From patchwork Tue Oct 17 13:26:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lukas Funke X-Patchwork-Id: 32448 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B59C0CDB483 for ; Tue, 17 Oct 2023 13:27:08 +0000 (UTC) Received: from EUR03-AM7-obe.outbound.protection.outlook.com (EUR03-AM7-obe.outbound.protection.outlook.com [40.107.105.69]) by mx.groups.io with SMTP id smtpd.web11.214674.1697549217556090878 for ; Tue, 17 Oct 2023 06:27:00 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@weidmueller.onmicrosoft.com header.s=selector1-weidmueller-onmicrosoft-com header.b=Jpk/AW6O; spf=pass (domain: weidmueller.com, ip: 40.107.105.69, mailfrom: lukas.funke-oss@weidmueller.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FTPCFE+0xmX65Ov1VLxEkkQCmxAfl3ObsaedUy4p0dx9B9LQOuTcr1VMBV9iB4954qwTNyAuCYjF2esTcQEPMod1fhJo/jwaLjenki+A2GGPUExM89hN7KKFBqA9R1NEhL5H/aPoboCc57DkuxTNUe4G8f+/VxJGwuu6HpMJDtYsIfM0aYJsgf3KZ+MsUqXlBXDF+PMAVBt7TMYvT8sPg83HkLGBxepc5zNym0/qvZqawnKYJ6M3xMUBnviMxnfwV6Nc9kWG5qF1Y8l6lv3n2ruTD414EaG5dsu8ptqvooAbNcczJh4zNo3GFC2U2PB4BosJ24Qeh15u8D/DmWfuYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7h1IIhEs0ajCmyrDEiNJPkzzc9Htiy3BdIRGzKaBwcQ=; b=ducivPOeoQU25PMurMM4p1yqatNQVo0W5ZMDfoTolCgB/hXp9wuBSrMEH7MDlnq+FR25p5syjR2J+cTGQYNtqVUVm/L9j+eS2bk3wtDIR6udYvt3vRZU2klCxY/WHyhDbr39mhScOG5bvaV/jtgADpNA5r8OSgKgQd71Q5DgD4WqThGCi7tLuXthRzyvPaDn7cKV4FNxdVa2CpBRnW5Cqw1KdTBemQ/P5FIIt8xF0qxSTX8l7Kut1c7lqhPzd4h/+m1t7+l099UtZqR9FuSoey26PIV9ItzxrK8ZiRB7KlmygJXmGkdjO7V4zYvaLEokkT772jTjuTrAP6YLd/ufsA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=weidmueller.com; dmarc=pass action=none header.from=weidmueller.com; dkim=pass header.d=weidmueller.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=weidmueller.onmicrosoft.com; s=selector1-weidmueller-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7h1IIhEs0ajCmyrDEiNJPkzzc9Htiy3BdIRGzKaBwcQ=; b=Jpk/AW6O8qwsQhNrrKXrKyZY/sZt+ldnab5DCDBeXSChK8FgOmk2RwmSE+Nl/CpcxVsNXYl/V+oQ4ZCSAVxOrl09i44+38d6k/ebC+SQgDHFclZbnsr5eXK9yDdD4SuiUaTvsytslu4u5LrLZNN/lJ8CANQRtozxuWNt4pzzIzI= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=weidmueller.com; Received: from AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) by AS4PR08MB7556.eurprd08.prod.outlook.com (2603:10a6:20b:4fe::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6886.34; Tue, 17 Oct 2023 13:26:54 +0000 Received: from AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62]) by AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62%5]) with mapi id 15.20.6886.034; Tue, 17 Oct 2023 13:26:53 +0000 From: lukas.funke-oss@weidmueller.com To: openembedded-core@lists.openembedded.org CC: Bruce Ashfield , Vyacheslav Yurkov , Martin Jansa , Lukas Funke Subject: [OE-Core][PATCH v2 1/4] classes: go-vendor: Add go-vendor class Date: Tue, 17 Oct 2023 15:26:44 +0200 Message-ID: <20231017132647.352938-2-lukas.funke-oss@weidmueller.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> References: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> X-ClientProxiedBy: FR2P281CA0158.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:99::11) To AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS2PR08MB8431:EE_|AS4PR08MB7556:EE_ X-MS-Office365-Filtering-Correlation-Id: 5462e3b8-0ecf-4713-ecf6-08dbcf14ba66 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS2PR08MB8431.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(396003)(136003)(346002)(366004)(376002)(39860400002)(230922051799003)(451199024)(64100799003)(186009)(1800799009)(26005)(6512007)(107886003)(6666004)(2616005)(6506007)(1076003)(9686003)(83380400001)(52116002)(54906003)(41300700001)(5660300002)(478600001)(8676002)(966005)(8936002)(6916009)(66476007)(2906002)(6486002)(4326008)(316002)(66556008)(86362001)(66946007)(38100700002)(36756003)(84970400001)(38350700005);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: weidmueller.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5462e3b8-0ecf-4713-ecf6-08dbcf14ba66 X-MS-Exchange-CrossTenant-AuthSource: AS2PR08MB8431.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Oct 2023 13:26:53.8102 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: e4289438-1c5f-4c95-a51a-ee553b8b18ec X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: AjOb17kPuHz+Z6kpM2b1bY8Ikl1wSlxogeHsqn5LuMX+G+29uDOcSdQeMQSbKOBWMvsJbQorpl5yv3guRRL2bg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7556 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 17 Oct 2023 13:27:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/189328 From: Lukas Funke Signed-off-by: Lukas Funke --- meta/classes/go-vendor.bbclass | 135 +++++++++++++++++++++++++++++++++ 1 file changed, 135 insertions(+) create mode 100644 meta/classes/go-vendor.bbclass diff --git a/meta/classes/go-vendor.bbclass b/meta/classes/go-vendor.bbclass new file mode 100644 index 0000000000..13f1b8b2be --- /dev/null +++ b/meta/classes/go-vendor.bbclass @@ -0,0 +1,135 @@ +# +# Copyright 2023 (C) Weidmueller GmbH & Co KG +# Author: Lukas Funke +# +# Handle Go vendor support for offline builds +# +# When importing Go modules, Go downloads the imported module using +# a network (proxy) connection ahead of the compile stage. This contradicts +# the yocto build concept of fetching every source ahead of build-time +# and supporting offline builds. +# +# To support offline builds, we use Go 'vendoring': module dependencies are +# downloaded during the fetch-phase and unpacked into the modules 'vendor' +# folder. Additinally a manifest file is generated for the 'vendor' folder +# + +inherit go-mod + +def go_src_uri(repo, version, path=None, subdir=None, \ + vcs='git', replaces=None, pathmajor=None): + + destsuffix = "git/src/import/vendor.fetch" + go_module_path = repo if not path else path + + src_uri = "{}://{}" \ + ";name={}" \ + "".format(vcs, repo, \ + go_module_path.replace('/', '.')) + + src_uri += ";destsuffix={}/{}@{}".format(destsuffix, \ + go_module_path, \ + version) + + if vcs == "git": + src_uri += ";nobranch=1;protocol=https" + if replaces: + src_uri += ";go_module_replacement={}".format(replaces) + if subdir: + src_uri += ";go_subdir={}".format(subdir) + if pathmajor: + src_uri += ";go_pathmajor={}".format(pathmajor) + + return src_uri + + +python do_go_vendor() { + import shutil + + src_uri = (d.getVar('SRC_URI') or "").split() + + if len(src_uri) == 0: + bb.error("SRC_URI is empty") + return + + default_destsuffix = "git/src/import/vendor.fetch" + fetcher = bb.fetch2.Fetch(src_uri, d) + go_import = d.getVar('GO_IMPORT') + source_dir = d.getVar('S') + + vendor_dir = os.path.join(source_dir, *['src', go_import, 'vendor']) + import_dir = os.path.join(source_dir, *['src', 'import', 'vendor.fetch']) + + bb.utils.mkdirhier(vendor_dir) + modules = {} + + for url in fetcher.urls: + srcuri = fetcher.ud[url].host + fetcher.ud[url].path + + # Skip main module for which the recipe is actually created + if srcuri == go_import: + continue + + # Skip local files + if fetcher.ud[url].type == 'file': + continue + + destsuffix = fetcher.ud[url].parm.get('destsuffix') + # We derive the module path / version in the following manner (exmaple): + # + # destsuffix = git/src/import/vendor.fetch/github.com/foo/bar@v1.2.3 + # p = github.com/foo/bar@v1.2.3 + # path = github.com/foo/bar + # version = v1.2.3 + + p = destsuffix[len(default_destsuffix)+1:] + path, version = p.split('@') + + subdir = fetcher.ud[url].parm.get('go_subdir') + subdir = "" if not subdir else subdir + + pathMajor = fetcher.ud[url].parm.get('go_pathmajor') + pathMajor = "" if not pathMajor else pathMajor + + base = path[:-(len(subdir)+len(pathMajor))-1] + r = fetcher.ud[url].parm.get('go_module_replacement') + + if not path in modules and not r: + modules[path] = { + "version": version, + "src": os.path.join(import_dir, *[p, subdir]), + "subdir": subdir, + "pathMajor": pathMajor, + } + + for