blob: fda3de4e57fd2ca5ef26cfb57ff7163a5a2577b0 [file] [log] [blame]
# Copyright 2014 The Chromium Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
#
# This script should not be run directly but sourced by the other
# scripts (e.g. sysroot-creator-sid.sh). Its up to the parent scripts
# to define certain environment variables: e.g.
# DISTRO=debian
# DIST=sid
# # Similar in syntax to /etc/apt/sources.list
# APT_SOURCES_LIST="http://ftp.us.debian.org/debian/ sid main"
# KEYRING_FILE=debian-archive-sid-stable.gpg
# DEBIAN_PACKAGES="gcc libz libssl"
#@ This script builds Debian/Ubuntu sysroot images for building Google Chrome.
#@
#@ Generally this script is invoked as:
#@ sysroot-creator-<flavour>.sh <mode> <args>*
#@ Available modes are shown below.
#@
#@ List of modes:
######################################################################
# Config
######################################################################
set -o nounset
set -o errexit
SCRIPT_DIR=$(cd $(dirname $0) && pwd)
if [ -z "${DIST:-}" ]; then
echo "error: DIST not defined"
exit 1
fi
if [ -z "${KEYRING_FILE:-}" ]; then
echo "error: KEYRING_FILE not defined"
exit 1
fi
if [ -z "${DEBIAN_PACKAGES:-}" ]; then
echo "error: DEBIAN_PACKAGES not defined"
exit 1
fi
readonly HAS_ARCH_AMD64=${HAS_ARCH_AMD64:=0}
readonly HAS_ARCH_I386=${HAS_ARCH_I386:=0}
readonly HAS_ARCH_ARM=${HAS_ARCH_ARM:=0}
readonly HAS_ARCH_ARM64=${HAS_ARCH_ARM64:=0}
readonly HAS_ARCH_ARMEL=${HAS_ARCH_ARMEL:=0}
readonly HAS_ARCH_MIPS=${HAS_ARCH_MIPS:=0}
readonly HAS_ARCH_MIPS64EL=${HAS_ARCH_MIPS64EL:=0}
readonly REQUIRED_TOOLS="curl xzcat"
######################################################################
# Package Config
######################################################################
readonly PACKAGES_EXT=xz
readonly RELEASE_FILE="Release"
readonly RELEASE_FILE_GPG="Release.gpg"
readonly DEBIAN_DEP_LIST_AMD64="generated_package_lists/${DIST}.amd64"
readonly DEBIAN_DEP_LIST_I386="generated_package_lists/${DIST}.i386"
readonly DEBIAN_DEP_LIST_ARM="generated_package_lists/${DIST}.arm"
readonly DEBIAN_DEP_LIST_ARM64="generated_package_lists/${DIST}.arm64"
readonly DEBIAN_DEP_LIST_ARMEL="generated_package_lists/${DIST}.armel"
readonly DEBIAN_DEP_LIST_MIPS="generated_package_lists/${DIST}.mipsel"
readonly DEBIAN_DEP_LIST_MIPS64EL="generated_package_lists/${DIST}.mips64el"
######################################################################
# Helper
######################################################################
Banner() {
echo "######################################################################"
echo $*
echo "######################################################################"
}
SubBanner() {
echo "----------------------------------------------------------------------"
echo $*
echo "----------------------------------------------------------------------"
}
Usage() {
egrep "^#@" "${BASH_SOURCE[0]}" | cut --bytes=3-
}
DownloadOrCopyNonUniqueFilename() {
# Use this function instead of DownloadOrCopy when the url uniquely
# identifies the file, but the filename (excluding the directory)
# does not.
local url="$1"
local dest="$2"
local hash="$(echo "$url" | sha256sum | cut -d' ' -f1)"
DownloadOrCopy "${url}" "${dest}.${hash}"
# cp the file to prevent having to redownload it, but mv it to the
# final location so that it's atomic.
cp "${dest}.${hash}" "${dest}.$$"
mv "${dest}.$$" "${dest}"
}
DownloadOrCopy() {
if [ -f "$2" ] ; then
echo "$2 already in place"
return
fi
HTTP=0
echo "$1" | grep -Eqs '^https?://' && HTTP=1
if [ "$HTTP" = "1" ]; then
SubBanner "downloading from $1 -> $2"
