forked from bazel-contrib/rules_jvm_external
-
Notifications
You must be signed in to change notification settings - Fork 0
/
specs.bzl
401 lines (353 loc) · 16 KB
/
specs.bzl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
#
# Maven specification
#
def _maven_repository(url, user = None, password = None):
"""Generates the data map for a Maven repository specifier given the available information.
If both a user and password are given as arguments, it will include the
access credentials in the repository spec. If one or both are missing, it
will just generate the repository url.
Args:
url: A string containing the repository url (ex: "https://maven.google.com/").
user: A username for this Maven repository, if it requires authentication (ex: "johndoe").
password: A password for this Maven repository, if it requires authentication (ex: "example-password").
"""
# Output Schema:
# {
# "repo_url": String
# "credentials: Optional Map
# {
# "username": String
# "password": String
# }
# }
if user == None and password == None:
return {"repo_url": url}
elif user == None or password == None:
fail("Invalid repository info: Either user and password must both be provided, or neither.")
else:
credentials = {"user": user, "password": password}
return {"repo_url": url, "credentials": credentials}
def _maven_artifact(group, artifact, version, packaging = None, classifier = None, override_license_types = None, exclusions = None, neverlink = None, testonly = None):
"""Generates the data map for a Maven artifact given the available information about its coordinates.
Args:
group: The Maven artifact coordinate group name (ex: "com.google.guava").
artifact: The Maven artifact coordinate artifact name (ex: "guava").
version: The Maven artifact coordinate version name (ex: "27.0-jre").
packaging: The Maven packaging specifier (ex: "jar").
classifier: The Maven artifact classifier (ex: "javadoc").
override_license_types: An array of Bazel license type strings to use for this artifact's rules (overrides autodetection) (ex: ["notify"]).
exclusions: An array of exclusion objects to create exclusion specifiers for this artifact (ex: maven.exclusion("junit", "junit")).
neverlink: Determines if this artifact should be part of the runtime classpath.
testonly: Determines whether this artifact is available for targets not marked as `testonly = True`.
"""
# Output Schema:
# {
# "group": String
# "artifact": String
# "version": String
# "packaging": Optional String
# "classifier": Optional String
# "override_license_types": Optional Array of String
# "exclusions": Optional Array of exclusions (see below)
# "neverlink": Optional Boolean
# "testonly": Optional Boolean
# }
maven_artifact = {}
maven_artifact["group"] = group
maven_artifact["artifact"] = artifact
maven_artifact["version"] = version
if packaging != None:
maven_artifact["packaging"] = packaging
if classifier != None:
maven_artifact["classifier"] = classifier
if override_license_types != None:
maven_artifact["override_license_types"] = override_license_types
if exclusions != None:
maven_artifact["exclusions"] = exclusions
if neverlink != None:
maven_artifact["neverlink"] = neverlink
if testonly != None:
maven_artifact["testonly"] = testonly
return maven_artifact
def _maven_exclusion(group, artifact):
"""Generates the data map for a Maven artifact exclusion.
Args:
group: The Maven group name of the dependency to exclude, e.g. "com.google.guava".
artifact: The Maven artifact name of the dependency to exclude, e.g. "guava".
"""
# Output Schema:
# {
# "group": String
# "artifact": String
# }
return {"group": group, "artifact": artifact}
maven = struct(
repository = _maven_repository,
artifact = _maven_artifact,
exclusion = _maven_exclusion,
)
#
# Parsing tools
#
def _parse_exclusion_spec_list(exclusion_specs):
"""
Given a string (g:a), returns an exclusion map
"""
exclusions = []
for exclusion_spec in exclusion_specs:
if type(exclusion_spec) == "string":
pieces = exclusion_spec.split(":")
if len(pieces) == 2:
exclusion_spec = {"group": pieces[0], "artifact": pieces[1]}
else:
fail(("Invalid exclusion: %s. Exclusions are specified as " +
"group-id:artifact-id, without the version, packaging or " +
"classifier.") % exclusion_spec)
exclusions.append(exclusion_spec)
return exclusions
def _parse_maven_coordinate_string(mvn_coord):
"""
Given a string containing a standard Maven coordinate (g:a:[p:[c:]]v), returns a maven artifact map (see above).