module_key in sorted(modules): + + # only take the version which is explicitly listed + # as a dependency in the go.mod + module = modules[module_key] + src = module['src'] + + # If the module is released at major version 2 or higher, the module + # path must end with a major version suffix like /v2. + # This may or may not be part of the subdirectory name + # + # https://go.dev/ref/mod#modules-overview + srcMajorVersion = os.path.join(src, module['pathMajor'].strip('/')) + if os.path.exists(srcMajorVersion): + src = srcMajorVersion + dst = os.path.join(vendor_dir, module_key) + if os.path.exists(dst): + shutil.rmtree(dst) + + bb.debug(1, "cp %s --> %s" % (src, dst)) + shutil.copytree(src, dst, symlinks=True, \ + ignore=shutil.ignore_patterns(".git", \ + "vendor", \ + "*.md", \ + "*._test.go")) + # Copy vendor manifest + bb.debug(1, "cp %s --> %s" % (os.path.join(d.getVar('WORKDIR'), "modules.txt"), vendor_dir)) + shutil.copy2(os.path.join(d.getVar('WORKDIR'), "modules.txt"), vendor_dir) +} + +addtask go_vendor before do_populate_lic after do_unpack From patchwork Tue Oct 17 13:26:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lukas Funke X-Patchwork-Id: 32450 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BEB15CDB482 for ; Tue, 17 Oct 2023 13:27:08 +0000 (UTC) Received: from EUR03-AM7-obe.outbound.protection.outlook.com (EUR03-AM7-obe.outbound.protection.outlook.com [40.107.105.69]) by mx.groups.io with SMTP id smtpd.web11.214674.1697549217556090878 for ; Tue, 17 Oct 2023 06:27:01 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@weidmueller.onmicrosoft.com header.s=selector1-weidmueller-onmicrosoft-com header.b=DOfk237s; spf=pass (domain: weidmueller.com, ip: 40.107.105.69, mailfrom: lukas.funke-oss@weidmueller.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=guU53ZISIvuqbs21pahN859jqzzITH5eoUW0i4Hakzx84ElmhFTR7KySWf9V+iS5eqw0vo/g6pWRJ/vQIpw1/gHOfEeYOs93Tu1ZMPdRDsJCxi9yg30CoI5o2tmGpkm2vZc8W1rQ1hj870vaz0qxKUrgYlrprN1AUHkzgXwF/PteWE19IjWftJ7UcbbZRNlNk+IqTVwcmbtThiuY+RKcAUvXUoN0loJFxLvV6aAbAjVzMBTaS32nPzmdj2RjoSOyLIzsVpoZq/DqxAwj1YA4WW8u6Nitdossz0Vsd1I8Y/B7DyJJsxM+n5NDuqWYq/Z5JClEQj4WWsnjxJiiWkd1tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tTB57h38HuySMMAP0ggp2OVRKV7ZsczQUMvf+VYsjtM=; b=iRgKQvAsK5XszSuYiXG6XbspWMQpYMEsUbuZg71BmycR8sarzL2MUt+1pnHEyaMBVxK4SHYC4k7K7IFSqtzy+7twkwW3Lrzv1neNrW+qUA0CevmVyIiZ41g//1OuI+DHdlk5ZsIirilNGiAPm64N/N3r+9iBD+gVOCZCeH/Xl/3eyJOWXad3kinQ4bOp/awBEfc9/TfAPiD1rrbsbGGzt4FDizmhGAO12tZVpiN/7wH/q2yHyOGNbw8j68uNd7qPY3vNoOzIdrLgyNfYRxI6mSeeZFpCstK/fuqxYLTjbrDN9isM1z4V9T1kFYayYgnXDAh91WeMV916hl4UUs6Tjg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=weidmueller.com; dmarc=pass action=none header.from=weidmueller.com; dkim=pass header.d=weidmueller.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=weidmueller.onmicrosoft.com; s=selector1-weidmueller-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tTB57h38HuySMMAP0ggp2OVRKV7ZsczQUMvf+VYsjtM=; b=DOfk237s3u4S+eCK4kgs47e/1xgfwFBJgWGUMsm6N0ZMI7hdaFbyRoLfsOLeOvHZYRhwxyv8YUiucWOpzIRQ60YSjl7YSetfhZaqzLFfAA1nefqK6wCfSw+samRWV4u97ezTQni/4PfbGyH+cF2tIFDqjBZDhwcB5zAZhQ6E/uI= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=weidmueller.com; Received: from AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) by AS4PR08MB7556.eurprd08.prod.outlook.com (2603:10a6:20b:4fe::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6886.34; Tue, 17 Oct 2023 13:26:54 +0000 Received: from AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62]) by AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62%5]) with mapi id 15.20.6886.034; Tue, 17 Oct 2023 13:26:54 +0000 From: lukas.funke-oss@weidmueller.com To: openembedded-core@lists.openembedded.org CC: Bruce Ashfield , Vyacheslav Yurkov , Martin Jansa , Lukas Funke Subject: [OE-Core][PATCH v2 2/4] selftest: recipetool: Add test for go recipe handler Date: Tue, 17 Oct 2023 15:26:45 +0200 Message-ID: <20231017132647.352938-3-lukas.funke-oss@weidmueller.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> References: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> X-ClientProxiedBy: FR2P281CA0158.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:99::11) To AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS2PR08MB8431:EE_|AS4PR08MB7556:EE_ X-MS-Office365-Filtering-Correlation-Id: d6cf1f3d-3ec0-4220-fe8c-08dbcf14ba98 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: FPkHtLDKpAY2yUG6pN28surNfHx76cubps/5XK8TojGlyaMA6pxlRM1b4YUHCjNesNFgyli49NCKew3zL0p5EE8YsGoFezjLJSdaU1nT8kjcitIQuYIpj3KF3dfN7V9PJEjU1oD8pf2MjEAN2zQT69NDuSkEP8a3GGIIxEd290M7vkuGQtdo+Ra8n2OoRjGJdRUDkEQKduS+VAaxJDYhFb6KHEjQpqV1Ozgoi63gWpGXXOGFiOX1oxuv+4S93v1g924l3BqDmpLhR2yXuy67wL2FYckxAmnoM+N6a5C+m/SZF79akkfGhmtWAyhGzA1Djmd/Pqm5A35dWoId5mUXGGUJgAXIfPm0s5nJ1oQr65somV2A4RH4Mde+VyRy74ngwlh0k8lxW3Ov/8ja0j61QcHVf0QkfAL3MG9UlNbyhu9QSDoauET4SpEZHHKmj5wTTtwclC6AVnvux9QsOoZhi6ycct9cCRQIdycYbpl6NAEW7S2s4j3/G+ad7I8mzXcZ6xxZdwZMnnbLgR54C+rtLf4O63fv8wYDN7/f7qkQxt//l3lNbEW/7UL81Hx830j5ysKqmNdGzZkUcy+GNgF4U7RI3IB+JaHoCNEhHJQcH+8= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS2PR08MB8431.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(396003)(136003)(346002)(366004)(376002)(39860400002)(230922051799003)(451199024)(64100799003)(186009)(1800799009)(26005)(6512007)(107886003)(6666004)(2616005)(6506007)(1076003)(9686003)(83380400001)(30864003)(52116002)(54906003)(41300700001)(5660300002)(478600001)(8676002)(8936002)(6916009)(66476007)(2906002)(6486002)(4326008)(316002)(66556008)(86362001)(66946007)(38100700002)(36756003)(45080400002)(38350700005);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: weidmueller.com X-MS-Exchange-CrossTenant-Network-Message-Id: d6cf1f3d-3ec0-4220-fe8c-08dbcf14ba98 X-MS-Exchange-CrossTenant-AuthSource: AS2PR08MB8431.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Oct 2023 13:26:54.1052 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: e4289438-1c5f-4c95-a51a-ee553b8b18ec X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: TnX0xmss1WplQhbFLU7sazwTKZMHMAPQXtmgwIgzbQ1MlsxRYzTY679/66R+PFAjNc/30BzmK5FtIL8lBDVphA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7556 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 17 Oct 2023 13:27:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/189329 From: Lukas Funke This commit adds a test for the go recipetool handler. The choosen go project to test the created recipe was picked randomly. The SRC_URIs and the LIC_FILES_CHKSUMs are checked against there reference values. Signed-off-by: Lukas Funke --- meta/lib/oeqa/selftest/cases/recipetool.py | 163 +++++++++++++++++++++ 1 file changed, 163 insertions(+) diff --git a/meta/lib/oeqa/selftest/cases/recipetool.py b/meta/lib/oeqa/selftest/cases/recipetool.py index 48661bee6f..6f3d5df50c 100644 --- a/meta/lib/oeqa/selftest/cases/recipetool.py +++ b/meta/lib/oeqa/selftest/cases/recipetool.py @@ -532,6 +532,169 @@ class RecipetoolTests(RecipetoolBase): libpath = os.path.join(get_bb_var('COREBASE'), 'scripts', 'lib', 'recipetool') sys.path.insert(0, libpath) + def test_recipetool_create_go(self): + # Basic test to check go recipe generation + def urifiy(url, version, modulepath = None, pathmajor = None, subdir = None): + modulepath = ",path='%s'" % modulepath if len(modulepath) else '' + pathmajor = ",pathmajor='%s'" % pathmajor if len(pathmajor) else '' + subdir = ",subdir='%s'" % subdir if len(subdir) else '' + return "${@go_src_uri('%s','%s'%s%s%s)}" % (url, version, modulepath, pathmajor, subdir) + + temprecipe = os.path.join(self.tempdir, 'recipe') + os.makedirs(temprecipe) + recipefile = os.path.join(temprecipe, 'edgex-go_git.bb') + srcuri = 'https://github.com/edgexfoundry/edgex-go.git' + srcrev = "v3.0.0" + result = runCmd('recipetool