# Appending the "$$" shell pid is necessary here to prevent concurrent
# instances of sysroot-creator.sh from trying to write to the same file.
local temp_file="${2}.partial.$$"
# curl --retry doesn't retry when the page gives a 4XX error, so we need to
# manually rerun.
for i in {1..10}; do
# --create-dirs is added in case there are slashes in the filename, as can
# happen with the "debian/security" release class.
local http_code=$(curl -L "$1" --create-dirs -o "${temp_file}" \
-w "%{http_code}")
if [ ${http_code} -eq 200 ]; then
break
fi
echo "Bad HTTP code ${http_code} when downloading $1"
rm -f "${temp_file}"
sleep $i
done
if [ ! -f "${temp_file}" ]; then
exit 1
fi
mv "${temp_file}" $2
else
SubBanner "copying from $1"
cp "$1" "$2"
fi
}
SetEnvironmentVariables() {
case $1 in
*Amd64)
ARCH=AMD64
;;
*I386)
ARCH=I386
;;
*Mips64el)
ARCH=MIPS64EL
;;
*Mips)
ARCH=MIPS
;;
*ARM)
ARCH=ARM
;;
*ARM64)
ARCH=ARM64
;;
*ARMEL)
ARCH=ARMEL
;;
*)
echo "ERROR: Unable to determine architecture based on: $1"
exit 1
;;
esac
ARCH_LOWER=$(echo $ARCH | tr '[:upper:]' '[:lower:]')
}
# some sanity checks to make sure this script is run from the right place
# with the right tools
SanityCheck() {
Banner "Sanity Checks"
local chrome_dir=$(cd "${SCRIPT_DIR}/../../.." && pwd)
BUILD_DIR="${chrome_dir}/out/sysroot-build/${DIST}"
mkdir -p ${BUILD_DIR}
echo "Using build directory: ${BUILD_DIR}"
for tool in ${REQUIRED_TOOLS} ; do
if ! which ${tool} > /dev/null ; then
echo "Required binary $tool not found."
echo "Exiting."
exit 1
fi
done
# This is where the staging sysroot is.
INSTALL_ROOT="${BUILD_DIR}/${DIST}_${ARCH_LOWER}_staging"
TARBALL="${BUILD_DIR}/${DISTRO}_${DIST}_${ARCH_LOWER}_sysroot.tar.xz"
if ! mkdir -p "${INSTALL_ROOT}" ; then
echo "ERROR: ${INSTALL_ROOT} can't be created."
exit 1
fi
}
ChangeDirectory() {
# Change directory to where this script is.
cd ${SCRIPT_DIR}
}
ClearInstallDir() {
Banner "Clearing dirs in ${INSTALL_ROOT}"
rm -rf ${INSTALL_ROOT}/*
}
CreateTarBall() {
Banner "Creating tarball ${TARBALL}"
tar -I "xz -9 -T0" -cf ${TARBALL} -C ${INSTALL_ROOT} .
}
ExtractPackageXz() {
local src_file="$1"
local dst_file="$2"
local repo="$3"
xzcat "${src_file}" | egrep '^(Package:|Filename:|SHA256:) ' |
sed "s|Filename: |Filename: ${repo}|" > "${dst_file}"
}
GeneratePackageListDist() {
local arch="$1"
set -- $2
local repo="$1"
local dist="$2"
local repo_name="$3"
TMP_PACKAGE_LIST="${BUILD_DIR}/Packages.${dist}_${repo_name}_${arch}"
local repo_basedir="${repo}/dists/${dist}"
local package_list="${BUILD_DIR}/Packages.${dist}_${repo_name}_${arch}.${PACKAGES_EXT}"
local package_file_arch="${repo_name}/binary-${arch}/Packages.${PACKAGES_EXT}"
local package_list_arch="${repo_basedir}/${package_file_arch}"
DownloadOrCopyNonUniqueFilename "${package_list_arch}" "${package_list}"
VerifyPackageListing "${package_file_arch}" "${package_list}" ${repo} ${dist}
ExtractPackageXz "${package_list}" "${TMP_PACKAGE_LIST}" ${repo}
}
GeneratePackageListCommon() {
local output_file="$1"
local arch="$2"
local packages="$3"
local dists="${DIST} ${DIST_UPDATES:-}"
local list_base="${BUILD_DIR}/Packages.${DIST}_${arch}"
> "${list_base}" # Create (or truncate) a zero-length file.