"""
pieces = mvn_coord.split(":")
group = pieces[0]
artifact = pieces[1]
if len(pieces) == 2:
return {"group": group, "artifact": artifact, "version": ""}
elif len(pieces) == 3:
version = pieces[2]
return {"group": group, "artifact": artifact, "version": version}
elif len(pieces) == 4:
packaging = pieces[2]
version = pieces[3]
return {"group": group, "artifact": artifact, "packaging": packaging, "version": version}
elif len(pieces) == 5:
packaging = pieces[2]
classifier = pieces[3]
version = pieces[4]
return {"group": group, "artifact": artifact, "packaging": packaging, "classifier": classifier, "version": version}
else:
fail("Could not parse maven coordinate: %s" % mvn_coord)
def _parse_repository_spec_list(repository_specs):
"""
Given a list containing either strings or repository maps (see above), returns a list containing repository maps.
"""
repos = []
for repo in repository_specs:
if type(repo) == "string":
repos.append({"repo_url": repo})
else:
repos.append(repo)
return repos
def _parse_artifact_spec_list(artifact_specs):
"""
Given a list containing either strings or artifact maps (see above), returns a list containing artifact maps.
"""
artifacts = []
for artifact in artifact_specs:
if type(artifact) == "string":
artifacts.append(_parse_maven_coordinate_string(artifact))
else:
artifacts.append(artifact)
return artifacts
parse = struct(
parse_maven_coordinate = _parse_maven_coordinate_string,
parse_repository_spec_list = _parse_repository_spec_list,
parse_artifact_spec_list = _parse_artifact_spec_list,
parse_exclusion_spec_list = _parse_exclusion_spec_list,
)
#
# JSON serialization
#
def _repository_credentials_spec_to_json(credentials_spec):
"""
Given a repository credential spec or None, returns the json serialization of the object, or None if the object wasn't given.
"""
if credentials_spec != None:
return "{ \"user\": \"" + credentials_spec["user"] + "\", \"password\": \"" + credentials_spec["password"] + "\" }"
else:
return None
def _repository_spec_to_json(repository_spec):
"""
Given a repository spec, returns the json serialization of the object.
"""
maybe_credentials_json = _repository_credentials_spec_to_json(repository_spec.get("credentials"))
if maybe_credentials_json != None:
return "{ \"repo_url\": \"" + repository_spec["repo_url"] + "\", \"credentials\": " + maybe_credentials_json + " }"
else:
return "{ \"repo_url\": \"" + repository_spec["repo_url"] + "\" }"
def _exclusion_spec_to_json(exclusion_spec):
"""
Given an artifact exclusion spec, returns the json serialization of the object.
"""
return "{ \"group\": \"" + exclusion_spec["group"] + "\", \"artifact\": \"" + exclusion_spec["artifact"] + "\" }"
def _override_license_types_spec_to_json(override_license_types_spec):
"""
Given an override license types spec, returns the json serialization of the object.
"""
license_type_strings = []
for license_type in override_license_types_spec:
license_type_strings.append("\"" + license_type + "\"")
return ("[" + ", ".join(license_type_strings) + "]")
def _artifact_spec_to_json(artifact_spec):
"""
Given an artifact spec, returns the json serialization of the object.
"""
maybe_exclusion_specs_jsons = []
for spec in _parse_exclusion_spec_list(artifact_spec.get("exclusions") or []):
maybe_exclusion_specs_jsons.append(_exclusion_spec_to_json(spec))
exclusion_specs_json = (("[" + ", ".join(maybe_exclusion_specs_jsons) + "]") if len(maybe_exclusion_specs_jsons) > 0 else None)
required = "{ \"group\": \"" + artifact_spec["group"] + \
"\", \"artifact\": \"" + artifact_spec["artifact"] + \
"\", \"version\": \"" + artifact_spec["version"] + "\""
with_packaging = required + ((", \"packaging\": \"" + artifact_spec["packaging"] + "\"") if artifact_spec.get("packaging") != None else "")
with_classifier = with_packaging + ((", \"classifier\": \"" + artifact_spec["classifier"] + "\"") if artifact_spec.get("classifier") != None else "")
with_override_license_types = with_classifier + ((", " + _override_license_types_spec_to_json(artifact_spec["override_license_types"])) if artifact_spec.get("override_license_types") != None else "")
with_exclusions = with_override_license_types + ((", \"exclusions\": " + exclusion_specs_json) if artifact_spec.get("exclusions") != None else "")
with_neverlink = with_exclusions + ((", \"neverlink\": " + str(artifact_spec.get("neverlink")).lower()) if artifact_spec.get("neverlink") != None else "")
with_testonly = with_neverlink + ((", \"testonly\": " + str(artifact_spec.get("testonly")).lower()) if artifact_spec.get("testonly") != None else "")
return with_testonly + " }"
json = struct(
write_repository_credentials_spec = _repository_credentials_spec_to_json,
write_repository_spec = _repository_spec_to_json,
write_exclusion_spec = _exclusion_spec_to_json,
write_override_license_types_spec = _override_license_types_spec_to_json,
write_artifact_spec = _artifact_spec_to_json,
)
#
# Accessors
#
#
# Couriser expects artifacts to be defined in the form `group:artifact:version`, but it also supports two attributes: classifier and url.
