self, sigfile): |
| with open(sigfile, "w") as f: |
| tasks = [] |
| for taskitem in self.taskhash: |
| (fn, task) = taskitem.rsplit(".", 1) |
| pn = self.lockedpnmap[fn] |
| tasks.append((pn, task, fn, self.taskhash[taskitem])) |
| for (pn, task, fn, taskhash) in sorted(tasks): |
| f.write('%s.%s %s %s\n' % (pn, task, fn, taskhash)) |
| |
| def checkhashes(self, missed, ret, sq_fn, sq_task, sq_hash, sq_hashfn, d): |
| warn_msgs = [] |
| error_msgs = [] |
| sstate_missing_msgs = [] |
| |
| for task in range(len(sq_fn)): |
| if task not in ret: |
| for pn in self.lockedsigs: |
| if sq_hash[task] in iter(self.lockedsigs[pn].values()): |
| if sq_task[task] == 'do_shared_workdir': |
| continue |
| sstate_missing_msgs.append("Locked sig is set for %s:%s (%s) yet not in sstate cache?" |
| % (pn, sq_task[task], sq_hash[task])) |
| |
| checklevel = d.getVar("SIGGEN_LOCKEDSIGS_TASKSIG_CHECK") |
| if checklevel == 'warn': |
| warn_msgs += self.mismatch_msgs |
| elif checklevel == 'error': |
| error_msgs += self.mismatch_msgs |
| |
| checklevel = d.getVar("SIGGEN_LOCKEDSIGS_SSTATE_EXISTS_CHECK") |
| if checklevel == 'warn': |
| warn_msgs += sstate_missing_msgs |
| elif checklevel == 'error': |
| error_msgs += sstate_missing_msgs |
| |
| if warn_msgs: |
| bb.warn("\n".join(warn_msgs)) |
| if error_msgs: |
| bb.fatal("\n".join(error_msgs)) |
| |
| class SignatureGeneratorOEEquivHash(SignatureGeneratorOEBasicHash): |
| name = "OEEquivHash" |
| |
| def init_rundepcheck(self, data): |
| super().init_rundepcheck(data) |
| self.server = data.getVar('SSTATE_HASHEQUIV_SERVER') |
| self.method = data.getVar('SSTATE_HASHEQUIV_METHOD') |
| self.unihashes = bb.persist_data.persist('SSTATESIG_UNIHASH_CACHE_v1_' + self.method.replace('.', '_'), data) |
| |
| def get_taskdata(self): |
| return (self.server, self.method) + super().get_taskdata() |
| |
| def set_taskdata(self, data): |
| self.server, self.method = data[:2] |
| super().set_taskdata(data[2:]) |
| |
| def __get_task_unihash_key(self, task): |
| # TODO: The key only *needs* to be the taskhash, the task is just |
| # convenient |
| return '%s:%s' % (task, self.taskhash[task]) |
| |
| def get_stampfile_hash(self, task): |
| if task in self.taskhash: |
| # If a unique hash is reported, use it as the stampfile hash. This |
| # ensures that if a task won't be re-run if the taskhash changes, |
| # but it would result in the same output hash |
| unihash = self.unihashes.get(self.__get_task_unihash_key(task)) |
| if unihash is not None: |
| return unihash |
| |
| return super().get_stampfile_hash(task) |
| |
| def get_unihash(self, task): |
| import urllib |
| import json |
| |
| taskhash = self.taskhash[task] |
| |
| key = self.__get_task_unihash_key(task) |
| |
| # TODO: This cache can grow unbounded. It probably only needs to keep |
| # for each task |
| unihash = self.unihashes.get(key) |
| if unihash is not None: |
| return unihash |
| |
| # In the absence of being able to discover a unique hash from the |
| # server, make it be equivalent to the taskhash. The unique "hash" only |
| # really needs to be a unique string (not even necessarily a hash), but |
| # making it match the taskhash has a few advantages: |
| # |