echo "${APT_SOURCES_LIST}" | while read source; do
GeneratePackageListDist "${arch}" "${source}"
cat "${TMP_PACKAGE_LIST}" | ./merge-package-lists.py "${list_base}"
done
GeneratePackageList "${list_base}" "${output_file}" "${packages}"
}
GeneratePackageListAmd64() {
GeneratePackageListCommon "$1" amd64 "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_X86:=} ${DEBIAN_PACKAGES_AMD64:=}"
}
GeneratePackageListI386() {
GeneratePackageListCommon "$1" i386 "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_X86:=}"
}
GeneratePackageListARM() {
GeneratePackageListCommon "$1" armhf "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_ARM:=}"
}
GeneratePackageListARM64() {
GeneratePackageListCommon "$1" arm64 "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_ARM64:=}"
}
GeneratePackageListARMEL() {
GeneratePackageListCommon "$1" armel "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_ARMEL:=}"
}
GeneratePackageListMips() {
GeneratePackageListCommon "$1" mipsel "${DEBIAN_PACKAGES}"
}
GeneratePackageListMips64el() {
GeneratePackageListCommon "$1" mips64el "${DEBIAN_PACKAGES}
${DEBIAN_PACKAGES_MIPS64EL:=}"
}
StripChecksumsFromPackageList() {
local package_file="$1"
sed -i 's/ [a-f0-9]\{64\}$//' "$package_file"
}
######################################################################
#
######################################################################
HacksAndPatchesCommon() {
local arch=$1
local os=$2
local strip=$3
Banner "Misc Hacks & Patches"
# these are linker scripts with absolute pathnames in them
# which we rewrite here
lscripts="${INSTALL_ROOT}/usr/lib/${arch}-${os}/libpthread.so \
${INSTALL_ROOT}/usr/lib/${arch}-${os}/libc.so"
# Rewrite linker scripts
sed -i -e 's|/usr/lib/${arch}-${os}/||g' ${lscripts}
sed -i -e 's|/lib/${arch}-${os}/||g' ${lscripts}
# Unversion libdbus and libxkbcommon symbols. This is required because
# libdbus-1-3 and libxkbcommon0 switched from unversioned symbols to versioned
# ones, and we must still support distros using the unversioned library. This
# hack can be removed once support for Ubuntu Trusty and Debian Jessie are
# dropped.
${strip} -R .gnu.version_d -R .gnu.version \
"${INSTALL_ROOT}/lib/${arch}-${os}/libdbus-1.so.3"
cp "${SCRIPT_DIR}/libdbus-1-3-symbols" \
"${INSTALL_ROOT}/debian/libdbus-1-3/DEBIAN/symbols"
${strip} -R .gnu.version_d -R .gnu.version \
"${INSTALL_ROOT}/usr/lib/${arch}-${os}/libxkbcommon.so.0.0.0"
cp "${SCRIPT_DIR}/libxkbcommon0-symbols" \
"${INSTALL_ROOT}/debian/libxkbcommon0/DEBIAN/symbols"
# libxcomposite1 is missing a symbols file.
cp "${SCRIPT_DIR}/libxcomposite1-symbols" \
"${INSTALL_ROOT}/debian/libxcomposite1/DEBIAN/symbols"
# Shared objects depending on libdbus-1.so.3 have unsatisfied undefined
# versioned symbols. To avoid LLD --no-allow-shlib-undefined errors, rewrite
# DT_NEEDED entries from libdbus-1.so.3 to a different string. LLD will
# suppress --no-allow-shlib-undefined diagnostics for such shared objects.
set +e
for f in "${INSTALL_ROOT}/lib/${arch}-${os}"/*.so \
"${INSTALL_ROOT}/usr/lib/${arch}-${os}"/*.so; do
echo "$f" | grep -q 'libdbus-1.so$' && continue
# In a dependent shared object, the only occurrence of "libdbus-1.so.3" is
# the string referenced by the DT_NEEDED entry.
offset=$(LANG=C grep -abo libdbus-1.so.3 "$f")