create -o %s %s -S %s' % (temprecipe, srcuri, srcrev)) + self.assertTrue(os.path.isfile(recipefile)) + checkvars = {} + src_uri = {'git://${GO_IMPORT};destsuffix=git/src/${GO_IMPORT};nobranch=1;name=${BPN};protocol=https', + 'file://modules.txt'} + checkvars['LIC_FILES_CHKSUM'] = set( + ['file://src/${GO_IMPORT}/LICENSE;md5=8f8bc924cf73f6a32381e5fd4c58d603', + 'file://src/${GO_IMPORT}/vendor/github.com/Microsoft/go-winio/LICENSE;md5=69205ff73858f2c22b2ca135b557e8ef', + 'file://src/${GO_IMPORT}/vendor/github.com/armon/go-metrics/LICENSE;md5=d2d77030c0183e3d1e66d26dc1f243be', + 'file://src/${GO_IMPORT}/vendor/github.com/cenkalti/backoff/LICENSE;md5=1571d94433e3f3aa05267efd4dbea68b', + 'file://src/${GO_IMPORT}/vendor/github.com/davecgh/go-spew/LICENSE;md5=c06795ed54b2a35ebeeb543cd3a73e56', + 'file://src/${GO_IMPORT}/vendor/github.com/eclipse/paho.mqtt.golang/LICENSE;md5=dcdb33474b60c38efd27356d8f2edec7', + 'file://src/${GO_IMPORT}/vendor/github.com/eclipse/paho.mqtt.golang/edl-v10;md5=3adfcc70f5aeb7a44f3f9b495aa1fbf3', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-bootstrap/v3/LICENSE;md5=0d6dae39976133b2851fba4c1e1275ff', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-configuration/v3/LICENSE;md5=0d6dae39976133b2851fba4c1e1275ff', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-core-contracts/v3/LICENSE;md5=0d6dae39976133b2851fba4c1e1275ff', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-messaging/v3/LICENSE;md5=0d6dae39976133b2851fba4c1e1275ff', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-registry/v3/LICENSE;md5=0d6dae39976133b2851fba4c1e1275ff', + 'file://src/${GO_IMPORT}/vendor/github.com/edgexfoundry/go-mod-secrets/v3/LICENSE;md5=f9fa2f4f8e0ef8cc7b5dd150963eb457', + 'file://src/${GO_IMPORT}/vendor/github.com/fatih/color/LICENSE.md;md5=316e6d590bdcde7993fb175662c0dd5a', + 'file://src/${GO_IMPORT}/vendor/github.com/fxamacker/cbor/v2/LICENSE;md5=827f5a2fa861382d35a3943adf9ebb86', + 'file://src/${GO_IMPORT}/vendor/github.com/go-jose/go-jose/v3/LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57', + 'file://src/${GO_IMPORT}/vendor/github.com/go-jose/go-jose/v3/json/LICENSE;md5=591778525c869cdde0ab5a1bf283cd81', + 'file://src/${GO_IMPORT}/vendor/github.com/go-kit/log/LICENSE;md5=5b7c15ad5fffe2ff6e9d58a6c161f082', + 'file://src/${GO_IMPORT}/vendor/github.com/go-logfmt/logfmt/LICENSE;md5=98e39517c38127f969de33057067091e', + 'file://src/${GO_IMPORT}/vendor/github.com/go-playground/locales/LICENSE;md5=3ccbda375ee345400ad1da85ba522301', + 'file://src/${GO_IMPORT}/vendor/github.com/go-playground/universal-translator/LICENSE;md5=2e2b21ef8f61057977d27c727c84bef1', + 'file://src/${GO_IMPORT}/vendor/github.com/go-playground/validator/v10/LICENSE;md5=a718a0f318d76f7c5d510cbae84f0b60', + 'file://src/${GO_IMPORT}/vendor/github.com/go-redis/redis/v7/LICENSE;md5=58103aa5ea1ee9b7a369c9c4a95ef9b5', + 'file://src/${GO_IMPORT}/vendor/github.com/golang/protobuf/LICENSE;md5=939cce1ec101726fa754e698ac871622', + 'file://src/${GO_IMPORT}/vendor/github.com/gomodule/redigo/LICENSE;md5=2ee41112a44fe7014dce33e26468ba93', + 'file://src/${GO_IMPORT}/vendor/github.com/google/uuid/LICENSE;md5=88073b6dd8ec00fe09da59e0b6dfded1', + 'file://src/${GO_IMPORT}/vendor/github.com/gorilla/mux/LICENSE;md5=33fa1116c45f9e8de714033f99edde13', + 'file://src/${GO_IMPORT}/vendor/github.com/gorilla/websocket/LICENSE;md5=c007b54a1743d596f46b2748d9f8c044', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/consul/api/LICENSE;md5=b8a277a612171b7526e9be072f405ef4', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/errwrap/LICENSE;md5=b278a92d2c1509760384428817710378', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/go-cleanhttp/LICENSE;md5=65d26fcc2f35ea6a181ac777e42db1ea', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/go-hclog/LICENSE;md5=ec7f605b74b9ad03347d0a93a5cc7eb8', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/go-immutable-radix/LICENSE;md5=65d26fcc2f35ea6a181ac777e42db1ea', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/go-multierror/LICENSE;md5=d44fdeb607e2d2614db9464dbedd4094', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/go-rootcerts/LICENSE;md5=65d26fcc2f35ea6a181ac777e42db1ea', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/golang-lru/LICENSE;md5=f27a50d2e878867827842f2c60e30bfc', + 'file://src/${GO_IMPORT}/vendor/github.com/hashicorp/serf/LICENSE;md5=b278a92d2c1509760384428817710378', + 'file://src/${GO_IMPORT}/vendor/github.com/leodido/go-urn/LICENSE;md5=8f50db5538ec1148a9b3d14ed96c3418', + 'file://src/${GO_IMPORT}/vendor/github.com/mattn/go-colorable/LICENSE;md5=24ce168f90aec2456a73de1839037245', + 'file://src/${GO_IMPORT}/vendor/github.com/mattn/go-isatty/LICENSE;md5=f509beadd5a11227c27b5d2ad6c9f2c6', + 'file://src/${GO_IMPORT}/vendor/github.com/mitchellh/consulstructure/LICENSE;md5=96ada10a9e51c98c4656f2cede08c673', + 'file://src/${GO_IMPORT}/vendor/github.com/mitchellh/copystructure/LICENSE;md5=56da355a12d4821cda57b8f23ec34bc4', + 'file://src/${GO_IMPORT}/vendor/github.com/mitchellh/go-homedir/LICENSE;md5=3f7765c3d4f58e1f84c4313cecf0f5bd', + 'file://src/${GO_IMPORT}/vendor/github.com/mitchellh/mapstructure/LICENSE;md5=3f7765c3d4f58e1f84c4313cecf0f5bd', + 'file://src/${GO_IMPORT}/vendor/github.com/mitchellh/reflectwalk/LICENSE;md5=3f7765c3d4f58e1f84c4313cecf0f5bd', + 'file://src/${GO_IMPORT}/vendor/github.com/nats-io/nats.go/LICENSE;md5=86d3f3a95c324c9479bd8986968f4327', + 'file://src/${GO_IMPORT}/vendor/github.com/nats-io/nkeys/LICENSE;md5=86d3f3a95c324c9479bd8986968f4327', + 'file://src/${GO_IMPORT}/vendor/github.com/nats-io/nuid/LICENSE;md5=86d3f3a95c324c9479bd8986968f4327', + 'file://src/${GO_IMPORT}/vendor/github.com/pmezard/go-difflib/LICENSE;md5=e9a2ebb8de779a07500ddecca806145e', + 'file://src/${GO_IMPORT}/vendor/github.com/rcrowley/go-metrics/LICENSE;md5=1bdf5d819f50f141366dabce3be1460f', + 'file://src/${GO_IMPORT}/vendor/github.com/spiffe/go-spiffe/v2/LICENSE;md5=86d3f3a95c324c9479bd8986968f4327', + 'file://src/${GO_IMPORT}/vendor/github.com/stretchr/objx/LICENSE;md5=d023fd31d3ca39ec61eec65a91732735', + 'file://src/${GO_IMPORT}/vendor/github.com/stretchr/testify/LICENSE;md5=188f01994659f3c0d310612333d2a26f', + 'file://src/${GO_IMPORT}/vendor/github.com/x448/float16/LICENSE;md5=de8f8e025d57fe7ee0b67f30d571323b', + 'file://src/${GO_IMPORT}/vendor/github.com/zeebo/errs/LICENSE;md5=84914ab36fc0eb48edbaa53e66e8d326', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/crypto/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/mod/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/net/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/sync/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/sys/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/text/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/golang.org/x/tools/LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707', + 'file://src/${GO_IMPORT}/vendor/google.golang.org/genproto/LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57', + 'file://src/${GO_IMPORT}/vendor/google.golang.org/grpc/LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57', + 'file://src/${GO_IMPORT}/vendor/google.golang.org/protobuf/LICENSE;md5=02d4002e9171d41a8fad93aa7faf3956', + 'file://src/${GO_IMPORT}/vendor/gopkg.in/eapache/queue.v1/LICENSE;md5=1bfd4408d3de090ef6b908b0cc45a316', + 'file://src/${GO_IMPORT}/vendor/gopkg.in/yaml.v3/LICENSE;md5=3c91c17266710e16afdbb2b6d15c761c']) + checkvars['GO_IMPORT'] = "github.com/edgexfoundry/edgex-go" + inherits = ['go-vendor'] + dependencies = \ + [ + ('github.com/eclipse/paho.mqtt.golang','v1.4.2', '', '', ''), + ('github.com/edgexfoundry/go-mod-bootstrap','v3.0.1','github.com/edgexfoundry/go-mod-bootstrap/v3','/v3', ''), + ('github.com/edgexfoundry/go-mod-configuration','v3.0.0','github.com/edgexfoundry/go-mod-configuration/v3','/v3', ''), + ('github.com/edgexfoundry/go-mod-core-contracts','v3.0.0','github.com/edgexfoundry/go-mod-core-contracts/v3','/v3', ''), + ('github.com/edgexfoundry/go-mod-messaging','v3.0.0','github.com/edgexfoundry/go-mod-messaging/v3','/v3', ''), + ('github.com/edgexfoundry/go-mod-secrets','v3.0.1','github.com/edgexfoundry/go-mod-secrets/v3','/v3', ''), + ('github.com/fxamacker/cbor','v2.4.0','github.com/fxamacker/cbor/v2','/v2', ''), + ('github.com/gomodule/redigo','v1.8.9', '', '', ''), + ('github.com/google/uuid','v1.3.0', '', '', ''), + ('github.com/gorilla/mux','v1.8.0', '', '', ''), + ('github.com/rcrowley/go-metrics','v0.0.0-20201227073835-cf1acfcdf475', '', '', ''), + ('github.com/spiffe/go-spiffe','v2.1.4','github.com/spiffe/go-spiffe/v2','/v2', ''), + ('github.com/stretchr/testify','v1.8.2', '', '', ''), + ('go.googlesource.com/crypto','v0.8.0','golang.org/x/crypto', '', ''), + ('gopkg.in/eapache/queue.v1','v1.1.0', '', '', ''), + ('gopkg.in/yaml.v3','v3.0.1', '', '', ''), + ('github.com/microsoft/go-winio','v0.6.0','github.com/Microsoft/go-winio', '', ''), + ('github.com/hashicorp/go-metrics','v0.3.10','github.com/armon/go-metrics', '', ''), + ('github.com/cenkalti/backoff','v2.2.1+incompatible', '', '', ''), + ('github.com/davecgh/go-spew','v1.1.1', '', '', ''), + ('github.com/edgexfoundry/go-mod-registry','v3.0.0','github.com/edgexfoundry/go-mod-registry/v3','/v3', ''), + ('github.com/fatih/color','v1.9.0', '', '', ''), + ('github.com/go-jose/go-jose','v3.0.0','github.com/go-jose/go-jose/v3','/v3', ''), + ('github.com/go-kit/log','v0.2.1', '', '', ''), + ('github.com/go-logfmt/logfmt','v0.5.1', '', '', ''), + ('github.com/go-playground/locales','v0.14.1', '', '', ''), + ('github.com/go-playground/universal-translator','v0.18.1', '', '', ''), + ('github.com/go-playground/validator','v10.13.0','github.com/go-playground/validator/v10','/v10', ''), + ('github.com/go-redis/redis','v7.3.0','github.com/go-redis/redis/v7','/v7', ''), + ('github.com/golang/protobuf','v1.5.2', '', '', ''), + ('github.com/gorilla/websocket','v1.4.2', '', '', ''), + ('github.com/hashicorp/consul','v1.20.0','github.com/hashicorp/consul/api', '', 'api'), + ('github.com/hashicorp/errwrap','v1.0.0', '', '', ''), + ('github.com/hashicorp/go-cleanhttp','v0.5.1', '', '', ''), + ('github.com/hashicorp/go-hclog','v0.14.1', '', '', ''), + ('github.com/hashicorp/go-immutable-radix','v1.3.0', '', '', ''), + ('github.com/hashicorp/go-multierror','v1.1.1', '', '', ''), + ('github.com/hashicorp/go-rootcerts','v1.0.2', '', '', ''), + ('github.com/hashicorp/golang-lru','v0.5.4', '', '', ''), + ('github.com/hashicorp/serf','v0.10.1', '', '', ''), + ('github.com/leodido/go-urn','v1.2.3', '', '', ''), + ('github.com/mattn/go-colorable','v0.1.12', '', '', ''), + ('github.com/mattn/go-isatty','v0.0.14', '', '', ''), + ('github.com/mitchellh/consulstructure','v0.0.0-20190329231841-56fdc4d2da54', '', '', ''), + ('github.com/mitchellh/copystructure','v1.2.0', '', '', ''), + ('github.com/mitchellh/go-homedir','v1.1.0', '', '', ''), + ('github.com/mitchellh/mapstructure','v1.5.0', '', '', ''), + ('github.com/mitchellh/reflectwalk','v1.0.2', '', '', ''), + ('github.com/nats-io/nats.go','v1.25.0', '', '', ''), + ('github.com/nats-io/nkeys','v0.4.4', '', '', ''), + ('github.com/nats-io/nuid','v1.0.1', '', '', ''), + ('github.com/pmezard/go-difflib','v1.0.0', '', '', ''), + ('github.com/stretchr/objx','v0.5.0', '', '', ''), + ('github.com/x448/float16','v0.8.4', '', '', ''), + ('github.com/zeebo/errs','v1.3.0', '', '', ''), + ('go.googlesource.com/mod','v0.8.0','golang.org/x/mod', '', ''), + ('go.googlesource.com/net','v0.9.0','golang.org/x/net', '', ''), + ('go.googlesource.com/sync','v0.1.0','golang.org/x/sync', '', ''), + ('go.googlesource.com/sys','v0.7.0','golang.org/x/sys', '', ''), + ('go.googlesource.com/text','v0.9.0','golang.org/x/text', '', ''), + ('go.googlesource.com/tools','v0.6.0','golang.org/x/tools', '', ''), + ('github.com/googleapis/go-genproto','v0.0.0-20230223222841-637eb2293923','google.golang.org/genproto', '', ''), + ('github.com/grpc/grpc-go','v1.53.0','google.golang.org/grpc', '', ''), + ('go.googlesource.com/protobuf','v1.28.1','google.golang.org/protobuf', '', ''), + ] + + for d in dependencies: + src_uri.add(urifiy(*d)) + + checkvars['SRC_URI'] = src_uri + self.maxDiff = None + self._test_recipe_contents(recipefile, checkvars, inherits) + def _copy_file_with_cleanup(self, srcfile, basedstdir, *paths): dstdir = basedstdir self.assertTrue(os.path.exists(dstdir)) From patchwork Tue Oct 17 13:26:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lukas Funke X-Patchwork-Id: 32449 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8C9CCDB485 for ; Tue, 17 Oct 2023 13:27:08 +0000 (UTC) Received: from EUR03-AM7-obe.outbound.protection.outlook.com (EUR03-AM7-obe.outbound.protection.outlook.com [40.107.105.69]) by mx.groups.io with SMTP id smtpd.web11.214674.1697549217556090878 for ; Tue, 17 Oct 2023 06:26:59 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@weidmueller.onmicrosoft.com header.s=selector1-weidmueller-onmicrosoft-com header.b=a1j0zVNs; spf=pass (domain: weidmueller.com, ip: 40.107.105.69, mailfrom: lukas.funke-oss@weidmueller.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kq6uE1su8Sbqe4toRfaNsOsFXNL2kp5gn9Rbsr8R4xPtGdZkZHnB6h5DXaPirZhIsHy2yK9z/eLw5ZGefprFKsu0p8ElxDT69wyCYrGMFSbflqZiJmqYEhYKI+upgoJIPMgUsHWC9cEsEnnx9Qdctdrhmx4MD8+uGMiDXnxw8E4BdzvMhvZEdRBUwLlZgxzvcu9Ut2aAlbdef6qC+dVT9jg1MMWsCfKm3DEegAY8YrmrvAJ0K3sn8UtrKAzTQKSssaXBt7oVIa+Y6P1MGpOwutqImz3pFxTtozaK5BJqraVybyR1H/SxunQCY59h3FxrdCevlEGOSfOTgjX/+G2QGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=t7LTMVL3y5KvcqM1eit0/rcSMWgre56MO2DD0PPlSPY=; b=cADIiX1Eegaxed0HemEQa7tUY0XVXgDliDrSON8kGqaYO3CUH6WmiUy9NV0ADBkDTBVJ3SMrxPOK19GJItm3tPLBoeWBTi7J6Xt2BZXWlu9XfMuY0xF/K1GdQlleqCZOtsgssLBo/AXN9uwGsRowjJ5dYZoaFdUatqSgK/LVzy5LXVbUs/Jvul1yenivHZqrZe0OohafS7ebHYslNlkw+EQG4fxJ8OJWjh4X8Uo/j4UO5pcRf4ciwflVPBzLxoN40qm7N9IULFVBnjCG0WwyDKc9J3YCy5CYnU0RaWWMIHUjE3YyZTWC9IONaHIuOv/kkO4vTd7Hh4EY/dKRU4JAxw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=weidmueller.com; dmarc=pass action=none header.from=weidmueller.com; dkim=pass header.d=weidmueller.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=weidmueller.onmicrosoft.com; s=selector1-weidmueller-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t7LTMVL3y5KvcqM1eit0/rcSMWgre56MO2DD0PPlSPY=; b=a1j0zVNsyDn5MkC99vSmHluyW+sU0TqijuHDYLfmch3Y5tcVW+G4Zc62wmjq19wDHUq9Vi1VP5UF85SwPdI1CjJz9e21sGfyD4oev3IvWr+MiZYrL0PUiVXfUtbFJGWPWp6hvXYsBwy1j2HMcx3qZYkxbvFgFRvzkSfmfWnTCQI= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=weidmueller.com; Received: from AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) by AS4PR08MB7556.eurprd08.prod.outlook.com (2603:10a6:20b:4fe::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6886.34; Tue, 17 Oct 2023 13:26:54 +0000 Received: from AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62]) by AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62%5]) with mapi id 15.20.6886.034; Tue, 17 Oct 2023 13:26:54 +0000 From: lukas.funke-oss@weidmueller.com To: openembedded-core@lists.openembedded.org CC: Bruce Ashfield , Vyacheslav Yurkov , Martin Jansa , Lukas Funke Subject: [OE-Core][PATCH v2 3/4] recipetool: Ignore *.go files while scanning for licenses Date: Tue, 17 Oct 2023 15:26:46 +0200 Message-ID: <20231017132647.352938-4-lukas.funke-oss@weidmueller.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> References: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> X-ClientProxiedBy: FR2P281CA0158.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:99::11) To AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS2PR08MB8431:EE_|AS4PR08MB7556:EE_ X-MS-Office365-Filtering-Correlation-Id: 8a170fb3-daf3-4fa9-4b6a-08dbcf14bac6 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS2PR08MB8431.