# In contrast with group, artifact and version, the attributes are a key=value comma-separated string appended at the end,
# For example: `coursier fetch group:artifact:version,classifier=xxx,url=yyy`
#
def _artifact_to_coord(artifact):
classifier = (",classifier=" + artifact["classifier"]) if artifact.get("classifier") != None else ""
return artifact["group"] + ":" + artifact["artifact"] + ":" + artifact["version"] + classifier
#
# Returns a string "{hostname} {user}:{password}" for a repository_spec
#
def _repository_credentials(repository_spec):
if "credentials" not in repository_spec:
fail("Asked to generate credentials for a repository that does not need it")
(_, remainder) = repository_spec["repo_url"].split("//")
hostname = remainder.split("/")[0]
credentials = repository_spec["credentials"]
return _coursier_credential(hostname, credentials["user"], credentials["password"])
def _coursier_credential(hostname, username, password):
"""format a coursier credential
See https://get-coursier.io/docs/other-credentials.html#inline for docs on this format
Args:
hostname: the host string
username: the user string
password: the pass string
Returns:
the credential string
"""
return hostname + " " + username + ":" + password
def _netrc_credentials(netrc_content):
"""return a list of credentials from netrc content
Args:
netrc_content: a Dict<string,Dict<string,string>> from parse_netrc.
Returns:
a List<string> for the coursier cli --credentials option.
"""
credentials = []
for machine, props in _parse_netrc(netrc_content).items():
if machine and "login" in props and "password" in props:
credential = _coursier_credential(machine, props["login"], props["password"])
credentials.append(credential)
return credentials
# copied from https://github.com/bazelbuild/bazel/blob/master/tools/build_defs/repo/utils.bzl.
# replace with 'load("@bazel_tools//tools/build_defs/repo:utils.bzl", "parse_netrc")'
# once bazel 5.x+ is the minimum allowed bazel version.
def _parse_netrc(contents, filename = None):
"""Utility function to parse at least a basic .netrc file.
Args:
contents: input for the parser.
filename: filename to use in error messages, if any.
Returns:
dict mapping a machine names to a dict with the information provided
about them
"""
# Parse the file. This is mainly a token-based update of a simple state
# machine, but we need to keep the line structure to correctly determine
# the end of a `macdef` command.
netrc = {}
currentmachinename = None
currentmachine = {}
macdef = None
currentmacro = ""
cmd = None
for line in contents.splitlines():
if line.startswith("#"):
# Comments start with #. Ignore these lines.
continue
elif macdef:
# as we're in a macro, just determine if we reached the end.
if line:
currentmacro += line + "\n"
else:
# reached end of macro, add it
currentmachine[macdef] = currentmacro
macdef = None
currentmacro = ""
else:
# Essentially line.split(None) which starlark does not support.
tokens = [
w.strip()
for w in line.split(" ")
if len(w.strip()) > 0
]
for token in tokens:
if cmd:
# we have a command that expects another argument
if cmd == "machine":
# a new machine definition was provided, so save the
# old one, if present
if not currentmachinename == None:
netrc[currentmachinename] = currentmachine
currentmachine = {}
currentmachinename = token
elif cmd == "macdef":
macdef = "macdef %s" % (token,)
# a new macro definition; the documentation says
# "its contents begin with the next .netrc line [...]",
# so should there really be tokens left in the current
# line, they're not part of the macro.
else:
currentmachine[cmd] = token
cmd = None
elif token in [
"machine",
"login",
"password",
"account",
"macdef",
]:
# command takes one argument
cmd = token
elif token == "default":
# defines the default machine; again, store old machine
if not currentmachinename == None:
netrc[currentmachinename] = currentmachine
# We use the empty string for the default machine, as that
# can never be a valid hostname ("default" could be, in the
# default search domain).
currentmachinename = ""
currentmachine = {}
else:
if filename == None:
filename = "a .netrc file"
fail("Unexpected token '%s' while reading %s" %
(token, filename))
if not currentmachinename == None:
netrc[currentmachinename] = currentmachine
return netrc
utils = struct(
artifact_coordinate = _artifact_to_coord,
netrc_credentials = _netrc_credentials,
parse_netrc = _parse_netrc,
repo_credentials = _repository_credentials,
)