| # 1) All of the sstate code that assumes hashes can be the same |
| # 2) It provides maximal compatibility with builders that don't use |
| # an equivalency server |
| # 3) The value is easy for multiple independent builders to derive the |
| # same unique hash from the same input. This means that if the |
| # independent builders find the same taskhash, but it isn't reported |
| # to the server, there is a better chance that they will agree on |
| # the unique hash. |
| unihash = taskhash |
| |
| try: |
| url = '%s/v1/equivalent?%s' % (self.server, |
| urllib.parse.urlencode({'method': self.method, 'taskhash': self.taskhash[task]})) |
| |
| request = urllib.request.Request(url) |
| response = urllib.request.urlopen(request) |
| data = response.read().decode('utf-8') |
| |
| json_data = json.loads(data) |
| |
| if json_data: |
| unihash = json_data['unihash'] |
| # A unique hash equal to the taskhash is not very interesting, |
| # so it is reported it at debug level 2. If they differ, that |
| # is much more interesting, so it is reported at debug level 1 |
| bb.debug((1, 2)[unihash == taskhash], 'Found unihash %s in place of %s for %s from %s' % (unihash, taskhash, task, self.server)) |
| else: |
| bb.debug(2, 'No reported unihash for %s:%s from %s' % (task, taskhash, self.server)) |
| except urllib.error.URLError as e: |
| bb.warn('Failure contacting Hash Equivalence Server %s: %s' % (self.server, str(e))) |
| except (KeyError, json.JSONDecodeError) as e: |
| bb.warn('Poorly formatted response from %s: %s' % (self.server, str(e))) |
| |
| self.unihashes[key] = unihash |
| return unihash |
| |
| def report_unihash(self, path, task, d): |
| import urllib |
| import json |
| import tempfile |
| import base64 |
| import importlib |
| |
| taskhash = d.getVar('BB_TASKHASH') |
| unihash = d.getVar('BB_UNIHASH') |
| report_taskdata = d.getVar('SSTATE_HASHEQUIV_REPORT_TASKDATA') == '1' |
| tempdir = d.getVar('T') |
| fn = d.getVar('BB_FILENAME') |
| key = fn + '.do_' + task + ':' + taskhash |
| |
| # Sanity checks |
| cache_unihash = self.unihashes.get(key) |
| if cache_unihash is None: |
| bb.fatal('%s not in unihash cache. Please report this error' % key) |
| |
| if cache_unihash != unihash: |
| bb.fatal("Cache unihash %s doesn't match BB_UNIHASH %s" % (cache_unihash, unihash)) |
| |
| sigfile = None |
| sigfile_name = "depsig.do_%s.%d" % (task, os.getpid()) |
| sigfile_link = "depsig.do_%s" % task |
| |
| try: |
| sigfile = open(os.path.join(tempdir, sigfile_name), 'w+b') |
| |
| locs = {'path': path, 'sigfile': sigfile, 'task': task, 'd': d} |
| |
| (module, method) = self.method.rsplit('.', 1) |
| locs['method'] = getattr(importlib.import_module(module), method) |
| |
| outhash = bb.utils.better_eval('method(path, sigfile, task, d)', locs) |
| |
| try: |
| url = '%s/v1/equivalent' % self.server |
| task_data = { |
| 'taskhash': taskhash, |
| 'method': self.method, |
| 'outhash': outhash, |
| 'unihash': unihash, |
| 'owner': d.getVar('SSTATE_HASHEQUIV_OWNER') |
| } |
| |
| if report_taskdata: |
| sigfile.seek(0) |
| |
| task_data['PN'] = d.getVar('PN') |
| task_data['PV'] = d.getVar('PV') |
| task_data['PR'] = d.getVar('PR') |
| task_data['task'] = task |