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(396003)(136003)(346002)(366004)(376002)(39860400002)(230922051799003)(451199024)(64100799003)(186009)(1800799009)(26005)(6512007)(107886003)(6666004)(2616005)(6506007)(1076003)(9686003)(83380400001)(52116002)(54906003)(41300700001)(5660300002)(478600001)(4744005)(8676002)(8936002)(6916009)(66476007)(2906002)(6486002)(4326008)(316002)(66556008)(86362001)(66946007)(38100700002)(36756003)(38350700005);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: weidmueller.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8a170fb3-daf3-4fa9-4b6a-08dbcf14bac6 X-MS-Exchange-CrossTenant-AuthSource: AS2PR08MB8431.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Oct 2023 13:26:54.3918 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: e4289438-1c5f-4c95-a51a-ee553b8b18ec X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: +65Zl2u6PMTt8NxvulCuoa7HNKF4H6oXEF2LLj5amjQ1u9YdrRRtSn9sO1p/2NtOznzZ1aHPSix7/tG8JMbQgQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7556 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 17 Oct 2023 13:27:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/189327 From: Lukas Funke Signed-off-by: Lukas Funke --- scripts/lib/recipetool/create.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/lib/recipetool/create.py b/scripts/lib/recipetool/create.py index 143bc63e9d..293198d1c8 100644 --- a/scripts/lib/recipetool/create.py +++ b/scripts/lib/recipetool/create.py @@ -1212,7 +1212,7 @@ def guess_license(srctree, d): licenses = [] licspecs = ['*LICEN[CS]E*', 'COPYING*', '*[Ll]icense*', 'LEGAL*', '[Ll]egal*', '*GPL*', 'README.lic*', 'COPYRIGHT*', '[Cc]opyright*', 'e[dp]l-v10'] - skip_extensions = (".html", ".js", ".json", ".svg", ".ts") + skip_extensions = (".html", ".js", ".json", ".svg", ".ts", ".go") licfiles = [] for root, dirs, files in os.walk(srctree): for fn in files: From patchwork Tue Oct 17 13:26:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lukas Funke X-Patchwork-Id: 32451 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C645CCDB484 for ; Tue, 17 Oct 2023 13:27:08 +0000 (UTC) Received: from EUR03-AM7-obe.outbound.protection.outlook.com (EUR03-AM7-obe.outbound.protection.outlook.com [40.107.105.69]) by mx.groups.io with SMTP id smtpd.web11.214674.1697549217556090878 for ; Tue, 17 Oct 2023 06:27:01 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="dkim: body hash did not verify" header.i=@weidmueller.onmicrosoft.com header.s=selector1-weidmueller-onmicrosoft-com header.b=GDCcALIa; spf=pass (domain: weidmueller.com, ip: 40.107.105.69, mailfrom: lukas.funke-oss@weidmueller.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LXzPzVXxEQ9gLbfX3q3ZppmpVz+u5ne8iFaIP6hXgSrbCszHnCLvscYDicBKnJcnB3nf+wjy514xXya6XWxSBIJWT578G9IEXsVv0Y/AY7PqkJAV71OC6XFwKzuy22TSjAMc5SfGlE0FsftoiFKNBxXTeRxjUic/gIOIzo79/AlUkp6U/QL6mpxi3lH150W+a/RYnOtfPaazSJmJWQxVboFIrSuiPPlKrQ4UdoF0jUka9QIQ4rQrl8CdYx5lBsFSD6C2WJJk69C1lrbKAPO5YW09A5iTrPY46v1uZHH9Tk7Db+kbus3SuLDFrxsbV+ORPrD5/0he31QJyMSwtQihVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XvYwj/9wjHVQDzFJul+girjPYLfIDIzr89+dZIrt+2I=; b=mB5QbyCMOtE4K8vfkjHgzywoWyV5+WVKh3Vdta4bAaNLaatjt9WtEeWGxdM66vzYdUs5/7fePbKFw/HsyC4SnD5JC4sm01poLIquBmxW/PrRq3W/EIP2qkRnObo0IYD/Pezq9hVsFS5Zb46ll5eWSRdH/Pp7Y0bVff49shLwPipIdKAOW3+6Cw8nUGGr8t//xiV6I2cZYDYAP12P1xRNUj1uiCIziwhrMl15MRTN27//dMA+UK0D3vqjeut9q4fCaLFOSO3izk+FmHLaVOxIeweg0qy5AUH3zAwQuPOmfdSbN50/OsYtwnWcRcjrwGX7GCni56RxEVxjNeU8IBWqtw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=weidmueller.com; dmarc=pass action=none header.from=weidmueller.com; dkim=pass header.d=weidmueller.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=weidmueller.onmicrosoft.com; s=selector1-weidmueller-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XvYwj/9wjHVQDzFJul+girjPYLfIDIzr89+dZIrt+2I=; b=GDCcALIaNYarimDH/80ZugnrcLzUEOUX38MTQ78qF/AS+NFMfWY7HsMJRLbXrJWYE3OphC6ZJv3ckF+RNDqSMvPhmnrRinpwtyG3Te2EUlA3nG1ycUDDxVA6A8oJzMxomOE+GPbvRmTiQe0csUvW5j+wWRRbVNlTn92HdLDQS1c= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=weidmueller.com; Received: from AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) by AS4PR08MB7556.eurprd08.prod.outlook.com (2603:10a6:20b:4fe::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6886.34; Tue, 17 Oct 2023 13:26:54 +0000 Received: from AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62]) by AS2PR08MB8431.eurprd08.prod.outlook.com ([fe80::4d2c:55ba:282e:9a62%5]) with mapi id 15.20.6886.034; Tue, 17 Oct 2023 13:26:54 +0000 From: lukas.funke-oss@weidmueller.com To: openembedded-core@lists.openembedded.org CC: Bruce Ashfield , Vyacheslav Yurkov , Martin Jansa , Lukas Funke Subject: [OE-Core][PATCH v2 4/4] recipetool: Add handler to create go recipes Date: Tue, 17 Oct 2023 15:26:47 +0200 Message-ID: <20231017132647.352938-5-lukas.funke-oss@weidmueller.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> References: <20231017132647.352938-1-lukas.funke-oss@weidmueller.com> X-ClientProxiedBy: FR2P281CA0158.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:99::11) To AS2PR08MB8431.eurprd08.prod.outlook.com (2603:10a6:20b:55a::18) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AS2PR08MB8431:EE_|AS4PR08MB7556:EE_ X-MS-Office365-Filtering-Correlation-Id: bb2b1628-d401-47f7-35c8-08dbcf14baf1 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS2PR08MB8431.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(396003)(136003)(346002)(366004)(376002)(39860400002)(230922051799003)(451199024)(64100799003)(186009)(1800799009)(26005)(6512007)(107886003)(6666004)(2616005)(6506007)(1076003)(9686003)(83380400001)(30864003)(52116002)(54906003)(41300700001)(5660300002)(478600001)(8676002)(966005)(8936002)(6916009)(66476007)(2906002)(6486002)(4326008)(316002)(66556008)(86362001)(66946007)(38100700002)(36756003)(38350700005);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: ilZUNMjw+MfBAfC9MFdg6rlLkVHhG9XcAJeXaaV1+lBbCvVFeOfXRBY08A2rQeWYysNSTxmmGvuQs1PyZUA0VocG0zsLI2Do92Zrj5aSGgMLkw71XM2GzkqPVopm3TWeleXYzv6HERv3wzmaxpb7+5VdteWorNreQIuyRnJQW/T+V1jaG/VFbZWZ9ncgFpWMM2lhTlX0r9NlZEhmy2Mxe96AbHTADR4YxBQua1TDkM6yOnNEtynG8c7LmpkMu/JZJGCWqPQNmtPLvV34GUuX765NTxrIpmiG9V5EXefkF9fvbyR6Z3s5ZFD4+rmGXpsF4KX1pFXU8vRXcBYWbRYJWKiElfPL3mMjtxQNxjfG+DPmnYv3EHLMuCgjKn6CkQ/v3DReDyV6n/YNcs6TBIIp8X5nwFVwMRLSmaD+539Uro/reLyFUP2tqY6TNwaZULoQuA2rXqDJd8/HEG/ukn6VGkGnnr7mYyy3/qZsBWPjgCz55JYix1iI3SD4a0vKSR7bLS9GsDGqfLWO3JuJphhRyzZCcaWHr6D/PWrXJLUVuhM2XRMRUL1IF6jKLThwbj9xf1Or7hF74OI7BT3u7DPyipgpGAakjLHtX+fyS91po2D2XkhPNH3f4cm5fGfqLlekixzD2vQg8wGB/3ZsiNkqc99wkyV572Fah5ctQEntM71V12mH7l7o9r0j/HrbaaZjf4i/FcB9oh2fboNIl+nGPX/4jYSq9CWPOz5DnU6vYzSs0MOehd+JnsGk5RAs+VeIUus/pqPOLZ5YVrRYXL2bV+RN41IreomZ0n99pEuemNn6LqPCxZpnKI6V81Y0soEKX6N0CmHe/sZyRbgqU7IVrQjdgQA+/ixj2k00VSs5uTLy96H63oiViosGpzMr5pGYf3ENRnypmMUgCfKpRW4pkRx9O0omFysPutmAlf8xoYSF2Ty+Ht4TihRCZ+LQ7Vb4sxDnUOH3zCIU/Lae2qG2KBR7VrajAAmLM3JwvkmrTgOogjRJCMKit0EoGDqmjauuQ5uIlRMfmdkjyYPZdjwqDevXI5fiSW1YBltyVKw1RR7nVWs0CRQHrYK4gjbMDqv1tSDrd+A6gk7S0JsPBqxg4olSR72xXaVQyZkeRyDP+Ryw5ljvvNfQGGFbnCfcFupyCcpBYJSF3NEp9JA0qV9W+XQJkM+y71aP9Hl03Vh4DXQBFg/o6NPKSqk2ZYxikxOzCnYWDc9xnE0a3Foilc0Vt1BQItFW71X2n5QdiuH+yfWTebQaLhzIfo21ZlgPRIue6nwAgVCzz+wCdghVeqhaXt8k9EfiZiL/NDZxAY5/uFT/C4DIJaCaydjKn/wrozHvop8ZNqHScYOTDI0oqB3ZvGx91re7rdTpAOmaxYqDbBiyKUlAKiwd/HD1/ZnCHYcNiMSsLeRykRRBolxoliE7xnKRnUqUPjMBOfKf76Wy/tdfOh76l/GfQnYwrI4vD9Q7vzk3xgv50cOZuzXCNnuiAJfgIKyZrY1RjIvdydIrug5U+YRvs1wBj0VoE4WXsYcvOpDtn5tG2sUGhs9YzQ3/fTWp85OkVjvCvS+oQj134BB0xLrRJ9SVBR4sn2WsOydbZADhFFYwyZ9sQxgEI3sCAg== X-OriginatorOrg: weidmueller.com X-MS-Exchange-CrossTenant-Network-Message-Id: bb2b1628-d401-47f7-35c8-08dbcf14baf1 X-MS-Exchange-CrossTenant-AuthSource: AS2PR08MB8431.eurprd08.