[ -n "$offset" ] || continue
echo -n 'libdbus-1.so.0' | dd of="$f" conv=notrunc bs=1 \
seek="$(echo -n "$offset" | cut -d : -f 1)" status=none
done
set -e
# Glibc 2.27 introduced some new optimizations to several math functions, but
# it will be a while before it makes it into all supported distros. Luckily,
# glibc maintains ABI compatibility with previous versions, so the old symbols
# are still there.
# TODO(thomasanderson): Remove this once glibc 2.27 is available on all
# supported distros.
local math_h="${INSTALL_ROOT}/usr/include/math.h"
local libm_so="${INSTALL_ROOT}/lib/${arch}-${os}/libm.so.6"
nm -D --defined-only --with-symbol-versions "${libm_so}" | \
"${SCRIPT_DIR}/find_incompatible_glibc_symbols.py" >> "${math_h}"
# glob64() was also optimized in glibc 2.27. Make sure to choose the older
# version.
local glob_h="${INSTALL_ROOT}/usr/include/glob.h"
local libc_so="${INSTALL_ROOT}/lib/${arch}-${os}/libc.so.6"
nm -D --defined-only --with-symbol-versions "${libc_so}" | \
"${SCRIPT_DIR}/find_incompatible_glibc_symbols.py" >> "${glob_h}"
# fcntl64() was introduced in glibc 2.28. Make sure to use fcntl() instead.
local fcntl_h="${INSTALL_ROOT}/usr/include/fcntl.h"
sed -i '{N; s/#ifndef __USE_FILE_OFFSET64\(\nextern int fcntl\)/#if 1\1/}' \
"${fcntl_h}"
# On i386, fcntl() was updated in glibc 2.28.
nm -D --defined-only --with-symbol-versions "${libc_so}" | \
"${SCRIPT_DIR}/find_incompatible_glibc_symbols.py" >> "${fcntl_h}"
# __GLIBC_MINOR__ is used as a feature test macro. Replace it with the
# earliest supported version of glibc (2.17, https://crbug.com/376567).
local features_h="${INSTALL_ROOT}/usr/include/features.h"
sed -i 's|\(#define\s\+__GLIBC_MINOR__\)|\1 17 //|' "${features_h}"
# This is for chrome's ./build/linux/pkg-config-wrapper
# which overwrites PKG_CONFIG_LIBDIR internally
SubBanner "Move pkgconfig scripts"
mkdir -p ${INSTALL_ROOT}/usr/lib/pkgconfig
mv ${INSTALL_ROOT}/usr/lib/${arch}-${os}/pkgconfig/* \
${INSTALL_ROOT}/usr/lib/pkgconfig
}
HacksAndPatchesAmd64() {
HacksAndPatchesCommon x86_64 linux-gnu strip
}
HacksAndPatchesI386() {
HacksAndPatchesCommon i386 linux-gnu strip
}
HacksAndPatchesARM() {
HacksAndPatchesCommon arm linux-gnueabihf arm-linux-gnueabihf-strip
}
HacksAndPatchesARM64() {
# Use the unstripped libdbus for arm64 to prevent linker errors.
# https://bugs.chromium.org/p/webrtc/issues/detail?id=8535
HacksAndPatchesCommon aarch64 linux-gnu true
}
HacksAndPatchesARMEL() {
HacksAndPatchesCommon arm linux-gnueabi arm-linux-gnueabi-strip
}
HacksAndPatchesMips() {
HacksAndPatchesCommon mipsel linux-gnu mipsel-linux-gnu-strip
}
HacksAndPatchesMips64el() {
HacksAndPatchesCommon mips64el linux-gnuabi64 mips64el-linux-gnuabi64-strip
}
InstallIntoSysroot() {
Banner "Install Libs And Headers Into Jail"