| task_data['outhash_siginfo'] = sigfile.read().decode('utf-8') |
| |
| headers = {'content-type': 'application/json'} |
| |
| request = urllib.request.Request(url, json.dumps(task_data).encode('utf-8'), headers) |
| response = urllib.request.urlopen(request) |
| data = response.read().decode('utf-8') |
| |
| json_data = json.loads(data) |
| new_unihash = json_data['unihash'] |
| |
| if new_unihash != unihash: |
| bb.debug(1, 'Task %s unihash changed %s -> %s by server %s' % (taskhash, unihash, new_unihash, self.server)) |
| else: |
| bb.debug(1, 'Reported task %s as unihash %s to %s' % (taskhash, unihash, self.server)) |
| except urllib.error.URLError as e: |
| bb.warn('Failure contacting Hash Equivalence Server %s: %s' % (self.server, str(e))) |
| except (KeyError, json.JSONDecodeError) as e: |
| bb.warn('Poorly formatted response from %s: %s' % (self.server, str(e))) |
| finally: |
| if sigfile: |
| sigfile.close() |
| |
| sigfile_link_path = os.path.join(tempdir, sigfile_link) |
| bb.utils.remove(sigfile_link_path) |
| |
| try: |
| os.symlink(sigfile_name, sigfile_link_path) |
| except OSError: |
| pass |
| |
| # Insert these classes into siggen's namespace so it can see and select them |
| bb.siggen.SignatureGeneratorOEBasic = SignatureGeneratorOEBasic |
| bb.siggen.SignatureGeneratorOEBasicHash = SignatureGeneratorOEBasicHash |
| bb.siggen.SignatureGeneratorOEEquivHash = SignatureGeneratorOEEquivHash |
| |
| |
| def find_siginfo(pn, taskname, taskhashlist, d): |
| """ Find signature data files for comparison purposes """ |
| |
| import fnmatch |
| import glob |
| |
| if not taskname: |
| # We have to derive pn and taskname |
| key = pn |
| splitit = key.split('.bb.') |
| taskname = splitit[1] |
| pn = os.path.basename(splitit[0]).split('_')[0] |
| if key.startswith('virtual:native:'): |
| pn = pn + '-native' |
| |
| hashfiles = {} |
| filedates = {} |
| |
| def get_hashval(siginfo): |
| if siginfo.endswith('.siginfo'): |
| return siginfo.rpartition(':')[2].partition('_')[0] |
| else: |
| return siginfo.rpartition('.')[2] |
| |
| # First search in stamps dir |
| localdata = d.createCopy() |
| localdata.setVar('MULTIMACH_TARGET_SYS', '*') |
| localdata.setVar('PN', pn) |
| localdata.setVar('PV', '*') |
| localdata.setVar('PR', '*') |
| localdata.setVar('EXTENDPE', '') |
| stamp = localdata.getVar('STAMP') |
| if pn.startswith("gcc-source"): |
| # gcc-source shared workdir is a special case :( |
| stamp = localdata.expand("${STAMPS_DIR}/work-shared/gcc-${PV}-${PR}") |
| |
| filespec = '%s.%s.sigdata.*' % (stamp, taskname) |
| foundall = False |
| import glob |
| for fullpath in glob.glob(filespec): |
| match = False |
| if taskhashlist: |
| for taskhash in taskhashlist: |
| if fullpath.endswith('.%s' % taskhash): |
| hashfiles[taskhash] = fullpath |
| if len(hashfiles) == len(taskhashlist): |
| foundall = True |
| break |
| else: |
| try: |
| filedates[fullpath] = os.stat(fullpath).st_mtime |
| except OSError: |
| continue |
| hashval = get_hashval(fullpath) |
| hashfiles[hashval] = fullpath |
| |
| if not taskhashlist or (len(filedates) < 2 and not foundall): |
| # That didn't work, look in sstate-cache |
| hashes = taskhashlist or ['?' * 64] |
| localdata = bb.data.createCopy(d) |