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Oct 2023 13:26:54.7032 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: e4289438-1c5f-4c95-a51a-ee553b8b18ec X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: QA1uCBjTHIyMZQ6RiJeL+arRyXY5mr71o9epT1PTCZWBrV8bpLoNLE0xL3wdMENjYmXdWApOaaBbT5p8oDWPrw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR08MB7556 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 17 Oct 2023 13:27:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/189330 From: Lukas Funke Signed-off-by: Lukas Funke --- scripts/lib/recipetool/create_go.py | 730 ++++++++++++++++++++++++++++ 1 file changed, 730 insertions(+) create mode 100644 scripts/lib/recipetool/create_go.py diff --git a/scripts/lib/recipetool/create_go.py b/scripts/lib/recipetool/create_go.py new file mode 100644 index 0000000000..e0254f111b --- /dev/null +++ b/scripts/lib/recipetool/create_go.py @@ -0,0 +1,730 @@ +# Recipe creation tool - go support plugin +# +# Copyright (C) 2023 Weidmueller GmbH & Co KG +# Author: Lukas Funke +# +# SPDX-License-Identifier: GPL-2.0-only +# +# Copyright (c) 2009 The Go Authors. All rights reserved. +# +# SPDX-License-Identifier: BSD-3-Clause +# + + +from collections import namedtuple +from enum import Enum +from html.parser import HTMLParser +from recipetool.create import RecipeHandler, handle_license_vars +from recipetool.create import guess_license, tidy_licenses, fixup_license +from urllib.error import URLError + +import bb.utils +import json +import logging +import os +import re +import subprocess +import sys +import shutil +import tempfile +import urllib.parse +import urllib.request + + +GoImport = namedtuple('GoImport', 'root vcs url suffix') +logger = logging.getLogger('recipetool') +CodeRepo = namedtuple( + 'CodeRepo', 'path codeRoot codeDir pathMajor pathPrefix pseudoMajor') + +tinfoil = None + +# Regular expression to parse pseudo semantic version +# see https://go.dev/ref/mod#pseudo-versions +re_pseudo_semver = re.compile( + r"^v[0-9]+\.(0\.0-|\d+\.\d+-([^+]*\.)?0\.)(?P\d{14})-(?P[A-Za-z0-9]+)(\+[0-9A-Za-z-]+(\.[0-9A-Za-z-]+)*)?$") +# Regular expression to parse semantic version +re_semver = re.compile( + r"^v(?P0|[1-9]\d*)\.(?P0|[1-9]\d*)\.(?P0|[1-9]\d*)(?:-(?P(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*)(?:\.(?:0|[1-9]\d*|\d*[a-zA-Z-][0-9a-zA-Z-]*))*))?(?:\+(?P[0-9a-zA-Z-]+(?:\.[0-9a-zA-Z-]+)*))?$") + + +def tinfoil_init(instance): + global tinfoil + tinfoil = instance + + +class GoRecipeHandler(RecipeHandler): + """Class to handle the go recipe creation""" + + @staticmethod + def __ensure_go(): + """Check if the 'go' command is available in the recipes""" + recipe = "go-native" + if not tinfoil.recipes_parsed: + tinfoil.parse_recipes() + try: + rd = tinfoil.parse_recipe(recipe) + except bb.providers.NoProvider: + bb.error( + "Nothing provides '%s' which is required for the build" % (recipe)) + bb.note( + "You will likely need to add a layer that provides '%s'" % (recipe)) + return None + + bindir = rd.getVar('STAGING_BINDIR_NATIVE') + gopath = os.path.join(bindir, 'go') + + if not os.path.exists(gopath): + tinfoil.build_targets(recipe, 'addto_recipe_sysroot') + + if not os.path.exists(gopath): + logger.error( + '%s required to process specified source, but %s did not seem to populate it' % 'go', recipe) + return None + + return bindir + + def __resolve_repository_static(self, modulepath): + """Resolve the repository in a static manner + + The method is based on the go implementation of + `repoRootFromVCSPaths` in + https://github.com/golang/go/blob/master/src/cmd/go/internal/vcs/vcs.go + """ + + url = urllib.parse.urlparse("https://" + modulepath) + req = urllib.request.Request(url.geturl()) + + try: + resp = urllib.request.urlopen(req) + # Some modulepath are just redirects to github (or some other vcs + # hoster). Therefore, we check if this modulepath redirects to + # somewhere else + if resp.geturl() != url.geturl(): + bb.debug(1, "%s is redirectred to %s" % + (url.geturl(), resp.geturl())) + url = urllib.parse.urlparse(resp.geturl()) + modulepath = url.netloc + url.path + + except URLError as url_err: + # This is probably because the module path + # contains the subdir and major path. Thus, + # we ignore this error for now + logger.debug( + 1, "Failed to fetch page from [%s]: %s" % (url, str(url_err))) + + host, _, _ = modulepath.partition('/') + + class vcs(Enum): + pathprefix = "pathprefix" + regexp = "regexp" + type = "type" + repo = "repo" + check = "check" + schemelessRepo = "schemelessRepo" + + # GitHub + vcsGitHub = {} + vcsGitHub[vcs.pathprefix] = "github.com" + vcsGitHub[vcs.regexp] = re.compile( + r'^(?Pgithub\.com/[A-Za-z0-9_.\-]+/[A-Za-z0-9_.\-]+)(/(?P[A-Za-z0-9_.\-]+))*$') + vcsGitHub[vcs.type] = "git" + vcsGitHub[vcs.repo] = "https://\\g" + + # Bitbucket + vcsBitbucket = {} + vcsBitbucket[vcs.pathprefix] = "bitbucket.org" + vcsBitbucket[vcs.regexp] = re.compile( + r'^(?Pbitbucket\.org/(?P[A-Za-z0-9_.\-]+/[A-Za-z0-9_.\-]+))(/(?P[A-Za-z0-9_.\-]+))*$') + vcsBitbucket[vcs.type] = "git" + vcsBitbucket[vcs.repo] = "https://\\g" + + # IBM DevOps Services (JazzHub) + vcsIBMDevOps = {} + vcsIBMDevOps[vcs.pathprefix] = "hub.jazz.net/git" + vcsIBMDevOps[vcs.regexp] = re.compile( + r'^(?Phub\.jazz\.net/git/[a-z0-9]+/[A-Za-z0-9_.\-]+)(/(?P[A-Za-z0-9_.\-]+))*$') + vcsIBMDevOps[vcs.type] = "git" + vcsIBMDevOps[vcs.repo] = "https://\\g" + + # Git at Apache + vcsApacheGit = {} + vcsApacheGit[vcs.pathprefix] = "git.apache.org" + vcsApacheGit[vcs.regexp] = re.compile( + r'^(?Pgit\.apache\.org/[a-z0-9_.\-]+\.git)(/(?P[A-Za-z0-9_.\-]+))*$') + vcsApacheGit[vcs.type] = "git" + vcsApacheGit[vcs.repo] = "https://\\g" + + # Git at OpenStack + vcsOpenStackGit = {} + vcsOpenStackGit[vcs.pathprefix] = "git.openstack.org" + vcsOpenStackGit[vcs.regexp] = re.compile( + r'^(?Pgit\.openstack\.org/[A-Za-z0-9_.\-]+/[A-Za-z0-9_.\-]+)(\.git)?(/(?P[A-Za-z0-9_.\-]+))*$') + vcsOpenStackGit[vcs.type] = "git" + vcsOpenStackGit[vcs.repo] = "https://\\g" + + # chiselapp.com for fossil + vcsChiselapp = {} + vcsChiselapp[vcs.pathprefix] = "chiselapp.com" + vcsChiselapp[vcs.regexp] = re.compile( + r'^(?Pchiselapp\.com/user/[A-Za-z0-9]+/repository/[A-Za-z0-9_.\-]+)$') + vcsChiselapp[vcs.type] = "fossil" + vcsChiselapp[vcs.repo] = "https://\\g" + + # General syntax for any server. + # Must be last. + vcsGeneralServer = {} + vcsGeneralServer[vcs.regexp] = re.compile( + "(?P(?P([a-z0-9.\\-]+\\.)+[a-z0-9.\\-]+(:[0-9]+)?(/~?[A-Za-z0-9_.\\-]+)+?)\\.(?Pbzr|fossil|git|hg|svn))(/~?(?P[A-Za-z0-9_.\\-]+))*$") + vcsGeneralServer[vcs.schemelessRepo] = True + + vcsPaths = [vcsGitHub, vcsBitbucket, vcsIBMDevOps, + vcsApacheGit, vcsOpenStackGit, vcsChiselapp, + vcsGeneralServer] + + if modulepath.startswith("example.net") or modulepath == "rsc.io": + logger.warning("Suspicious module path %s" % modulepath) + return None + if modulepath.startswith("http:") or modulepath.startswith("https:"): + logger.warning("Import path should not start with %s %s" % + ("http", "https")) + return None + + rootpath = None + vcstype = None + repourl = None + suffix = None + + for srv in vcsPaths: + m = srv[vcs.regexp].match(modulepath) + if vcs.pathprefix in srv: + if host == srv[vcs.pathprefix]: + rootpath = m.group('root') + vcstype = srv[vcs.type] + repourl = m.expand(srv[vcs.repo]) + suffix = m.group('suffix') + break + elif m and srv[vcs.schemelessRepo]: + rootpath = m.group('root') + vcstype = m[vcs.type] + repourl = m[vcs.repo] + suffix = m.group('suffix') + break + + return GoImport(rootpath, vcstype, repourl, suffix) + + def __resolve_repository_dynamic(self, modulepath): + """Resolve the repository root in a dynamic manner. + + The method is based on the go implementation of + `repoRootForImportDynamic` in + https://github.com/golang/go/blob/master/src/cmd/go/internal/vcs/vcs.go + """ + url = urllib.parse.urlparse("https://" + modulepath) + + class GoImportHTMLParser(HTMLParser): + + def __init__(self): + super().