mkdir -p ${BUILD_DIR}/debian-packages
# The /debian directory is an implementation detail that's used to cd into
# when running dpkg-shlibdeps.
mkdir -p ${INSTALL_ROOT}/debian
# An empty control file is necessary to run dpkg-shlibdeps.
touch ${INSTALL_ROOT}/debian/control
while (( "$#" )); do
local file="$1"
local package="${BUILD_DIR}/debian-packages/${file##*/}"
shift
local sha256sum="$1"
shift
if [ "${#sha256sum}" -ne "64" ]; then
echo "Bad sha256sum from package list"
exit 1
fi
Banner "Installing $(basename ${file})"
DownloadOrCopy ${file} ${package}
if [ ! -s "${package}" ] ; then
echo
echo "ERROR: bad package ${package}"
exit 1
fi
echo "${sha256sum} ${package}" | sha256sum --quiet -c
SubBanner "Extracting to ${INSTALL_ROOT}"
dpkg-deb -x ${package} ${INSTALL_ROOT}
base_package=$(dpkg-deb --field ${package} Package)
mkdir -p ${INSTALL_ROOT}/debian/${base_package}/DEBIAN
dpkg-deb -e ${package} ${INSTALL_ROOT}/debian/${base_package}/DEBIAN
done
# Prune /usr/share, leaving only pkgconfig.
ls -d ${INSTALL_ROOT}/usr/share/* | grep -v "/pkgconfig$" | xargs rm -r
}
CleanupJailSymlinks() {
Banner "Jail symlink cleanup"
SAVEDPWD=$(pwd)
cd ${INSTALL_ROOT}
local libdirs="lib usr/lib"
if [ "${ARCH}" != "MIPS" ]; then
libdirs="${libdirs} lib64"
fi
find $libdirs -type l -printf '%p %l\n' | while read link target; do
# skip links with non-absolute paths
echo "${target}" | grep -qs ^/ || continue
echo "${link}: ${target}"
# Relativize the symlink.
prefix=$(echo "${link}" | sed -e 's/[^/]//g' | sed -e 's|/|../|g')
ln -snfv "${prefix}${target}" "${link}"
done
find $libdirs -type l -printf '%p %l\n' | while read link target; do
# Make sure we catch new bad links.
if [ ! -r "${link}" ]; then
echo "ERROR: FOUND BAD LINK ${link}"
ls -l ${link}
exit 1
fi
done
cd "$SAVEDPWD"
}
VerifyLibraryDepsCommon() {
local arch=$1
local os=$2
local find_dirs=(
"${INSTALL_ROOT}/lib/"
"${INSTALL_ROOT}/lib/${arch}-${os}/"
"${INSTALL_ROOT}/usr/lib/${arch}-${os}/"
)
local needed_libs="$(
find ${find_dirs[*]} -name "*\.so*" -type f -exec file {} \; | \
grep ': ELF' | sed 's/^\(.*\): .*$/\1/' | xargs readelf -d | \
grep NEEDED | sort | uniq | sed 's/^.*Shared library: \[\(.*\)\]$/\1/g')"
local all_libs="$(find ${find_dirs[*]} -printf '%f\n')"
# Ignore missing libdbus-1.so.0
all_libs+="$(echo -e '\nlibdbus-1.so.0')"
local missing_libs="$(grep -vFxf <(echo "${all_libs}") \
<(echo "${needed_libs}"))"
if [ ! -z "${missing_libs}" ]; then
echo "Missing libraries:"
echo "${missing_libs}"
exit 1
fi
}
VerifyLibraryDepsAmd64() {
VerifyLibraryDepsCommon x86_64 linux-gnu
}
VerifyLibraryDepsI386() {
VerifyLibraryDepsCommon i386 linux-gnu
}
VerifyLibraryDepsARM() {
VerifyLibraryDepsCommon arm linux-gnueabihf
}
VerifyLibraryDepsARM64() {
VerifyLibraryDepsCommon aarch64 linux-gnu
}
VerifyLibraryDepsARMEL() {
VerifyLibraryDepsCommon arm linux-gnueabi
}
VerifyLibraryDepsMips() {
VerifyLibraryDepsCommon mipsel linux-gnu
}
VerifyLibraryDepsMips64el() {
VerifyLibraryDepsCommon mips64el linux-gnuabi64
}
#@
#@ BuildSysrootAmd64
#@
#@ Build everything and package it
BuildSysrootAmd64() {
if [ "$HAS_ARCH_AMD64" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_AMD64}"
GeneratePackageListAmd64 "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesAmd64
VerifyLibraryDepsAmd64
CreateTarBall
}
#@
#@ BuildSysrootI386
#@
#@ Build everything and package it
BuildSysrootI386() {
if [ "$HAS_ARCH_I386" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_I386}"
GeneratePackageListI386 "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesI386