| for hashval in hashes: |
| localdata.setVar('PACKAGE_ARCH', '*') |
| localdata.setVar('TARGET_VENDOR', '*') |
| localdata.setVar('TARGET_OS', '*') |
| localdata.setVar('PN', pn) |
| localdata.setVar('PV', '*') |
| localdata.setVar('PR', '*') |
| localdata.setVar('BB_TASKHASH', hashval) |
| swspec = localdata.getVar('SSTATE_SWSPEC') |
| if taskname in ['do_fetch', 'do_unpack', 'do_patch', 'do_populate_lic', 'do_preconfigure'] and swspec: |
| localdata.setVar('SSTATE_PKGSPEC', '${SSTATE_SWSPEC}') |
| elif pn.endswith('-native') or "-cross-" in pn or "-crosssdk-" in pn: |
| localdata.setVar('SSTATE_EXTRAPATH', "${NATIVELSBSTRING}/") |
| sstatename = taskname[3:] |
| filespec = '%s_%s.*.siginfo' % (localdata.getVar('SSTATE_PKG'), sstatename) |
| |
| matchedfiles = glob.glob(filespec) |
| for fullpath in matchedfiles: |
| actual_hashval = get_hashval(fullpath) |
| if actual_hashval in hashfiles: |
| continue |
| hashfiles[hashval] = fullpath |
| if not taskhashlist: |
| try: |
| filedates[fullpath] = os.stat(fullpath).st_mtime |
| except: |
| continue |
| |
| if taskhashlist: |
| return hashfiles |
| else: |
| return filedates |
| |
| bb.siggen.find_siginfo = find_siginfo |
| |
| |
| def sstate_get_manifest_filename(task, d): |
| """ |
| Return the sstate manifest file path for a particular task. |
| Also returns the datastore that can be used to query related variables. |
| """ |
| d2 = d.createCopy() |
| extrainf = d.getVarFlag("do_" + task, 'stamp-extra-info') |
| if extrainf: |
| d2.setVar("SSTATE_MANMACH", extrainf) |
| return (d2.expand("${SSTATE_MANFILEPREFIX}.%s" % task), d2) |
| |
| def find_sstate_manifest(taskdata, taskdata2, taskname, d, multilibcache): |
| d2 = d |
| variant = '' |
| curr_variant = '' |
| if d.getVar("BBEXTENDCURR") == "multilib": |
| curr_variant = d.getVar("BBEXTENDVARIANT") |
| if "virtclass-multilib" not in d.getVar("OVERRIDES"): |
| curr_variant = "invalid" |
| if taskdata2.startswith("virtual:multilib"): |
| variant = taskdata2.split(":")[2] |
| if curr_variant != variant: |
| if variant not in multilibcache: |
| multilibcache[variant] = oe.utils.get_multilib_datastore(variant, d) |
| d2 = multilibcache[variant] |
| |
| if taskdata.endswith("-native"): |
| pkgarchs = ["${BUILD_ARCH}"] |
| elif taskdata.startswith("nativesdk-"): |
| pkgarchs = ["${SDK_ARCH}_${SDK_OS}", "allarch"] |
| elif "-cross-canadian" in taskdata: |
| pkgarchs = ["${SDK_ARCH}_${SDK_ARCH}-${SDKPKGSUFFIX}"] |
| elif "-cross-" in taskdata: |
| pkgarchs = ["${BUILD_ARCH}_${TARGET_ARCH}"] |
| elif "-crosssdk" in taskdata: |
| pkgarchs = ["${BUILD_ARCH}_${SDK_ARCH}_${SDK_OS}"] |
| else: |
| pkgarchs = ['${MACHINE_ARCH}'] |
| pkgarchs = pkgarchs + list(reversed(d2.getVar("PACKAGE_EXTRA_ARCHS").split())) |
| pkgarchs.append('allarch') |
| pkgarchs.append('${SDK_ARCH}_${SDK_ARCH}-${SDKPKGSUFFIX}') |
| |
| for pkgarch in pkgarchs: |
| manifest = d2.expand("${SSTATE_MANIFESTS}/manifest-%s-%s.%s" % (pkgarch, taskdata, taskname)) |
| if os.path.exists(manifest): |
| return manifest, d2 |
| bb.warn("Manifest %s not found in %s (variant '%s')?" % (manifest, d2.expand(" ".join(pkgarchs)), variant)) |
| return None, d2 |
| |
| def OEOuthashBasic(path, sigfile, task, d): |
| """ |