__init__() + self.__srv = [] + + def handle_starttag(self, tag, attrs): + if tag == 'meta' and list( + filter(lambda a: (a[0] == 'name' and a[1] == 'go-import'), attrs)): + content = list( + filter(lambda a: (a[0] == 'content'), attrs)) + if content: + self.__srv = content[0][1].split() + + @property + def import_prefix(self): + return self.__srv[0] if len(self.__srv) else None + + @property + def vcs(self): + return self.__srv[1] if len(self.__srv) else None + + @property + def repourl(self): + return self.__srv[2] if len(self.__srv) else None + + url = url.geturl() + "?go-get=1" + req = urllib.request.Request(url) + + try: + resp = urllib.request.urlopen(req) + + except URLError as url_err: + logger.warning( + "Failed to fetch page from [%s]: %s", url, str(url_err)) + return None + + parser = GoImportHTMLParser() + parser.feed(resp.read().decode('utf-8')) + parser.close() + + return GoImport(parser.import_prefix, parser.vcs, parser.repourl, None) + + def __resolve_from_golang_proxy(self, modulepath, version): + """ + Resolves repository data from golang proxy + """ + url = urllib.parse.urlparse("https://proxy.golang.org/" + + modulepath + + "/@v/" + + version + + ".info") + + # Transform url to lower case, golang proxy doesn't like mixed case + req = urllib.request.Request(url.geturl().lower()) + + try: + resp = urllib.request.urlopen(req) + except URLError as url_err: + logger.warning( + "Failed to fetch page from [%s]: %s", url, str(url_err)) + return None + + golang_proxy_res = resp.read().decode('utf-8') + modinfo = json.loads(golang_proxy_res) + + if modinfo and 'Origin' in modinfo: + origin = modinfo['Origin'] + _root_url = urllib.parse.urlparse(origin['URL']) + + # We normalize the repo URL since we don't want the scheme in it + _subdir = origin['Subdir'] if 'Subdir' in origin else None + _root, _, _ = self.__split_path_version(modulepath) + if _subdir: + _root = _root[:-len(_subdir)].strip('/') + + _commit = origin['Hash'] + _vcs = origin['VCS'] + return (GoImport(_root, _vcs, _root_url.geturl(), None), _commit) + + return None + + def __resolve_repository(self, modulepath): + """ + Resolves src uri from go module-path + """ + repodata = self.__resolve_repository_static(modulepath) + if not repodata or not repodata.url: + repodata = self.__resolve_repository_dynamic(modulepath) + if not repodata or not repodata.url: + logger.error( + "Could not resolve repository for module path '%s'" % modulepath) + # There is no way to recover from this + sys.exit(14) + if repodata: + logger.debug(1, "Resolved download path for import '%s' => %s" % ( + modulepath, repodata.url)) + return repodata + + def __split_path_version(self, path): + i = len(path) + dot = False + for j in range(i, 0, -1): + if path[j - 1] < '0' or path[j - 1] > '9': + break + if path[j - 1] == '.': + dot = True + break + i = j - 1 + + if i <= 1 or i == len( + path) or path[i - 1] != 'v' or path[i - 2] != '/': + return path, "", True + + prefix, pathMajor = path[:i - 2], path[i - 2:] + if dot or len( + pathMajor) <= 2 or pathMajor[2] == '0' or pathMajor == "/v1": + return path, "", False + + return prefix, pathMajor, True + + def __get_path_major(self, pathMajor): + if not pathMajor: + return "" + + if pathMajor[0] != '/' and pathMajor[0] != '.': + logger.error( + "pathMajor suffix %s passed to PathMajorPrefix lacks separator", pathMajor) + + if pathMajor.startswith(".v") and pathMajor.endswith("-unstable"): + pathMajor = pathMajor[:len("-unstable") - 2] + + return pathMajor[1:] + + def __build_coderepo(self, repo, path): + codedir = "" + pathprefix, pathMajor, _ = self.__split_path_version(path) + if repo.root == path: + pathprefix = path + elif path.startswith(repo.root): + codedir = pathprefix[len(repo.root):].strip('/') + + pseudoMajor = self.__get_path_major(pathMajor) + + logger.debug("root='%s', codedir='%s', prefix='%s', pathMajor='%s', pseudoMajor='%s'", + repo.root, codedir, pathprefix, pathMajor, pseudoMajor) + + return CodeRepo(path, repo.root, codedir, + pathMajor, pathprefix, pseudoMajor) + + def __resolve_version(self, repo, path, version): + hash = None + coderoot = self.__build_coderepo(repo, path) + + def vcs_fetch_all(): + tmpdir = tempfile.mkdtemp() + clone_cmd = "%s clone --bare %s %s" % ('git', repo.url, tmpdir) + bb.process.run(clone_cmd) + log_cmd = "git log --all --pretty='%H %d' --decorate=short" + output, _ = bb.process.run( + log_cmd, shell=True, stderr=subprocess.PIPE, cwd=tmpdir) + bb.utils.prunedir(tmpdir) + return output.strip().split('\n') + + def vcs_fetch_remote(tag): + # add * to grab ^{} + refs = {} + ls_remote_cmd = "git ls-remote -q --tags {} {}*".format( + repo.url, tag) + output, _ = bb.process.run(ls_remote_cmd) + output = output.strip().split('\n') + for line in output: + f = line.split(maxsplit=1) + if len(f) != 2: + continue + + for prefix in ["HEAD", "refs/heads/", "refs/tags/"]: + if f[1].startswith(prefix): + refs[f[1].removeprefix(prefix)] = f[0] + + for key, hash in refs.items(): + if key.endswith(r"^{}"): + refs[key.strip(r"^{}")] = hash + + return refs[tag] + + m_pseudo_semver = re_pseudo_semver.match(version) + + if m_pseudo_semver: + remote_refs = vcs_fetch_all() + short_commit = m_pseudo_semver.group('commithash') + for l in remote_refs: + r = l.split(maxsplit=1) + sha1 = r[0] if len(r) else None + if not sha1: + logger.error( + "Ups: could not resolve abbref commit for %s" % short_commit) + + elif sha1.startswith(short_commit): + hash = sha1 + break + else: + m_semver = re_semver.match(version) + if m_semver: + + def get_sha1_remote(re): + rsha1 = None + for line in remote_refs: + # Split lines of the following format: + # 22e90d9b964610628c10f673ca5f85b8c2a2ca9a (tag: sometag) + lineparts = line.split(maxsplit=1) + sha1 = lineparts[0] if len(lineparts) else None + refstring = lineparts[1] if len( + lineparts) == 2 else None + if refstring: + # Normalize tag string and split in case of multiple + # regs e.g. (tag: speech/v1.10.0, tag: orchestration/v1.5.0 ...) + refs = refstring.strip('(), ').split(',') + for ref in refs: + if re.match(ref.strip()): + rsha1 = sha1 + return rsha1 + + semver = "v" + m_semver.group('major') + "."\ + + m_semver.group('minor') + "."\ + + m_semver.group('patch') \ + + (("-" + m_semver.group('prerelease')) + if m_semver.group('prerelease') else "") + + tag = os.path.join( + coderoot.codeDir, semver) if coderoot.codeDir else semver + + # probe tag using 'ls-remote', which is faster than fetching + # complete history + hash = vcs_fetch_remote(tag) + if not hash: + # backup: fetch complete history + remote_refs = vcs_fetch_all() + hash = get_sha1_remote( + re.compile(fr"(tag:|HEAD ->) ({tag})")) + + logger.debug( + "Resolving commit for tag '%s' -> '%s'", tag, hash) + return hash + + def __generate_srcuri_inline_fcn(self, path, version, replaces=None): + """Generate SRC_URI functions for go imports""" + + logger.info("Resolving repository for module %s", path) + # First try to resolve repo and commit from golang proxy + # Most info is already there and we don't have to go through the + # repository or even perform the version resolve magic + golang_proxy_info = self.__resolve_from_golang_proxy(path, version) + if golang_proxy_info: + repo = golang_proxy_info[0] + commit = golang_proxy_info[1] + else: + # Fallback + # Resolve repository by 'hand' + repo = self.__resolve_repository(path) + commit = self.__resolve_version(repo, path, version) + + url = urllib.parse.urlparse(repo.url) + repo_url = url.netloc + url.path + + coderoot = self.__build_coderepo(repo, path) + + inline_fcn = "${@go_src_uri(" + inline_fcn += f"'{repo_url}','{version}'" + if repo_url != path: + inline_fcn += f",path='{path}'" + if coderoot.codeDir: + inline_fcn += f",subdir='{coderoot.codeDir}'" + if repo.vcs != 'git': + inline_fcn += f",vcs='{repo.vcs}'" + if replaces: + inline_fcn += f",replaces='{replaces}'" + if coderoot.pathMajor: + inline_fcn += f",pathmajor='{coderoot.pathMajor}'" + inline_fcn += ")}" + + return inline_fcn, commit + + def __handle_dependencies(self, go_mod): + + src_uris = [] + src_revs = [] + + def generate_src_rev(path, version, commithash): + src_rev = f"# {path}@{version} => {commithash}\n" + # Ups...maybe someone manipulated the source repository and the + # version or commit could not be resolved. This is a sign of + # a) the supply chain was manipulated (bad) + # b) the implementation for the version resolving didn't work + # anymore (less bad) + if not commithash: + src_rev += f"#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\n" + src_rev += f"#!!! Could not resolve version !!!\n" + src_rev += f"#!!! Possible supply chain attack !!!\n" + src_rev += f"#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\n" + src_rev += f"SRCREV_{path.replace('/', '.')} = \"{commithash}\"" + + return src_rev + + for require in go_mod['Require']: + path = require['Path'] + version = require['Version'] + + inline_fcn, commithash = self.__generate_srcuri_inline_fcn( + path, version) + src_uris.append(inline_fcn) + src_revs.append(generate_src_rev(path, version, commithash)) + + if go_mod['Replace']: + for replacement in go_mod['Replace']: + oldpath = replacement['Old']['Path'] + path = replacement['New']['Path'] + version = replacement['New']['Version'] + + inline_fcn, commithash = self.__generate_srcuri_inline_fcn( + path, version, oldpath) + src_uris.append(inline_fcn) + src_revs.append(generate_src_rev(path, version, commithash)) + + return src_uris, src_revs + + def __go_run_cmd(self, cmd, cwd, d): + return bb.process.run(cmd, env=dict(os.environ, PATH=d.getVar('PATH')), + shell=True, cwd=cwd) + + def __go_native_version(self, d): + stdout, _ = self.__go_run_cmd("go version", None, d) + m = re.match(r".*\sgo((\d+).(\d+).(\d+))\s([\w\/]*)", stdout) + major = int(m.group(2)) + minor = int(m.group(3)) + patch = int(m.group(4)) + + return major, minor, patch + + def __go_mod_patch(self, srctree, localfilesdir, extravalues, d): + + patchfilename = "go.mod.patch" + go_native_version_major, go_native_version_minor, _ = self.__go_native_version( + d) + self.__go_run_cmd("go mod tidy -go=%d.%d" % + (go_native_version_major, go_native_version_minor), srctree, d) + stdout, _ = self.__go_run_cmd("go mod edit -json", srctree, d) + + # Create patch in order to upgrade go version + self.__go_run_cmd("git diff go.mod > %s" % (patchfilename), srctree, d) + # Restore original state + self.__go_run_cmd("git checkout HEAD go.mod go.sum", srctree, d) + + go_mod = json.loads(stdout) + tmpfile = os.path.join(localfilesdir, patchfilename) + shutil.move(os.path.join(srctree, patchfilename), tmpfile) + + extravalues['extrafiles'][patchfilename] = tmpfile + + return go_mod, patchfilename + + def __go_mod_vendor(self, srctree, localfilesdir, extravalues, d): + # Perform vendoring to retrieve the correct modules.txt + tmp_vendor_dir = tempfile.mkdtemp() + + # -v causes to go to print modules.txt to stderr + _, stderr = self.__go_run_cmd( + "go mod vendor -v -o %s" % (tmp_vendor_dir), srctree, d) + + modules_txt_filename = os.path.join(localfilesdir, "modules.txt") + with open(modules_txt_filename, "w") as f: + f.write(stderr) + + extravalues['extrafiles']["modules.txt"] = modules_txt_filename + + licenses = [] + lic_files_chksum = [] + licvalues = guess_license(tmp_vendor_dir, d) + + if licvalues: + for licvalue in licvalues: + license = licvalue[0] + lics = tidy_licenses(fixup_license(license)) + lics = [lic for lic in lics if lic not in licenses] + if len(lics): + licenses.extend(lics) + lic_files_chksum.append( + 'file://vendor/%s;md5=%s' % (licvalue[1], licvalue[2])) + + extravalues['LICENSE'] = licenses + extravalues['LIC_FILES_CHKSUM'] = lic_files_chksum + + shutil.rmtree(tmp_vendor_dir) + + return licenses + + def process(self, srctree, classes, lines_before, + lines_after, handled, extravalues): + + if 'buildsystem' in handled: + return False + + files = RecipeHandler.checkfiles(srctree, ['go.mod']) + if not files: + return False + + d = bb.data.createCopy(tinfoil.config_data) + go_bindir = self.__ensure_go() + if not go_bindir: + sys.exit(14) + + d.prependVar('PATH', '%s:' % go_bindir) + handled.append('buildsystem') + classes.append("go-vendor") + + stdout, _ = self.__go_run_cmd("go mod edit -json", srctree, d) + + go_mod = json.loads(stdout) + go_import = go_mod['Module']['Path'] + go_version_match = re.match("([0-9]+).([0-9]+)", go_mod['Go']) + go_version_major = int(go_version_match.group(1)) + go_version_minor = int(go_version_match.group(2)) + src_uris = [] + + localfilesdir = tempfile.mkdtemp(prefix='recipetool-go-') + extravalues.setdefault('extrafiles', {}) + # go.mod files with version < 1.17 may not include all indirect + # dependencies. Thus, we have to upgrade the go version. + if go_version_major == 1 and go_version_minor < 17: + logger.warning( + "go.mod files generated by Go < 1.17 might have incomplete indirect dependencies.") + go_mod, patchfilename = self.__go_mod_patch(srctree, localfilesdir, + extravalues, d) + src_uris.append( + "file://%s;patchdir=src/${GO_IMPORT}" % (patchfilename)) + + # Check whether the module is vendored. If so, we have nothing to do. + # Otherwise we gather all dependencies and add them to the recipe + if not os.path.exists(os.path.join(srctree, "vendor")): + + self.__go_mod_vendor(srctree, localfilesdir, extravalues, d) + src_uris.append("file://modules.txt") + + dep_src_uris, src_revs = self.__handle_dependencies(go_mod) + src_uris.extend(dep_src_uris) + + for src_rev in src_revs: + lines_after.append(src_rev) + + self.__rewrite_src_uri(src_uris, lines_before) + + # Do generic license handling + handle_license_vars(srctree, lines_before, handled, extravalues, d) + self.__rewrite_lic_uri(lines_before) + + lines_before.append("GO_IMPORT = \"{}\"".format(go_import)) + lines_before.append("SRCREV_FORMAT = \"${BPN}\"") + + def __update_lines_before(self, updated, newlines, lines_before): + if updated: + del lines_before[:] + for line in newlines: + # Hack to avoid newlines that edit_metadata inserts + if line.endswith('\n'): + line = line[:-1] + lines_before.append(line) + return updated + + def __rewrite_lic_uri(self, lines_before): + + def varfunc(varname, origvalue, op, newlines): + if varname == 'LIC_FILES_CHKSUM': + new_licenses = [] + licenses = origvalue.split('\\') + for license in licenses: + license = license.strip() + uri, chksum = license.split(';', 1) + url = urllib.parse.urlparse(uri) + new_uri = os.path.join( + url.scheme + "://", "src", "${GO_IMPORT}", url.netloc + url.path) + ";" + chksum + new_licenses.append(new_uri) + + return new_licenses, None, -1, True + return origvalue, None, 0, True + + updated, newlines = bb.utils.edit_metadata( + lines_before, ['LIC_FILES_CHKSUM'], varfunc) + return self.__update_lines_before(updated, newlines, lines_before) + + def __rewrite_src_uri(self, src_uris_deps, lines_before): + + def varfunc(varname, origvalue, op, newlines): + if varname == 'SRC_URI': + src_uri = [] + src_uri.append( + "git://${GO_IMPORT};destsuffix=git/src/${GO_IMPORT};nobranch=1;name=${BPN};protocol=https") + src_uri.extend(src_uris_deps) + return src_uri, None, -1, True + return origvalue, None, 0, True + + updated, newlines = bb.utils.edit_metadata( + lines_before, ['SRC_URI'], varfunc) + return self.__update_lines_before(updated, newlines, lines_before) + + +def register_recipe_handlers(handlers): + handlers.append((GoRecipeHandler(), 60))