VerifyLibraryDepsI386
CreateTarBall
}
#@
#@ BuildSysrootARM
#@
#@ Build everything and package it
BuildSysrootARM() {
if [ "$HAS_ARCH_ARM" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_ARM}"
GeneratePackageListARM "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesARM
VerifyLibraryDepsARM
CreateTarBall
}
#@
#@ BuildSysrootARM64
#@
#@ Build everything and package it
BuildSysrootARM64() {
if [ "$HAS_ARCH_ARM64" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_ARM64}"
GeneratePackageListARM64 "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesARM64
VerifyLibraryDepsARM64
CreateTarBall
}
#@
#@ BuildSysrootARMEL
#@
#@ Build everything and package it
BuildSysrootARMEL() {
if [ "$HAS_ARCH_ARMEL" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_ARMEL}"
GeneratePackageListARMEL "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesARMEL
VerifyLibraryDepsARMEL
CreateTarBall
}
#@
#@ BuildSysrootMips
#@
#@ Build everything and package it
BuildSysrootMips() {
if [ "$HAS_ARCH_MIPS" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_MIPS}"
GeneratePackageListMips "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesMips
VerifyLibraryDepsMips
CreateTarBall
}
#@
#@ BuildSysrootMips64el
#@
#@ Build everything and package it
BuildSysrootMips64el() {
if [ "$HAS_ARCH_MIPS64EL" = "0" ]; then
return
fi
ClearInstallDir
local package_file="${DEBIAN_DEP_LIST_MIPS64EL}"
GeneratePackageListMips64el "$package_file"
local files_and_sha256sums="$(cat ${package_file})"
StripChecksumsFromPackageList "$package_file"
InstallIntoSysroot ${files_and_sha256sums}
CleanupJailSymlinks
HacksAndPatchesMips64el
VerifyLibraryDepsMips64el
CreateTarBall
}
#@
#@ BuildSysrootAll
#@
#@ Build sysroot images for all architectures
BuildSysrootAll() {
RunCommand BuildSysrootAmd64
RunCommand BuildSysrootI386
RunCommand BuildSysrootARM
RunCommand BuildSysrootARM64
RunCommand BuildSysrootARMEL
RunCommand BuildSysrootMips
RunCommand BuildSysrootMips64el
}
UploadSysroot() {
local sha=$(sha1sum "${TARBALL}" | awk '{print $1;}')
set -x
gsutil.py cp -a public-read "${TARBALL}" \
"gs://chrome-linux-sysroot/toolchain/$sha/"
set +x
}
#@
#@ UploadSysrootAmd64
#@
UploadSysrootAmd64() {
if [ "$HAS_ARCH_AMD64" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootI386
#@
UploadSysrootI386() {
if [ "$HAS_ARCH_I386" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootARM
#@
UploadSysrootARM() {
if [ "$HAS_ARCH_ARM" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootARM64
#@
UploadSysrootARM64() {
if [ "$HAS_ARCH_ARM64" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootARMEL
#@
UploadSysrootARMEL() {
if [ "$HAS_ARCH_ARMEL" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootMips
#@
UploadSysrootMips() {
if [ "$HAS_ARCH_MIPS" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootMips64el
#@
UploadSysrootMips64el() {
if [ "$HAS_ARCH_MIPS64EL" = "0" ]; then
return
fi
UploadSysroot "$@"
}
#@
#@ UploadSysrootAll
#@
#@ Upload sysroot image for all architectures
UploadSysrootAll() {
RunCommand UploadSysrootAmd64 "$@"
RunCommand UploadSysrootI386 "$@"
RunCommand UploadSysrootARM "$@"
RunCommand UploadSysrootARM64 "$@"
RunCommand UploadSysrootARMEL "$@"
RunCommand UploadSysrootMips "$@"
RunCommand UploadSysrootMips64el "$@"
}
#
# CheckForDebianGPGKeyring
#
# Make sure the Debian GPG keys exist. Otherwise print a helpful message.
#
CheckForDebianGPGKeyring() {
if [ ! -e "$KEYRING_FILE" ]; then
echo "KEYRING_FILE not found: ${KEYRING_FILE}"
echo "Debian GPG keys missing. Install the debian-archive-keyring package."
exit 1
fi
}
#
# VerifyPackageListing
#
# Verifies the downloaded Packages.xz file has the right checksums.
#
VerifyPackageListing() {
local file_path="$1"
local output_file="$2"
local repo="$3"
local dist="$4"
local repo_basedir="${repo}/dists/${dist}"
local release_list="${repo_basedir}/${RELEASE_FILE}"
local release_list_gpg="${repo_basedir}/${RELEASE_FILE_GPG}"
local release_file="${BUILD_DIR}/${dist}-${RELEASE_FILE}"
local release_file_gpg="${BUILD_DIR}/${dist}-${RELEASE_FILE_GPG}"
CheckForDebianGPGKeyring
DownloadOrCopyNonUniqueFilename ${release_list} ${release_file}
DownloadOrCopyNonUniqueFilename ${release_list_gpg} ${release_file_gpg}
echo "Verifying: ${release_file} with ${release_file_gpg}"
set -x
gpgv --keyring "${KEYRING_FILE}" "${release_file_gpg}" "${release_file}"
set +x
echo "Verifying: ${output_file}"
local sha256sum=$(grep -E "${file_path}\$|:\$" "${release_file}" | \
grep "SHA256:" -A 1 | xargs echo | awk '{print $2;}')
if [ "${#sha256sum}" -ne "64" ]; then
echo "Bad sha256sum from ${release_list}"
exit 1
fi
echo "${sha256sum} ${output_file}" | sha256sum --quiet -c
}
#
# GeneratePackageList
#
# Looks up package names in ${BUILD_DIR}/Packages and write list of URLs
# to output file.
#
GeneratePackageList() {
local input_file="$1"
local output_file="$2"
echo "Updating: ${output_file} from ${input_file}"
/bin/rm -f "${output_file}"
shift
shift
for pkg in $@ ; do
local pkg_full=$(grep -A 1 " ${pkg}\$" "$input_file" | \
egrep "pool/.*" | sed 's/.*Filename: //')
if [ -z "${pkg_full}" ]; then
echo "ERROR: missing package: $pkg"
exit 1
fi
local sha256sum=$(grep -A 4 " ${pkg}\$" "$input_file" | \
grep ^SHA256: | sed 's/^SHA256: //')
if [ "${#sha256sum}" -ne "64" ]; then
echo "Bad sha256sum from Packages"
exit 1
fi
echo $pkg_full $sha256sum >> "$output_file"
done
# sort -o does an in-place sort of this file
sort "$output_file" -o "$output_file"
}
#@
#@ PrintArchitectures
#@
#@ Prints supported architectures.
PrintArchitectures() {
if [ "$HAS_ARCH_AMD64" = "1" ]; then
echo Amd64
fi
if [ "$HAS_ARCH_I386" = "1" ]; then
echo I386
fi
if [ "$HAS_ARCH_ARM" = "1" ]; then
echo ARM
fi
if [ "$HAS_ARCH_ARM64" = "1" ]; then
echo ARM64
fi
if [ "$HAS_ARCH_ARMEL" = "1" ]; then
echo ARMEL
fi
if [ "$HAS_ARCH_MIPS" = "1" ]; then
echo Mips
fi
if [ "$HAS_ARCH_MIPS64EL" = "1" ]; then
echo Mips64el
fi
}
#@
#@ PrintDistro
#@
#@ Prints distro. eg: ubuntu
PrintDistro() {
echo ${DISTRO}
}
#@
#@ DumpRelease
#@
#@ Prints disto release. eg: jessie
PrintRelease() {
echo ${DIST}
}
RunCommand() {
SetEnvironmentVariables "$1"
SanityCheck
"$@"
}
if [ $# -eq 0 ] ; then
echo "ERROR: you must specify a mode on the commandline"
echo
Usage
exit 1
elif [ "$(type -t $1)" != "function" ]; then
echo "ERROR: unknown function '$1'." >&2
echo "For help, try:"
echo " $0 help"
exit 1
else
ChangeDirectory
if echo $1 | grep -qs --regexp='\(^Print\)\|\(All$\)'; then
"$@"
else
RunCommand "$@"
fi
fi