| Basic output hash function |
| |
| Calculates the output hash of a task by hashing all output file metadata, |
| and file contents. |
| """ |
| import hashlib |
| import stat |
| import pwd |
| import grp |
| |
| def update_hash(s): |
| s = s.encode('utf-8') |
| h.update(s) |
| if sigfile: |
| sigfile.write(s) |
| |
| h = hashlib.sha256() |
| prev_dir = os.getcwd() |
| include_owners = os.environ.get('PSEUDO_DISABLED') == '0' |
| |
| try: |
| os.chdir(path) |
| |
| update_hash("OEOuthashBasic\n") |
| |
| # It is only currently useful to get equivalent hashes for things that |
| # can be restored from sstate. Since the sstate object is named using |
| # SSTATE_PKGSPEC and the task name, those should be included in the |
| # output hash calculation. |
| update_hash("SSTATE_PKGSPEC=%s\n" % d.getVar('SSTATE_PKGSPEC')) |
| update_hash("task=%s\n" % task) |
| |
| for root, dirs, files in os.walk('.', topdown=True): |
| # Sort directories to ensure consistent ordering when recursing |
| dirs.sort() |
| files.sort() |
| |
| def process(path): |
| s = os.lstat(path) |
| |
| if stat.S_ISDIR(s.st_mode): |
| update_hash('d') |
| elif stat.S_ISCHR(s.st_mode): |
| update_hash('c') |
| elif stat.S_ISBLK(s.st_mode): |
| update_hash('b') |
| elif stat.S_ISSOCK(s.st_mode): |
| update_hash('s') |
| elif stat.S_ISLNK(s.st_mode): |
| update_hash('l') |
| elif stat.S_ISFIFO(s.st_mode): |
| update_hash('p') |
| else: |
| update_hash('-') |
| |
| def add_perm(mask, on, off='-'): |
| if mask & s.st_mode: |
| update_hash(on) |
| else: |
| update_hash(off) |
| |
| add_perm(stat.S_IRUSR, 'r') |
| add_perm(stat.S_IWUSR, 'w') |
| if stat.S_ISUID & s.st_mode: |
| add_perm(stat.S_IXUSR, 's', 'S') |
| else: |
| add_perm(stat.S_IXUSR, 'x') |
| |
| add_perm(stat.S_IRGRP, 'r') |
| add_perm(stat.S_IWGRP, 'w') |
| if stat.S_ISGID & s.st_mode: |
| add_perm(stat.S_IXGRP, 's', 'S') |
| else: |
| add_perm(stat.S_IXGRP, 'x') |
| |
| add_perm(stat.S_IROTH, 'r') |
| add_perm(stat.S_IWOTH, 'w') |
| if stat.S_ISVTX & s.st_mode: |
| update_hash('t') |
| else: |
| add_perm(stat.S_IXOTH, 'x') |
| |
| if include_owners: |
| update_hash(" %10s" % pwd.getpwuid(s.st_uid).pw_name) |
| update_hash(" %10s" % grp.getgrgid(s.st_gid).gr_name) |
| |
| update_hash(" ") |
| if stat.S_ISBLK(s.st_mode) or stat.S_ISCHR(s.st_mode): |
| update_hash("%9s" % ("%d.%d" % (os.major(s.st_rdev), os.minor(s.st_rdev)))) |
| else: |
| update_hash(" " * 9) |
| |
| update_hash(" ") |
| if stat.S_ISREG(s.st_mode): |
| update_hash("%10d" % s.st_size) |
| else: |
| update_hash(" " * 10) |
| |
| update_hash(" ") |
| fh = hashlib.sha256() |
| if stat.S_ISREG(s.st_mode): |
| # Hash file contents |
| with open(path, 'rb') as d: |
| for chunk in iter(lambda: d.read(4096), b""): |
| fh.update(chunk) |
| update_hash(fh.hexdigest()) |
| else: |
| update_hash(" " * len(fh.hexdigest())) |
| |
| update_hash(" %s" % path) |
| |
| if stat.S_ISLNK(s.st_mode): |
| update_hash(" -> %s" % os.readlink(path)) |
| |
| update_hash("\n") |
| |
| # Process this directory and all its child files |
| process(root) |
| for f in files: |
| if f == 'fixmepath': |
| continue |
| process(os.path.join(root, f)) |
| finally: |
| os.chdir(prev_dir) |
| |
| return h.hexdigest() |
| |
| |