-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
non-root requirement seems too much for an ordinary user of rules_python
#1169
Comments
You can disable the error python_register_toolchains(
name = ...,
python_version = ...,
ignore_root_user_error = True,
) |
It is good there is an option to choose but you are choosing between two evils: either you get the pyc cache misses or you have to go out of your way to support non-root builds (e.g. when building in a docker container). We have opted for the second evil, but it creates so much extra work. I really wish there was a way to solve the cache issue without this extra requirement. |
we hit the same issues - my feeling is that this is just not the responsibility of |
To be fair, it's probably the CPython to blame, as they programmed to produce the Not sure if they are willing to make a flag to NOT generate |
Works for me! |
When it is not feasible to run as non-root, currently one needs to modify the build files of the project. This is bit clumsy. Could the |
@daixiang0 / @nsubiron Could you please let me know how and where did u make this edit? |
^ I think this workaround doesn't suffice for build tools seeking to use rules_python in their implementations, since they aren't the root module. More context over in hedronvision/bazel-compile-commands-extractor#166 It'd be quite valuable to have this just work out of the box. That is, if running as root, fall back to the best behavior you can rather than erroring. |
Mostly reverts 0e5b1aa Tracking restoration at #168 Please see - #163 - bazelbuild/rules_python#1732 - #165 - (rules_python issue to come) - #166 - bazelbuild/rules_python#1169
Could this setting at least be overridden with an environment variable? I have a |
Yes, I think thats fine. Send a PR? re: the issue in general: Unfortunately, I don't see any great solutions to this problem.
I am somewhat inclined to agree. The reason being: the problem a writable install causes is spurious rebuilds. When it's an error to have a writable install, and people have to opt out, then they're just going to opt out, because that going to mostly work, rather than entirely not work. And they just have to live with spurious rebuilds. I don't see any interpreter options or environment variable to use hashed-based pycs instead of timestamps. Which is too bad; it would have been a nice fix to this. Nor do I see any options to control where pycs are read-from/written-to for just for the stdlib. When a runtime is initially downloaded and extracted, we could run a compile step to pre-populate the pyc files. However, this only works if the downloaded runtime runs on the host. If we could somehow ensure that there was a host-runnable python of the same version available, then that could be used to perform the compilation; or if we had a prebuilt tool to perform this. This does seem like one of the better options, though. If the host can't run the Python, then we just move along. Alternatively, the pyc could be generated at build time. We can do this for regular libraries now; I don't see why we couldn't also do it for the py files coming from the runtime. The downside is it'll add some build overhead, since there's a few thousand files to compile. Maybe if the stdlib was in a zip file we'd have more options? This idea was floated as a way to reduce the number of files in the runtime, too. I'm not sure where Python will write pyc files if it reads a file from a zip. It'd be most ideal if the upstream python-standalone packages came with the pyc files already. That would make this go away entirely. |
This isn't ideal, but it sounds like it really only affects the ability to cache *.pyc files. In our case, we have about a grand total of 3 or 4 files we compile with Python so I'm not sure it's worth the headache right of figuring out a different way to deal with this. bazelbuild/rules_python#1169 Useful for docker builds that require extra effort to use in a non-root context. Signed-off-by: Noah Watkins <[email protected]>
Mostly reverts hedronvision/bazel-compile-commands-extractor@59dc7ff Tracking restoration at hedronvision/bazel-compile-commands-extractor#168 Please see - hedronvision/bazel-compile-commands-extractor#163 - bazelbuild/rules_python#1732 - hedronvision/bazel-compile-commands-extractor#165 - (rules_python issue to come) - hedronvision/bazel-compile-commands-extractor#166 - bazelbuild/rules_python#1169
This handles bazelbuild/rules_python#1169, and hopefully fixes google#96.
@rickeylev Maybe I'm missing sth, but there are several ways to deal with pyc generation without having to mark directories as read-only:
E.g. the pyc files could be written to a scratch directory, or you can tell the python interpreter to use existing, but not writing new pyc files. |
Unfortunately, environment variables aren't a good option because they get inherited by sub-processes (we've had bug reports due to using env vars and are trying to avoid them). They're also somewhat of a pain because, in the bootstrap, we have to have special logic to try and respect if the caller sets the environment variable.
