blob: 0ac125ff2e6ff0f02fab69070695731857a4fa76 [file] [log] [blame] [edit]
#!/bin/bash -e
# Copyright 2022 Google LLC. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the License);
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# DO NOT SET -x. It will leak any secret credentials into logs.
kokoro_scm_name="presubmit"
workspace_root="${KOKORO_ARTIFACTS_DIR}/git/${kokoro_scm_name}"
function DownloadBazelisk() {
# Downloads bazelisk to a temp directory.
local version="${1:-1.18.0}"
local platform="${2:-linux}"
local arch="${3:-amd64}"
local dest=$(mktemp -d)
(
set -euxo pipefail
echo "== Downloading bazelisk ====================================="
download_url="https://github.com/bazelbuild/bazelisk/releases/download/v${version}/bazelisk-${platform}-${arch}"
mkdir -p "${dest}"
wget -nv ${download_url} -O "${dest}/bazelisk"
chmod +x "${dest}/bazelisk"
echo "============================================================="
) &> /dev/stderr
echo "${dest}"
}
bazelisk_dir=$(DownloadBazelisk "1.18.0" linux amd64)
export PATH="${bazelisk_dir}:${PATH}"
function Cleanup() {
# Clean up all temporary directories: bazelisk install, sandbox, and
# android_tools.
rm -rf "$bazelisk_dir"
}
trap Cleanup EXIT
# Default JDK on GCP_UBUNTU is JDK8
sudo update-java-alternatives --set java-1.11.0-openjdk-amd64
# Bazel reads JAVA_HOME
export JAVA_HOME=/usr/lib/jvm/java-11-openjdk-amd64/
# Create a tmpfs in the sandbox at "/tmp/hsperfdata_$USERNAME" to avoid the
# problems described in https://github.com/bazelbuild/bazel/issues/3236
# Basically, the JVM creates a file at /tmp/hsperfdata_$USERNAME/$PID, but
# processes all get a PID of 2 in the sandbox, so concurrent Java build actions
# could crash because they're trying to modify the same file. So, tell the
# sandbox to mount a tmpfs at /tmp/hsperfdata_$(whoami) so that each JVM gets
# its own version of that directory.
hsperfdata_dir="/tmp/hsperfdata_$(whoami)_rules_kotlin"
mkdir -p "$hsperfdata_dir"
cd "${workspace_root}"
# Run test coverage for all the test targets except excluded by
# --instrumentation_filter - code coverage doesn't work for them and they
# would only be tested
bazelisk coverage \
--sandbox_tmpfs_path="$hsperfdata_dir" \
--verbose_failures \
--experimental_google_legacy_api \
--instrumentation_filter=-//tests/jvm/java/multijarimport[/:],-//tests/jvm/java/functions[/:] \
//tests/...
# For a specific test //tools:source_jar_zipper_freshness_test run test only
bazelisk test \
--sandbox_tmpfs_path="$hsperfdata_dir" \
--verbose_failures \
--experimental_google_legacy_api \
//tools:source_jar_zipper_freshness_test