Disabling all runtime pyc generation is also a heavy hammer -- if someone wants to set the pyc cache prefix, then why not? Considering how Bazel works, that's not a bad idea to get pyc files with less overhead. Also, this problem only occurs when Python is trying to create pyc files in the backing repository directory instead of the runfiles directory. I think that behavior is somewhat specific to the interpreter itself; IIRC it jumps through some extra hoops to resolve symlinks and find the "real" location of the interpreter. |
Also -- I'm +1 on making the "setting read only logic" optimistic in nature. If it works, great, if not, oh well (the only thing the user can do is disable it entirely -- same net effect). I'd approve a PR doing that. |
The main issue I see with the current approach, is that its an all-or-nothing approach. E.g. why does Right now, if you want to use As Also, being on windows or enabling I'd suggest to have the following approach: on_windows = "windows" in platform
if (on_windows or is_root) and not ctx.hide_toolchain_cache_warning:
show_warning("If you experience toolchain caching issues, please read this: ...")
glob_exclude = [
# These pycache files are created on first use of the associated python files.
# Exclude them from the glob because otherwise between the first time and second time a python toolchain is used,"
# the definition of this filegroup will change, and depending rules will get invalidated."
# See https://github.com/bazelbuild/rules_python/issues/1008 for unconditionally adding these to toolchains so we can stop ignoring them."
"**/__pycache__/*.pyc",
"**/__pycache__/*.pyo",
] or if you want to keep the read-only bit where possible on_windows = "windows" in platform
if (on_windows or is_root) and not ctx.hide_toolchain_cache_warning:
show_warning("If you experience toolchain caching issues, please read this: ...")
if not on_windows:
# Mark library as read-only as defense-in-depth mechanism if possible, to prevent the creation of dynamic files.
# Will be a no-op if the user has CAP_DAC_OVERRIDE (like root), as they can bypass file ACLs
lib_dir = "lib"
repo_utils.execute_checked(
rctx,
op = "python_repository.MakeReadOnly",
arguments = [repo_utils.which_checked(rctx, "chmod"), "-R", "ugo-w", lib_dir],
logger = logger,
)
glob_exclude = [
# These pycache files are created on first use of the associated python files.
# Exclude them from the glob because otherwise between the first time and second time a python toolchain is used,"
# the definition of this filegroup will change, and depending rules will get invalidated."
# See https://github.com/bazelbuild/rules_python/issues/1008 for unconditionally adding these to toolchains so we can stop ignoring them."
"**/__pycache__/*.pyc",
"**/__pycache__/*.pyo",
] (disclaimer: bazel still doesn't support warnings yet, but you get the idea) |
@rickeylev, I think this could also be due to the fact that in the That said, I am assuming that this is relevant only if the |
That does sound plausible. Setting the env vars to inhibit PYC creation might help for those invocations. |
Our CI fails to build Bazel, producing this error: "The current user is root, please run as non-root when using the hermetic Python interpreter. See bazelbuild/rules_python#713." The workaround was suggested at bazelbuild/rules_python#1169 (comment)
Our CI fails to build Bazel, producing this error: "The current user is root, please run as non-root when using the hermetic Python interpreter. See bazelbuild/rules_python#713." The workaround was suggested at bazelbuild/rules_python#1169 (comment) Closes #24549. PiperOrigin-RevId: 702362811 Change-Id: Ib6d4da1e09fd2b7dfd68af02bbb0eb997e8f427c
Our CI fails to build Bazel, producing this error: "The current user is root, please run as non-root when using the hermetic Python interpreter. See bazelbuild/rules_python#713." The workaround was suggested at bazelbuild/rules_python#1169 (comment) Closes #24549. PiperOrigin-RevId: 702362811 Change-Id: Ib6d4da1e09fd2b7dfd68af02bbb0eb997e8f427c Co-authored-by: Florian Weikert <[email protected]>
I came across this issue today. I was working on bzlmod upgrade of a Google project that has nothing to do with Python but happens to depend on Protobuf. Protobuf depends on rules_python and this check is enforced during the loading phase, any projects that has protobuf on its dependency graph hits this requirement - which would be a large group of Bazel users. I think it is important to change this to a warning at minimal, or flip the default to not introduce a new requirement for most Bazel users. |
I have added the The fix of this issue code-wise could be very simple, but requires users to test this in a real production environment for some time. The fix roughly goes like:
Until this is resolved, in the root module use python.override.ignore_root_user_error. If somebody wants to pick it up, feel free to submit PRs, as @rickeylev mentioned, we are in general happy to have the |
🐞 bug report
Affected Rule
The issue is caused by the rule:During the loading phase.
Is this a regression?
I don't think so.
Description
Per #713 ,
rules_python
cannot be used byroot
.CI systems such as CircleCI and BuildBuddy uses
root
user by default.Setting up non-root in those systems aren't very straightforward.
Also, it does not look like a responsibility of an ordinary user of rules_python to have to do this.
🔬 Minimal Reproduction
Example build event:
https://app.buildbuddy.io/invocation/55238174-54c3-459c-8d80-72722f2d00f9
🔥 Exception or Error
Relevant error message:
🌍 Your Environment
Operating System:
Output of
bazel version
:Rules_python version:
Anything else relevant?
The text was updated successfully, but these errors were encountered: