-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: support rust via cargo #174
Changes from 20 commits
8b21a12
8bd50e0
deeceed
5092dc1
da8cc79
e2901c1
0da7e1b
45dc201
9aa694b
734d658
9d43a74
27d49bd
0d1c9fb
85cdb7c
65bf74e
bb938db
bc91737
4afe4fd
903f7aa
1f8820f
80ab588
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
# Rust Cargo Builder | ||
|
||
## Scope | ||
|
||
This package enables the creation of a Lambda deployment package for Rust projects managed using the [cargo](https://doc.rust-lang.org/cargo/) build tool targeting Lambda's "provided" runtime. Rust support for the provided runtime is bundled as a compilation dependency of these projects, provided by the [lambda](https://github.com/awslabs/aws-lambda-rust-runtime) crate. | ||
|
||
## Implementation | ||
|
||
The general algorithm for preparing a rust executable for use on AWS Lambda | ||
is as follows. | ||
|
||
### Build | ||
|
||
It builds a binary in the standard cargo target directory. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We will want to make this configurable like all the other builders. When SAM CLI builds, it places all the artifacts into a
This is kind of baked in and not sure we want to change that behavior now. To support this, we will want to be able to build into 'sam cli's target dir' when that configuration is passed into this library. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The way this is setup for rust is not unlike other workflows. The target directory for is provided as am argument to the workflow. The section below is there the builder copies the deployable artifact while also renaming it, the provided runtime expects the entry point to be a well known executable called "bootstap". This is covered in tests |
||
|
||
### Copy and Rename executable | ||
|
||
It then copies the executable to the target directory renaming the executable to "bootstrap" to honor the provided runtime's [expectation on executable names](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-custom.html). | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @softprops I currently have the following https://github.com/brainstorm/htsget-aws/blob/master/serverless.yml#L29 Before I do, would it be possible to have both There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. replied here #174 (comment) |
||
|
||
## Challenges | ||
|
||
### Cross compilation | ||
|
||
Cargo builds binaries targeting host platforms. When the host platform is not the same as the target platform it leverages a parameterized notion of a named target, typically installed and managed by [rustup](https://github.com/rust-lang/rustup). In the case of `sam` we default this target to to `x86_64-unknown-linux-musl` when the host is not linux based. | ||
|
||
Users can simply run `rustup target add x86_64-unknown-linux-musl` if needed. It's also possible for sam to detect this when needed and do that for users by parsing the output of `rustup target list --installed` but it would be unusual for sam to | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why do you think this is unusual behavior? How will we communicate that customers need to do this before running build? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. For rust customers this isn't exactly unusual. Rustup is the default installation tool for rust. I would imagine possibly in a readme of sorts there's some documentation for individual runtimes. I would add the note there. I can use some guidance on the current state of customer documentation entry points. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. To extend that thought there are likely two kinds of customers for any given runtime.
That's how I would structure documentation for Sam. I just don't know where to put that documentation today beyond the design docs There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Perhaps a bit too forward looking, but let's say that AWS could (potentially?) build lambdas to be run on to of Graviton2 for the underlying lambda runner infra... I reckon that SAM should be able to retarget to those automatically? (given a specific setting on the SAM template). There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I reckon that with the new provided.al2, all references to MUSL should be removed for simplicity since |
||
install toolchain components on a users behalf. | ||
|
||
The challenge is not installing the cargo target. The challenge is ensuring external linker dependencies of that target are present at build time. Setting this up varies from platform to platform. And example for osx can be found [here](https://www.andrew-thorburn.com/cross-compiling-a-simple-rust-web-app/). This may warrant requiring a building inside a docker container that is linux based. | ||
|
||
## Notes | ||
|
||
Like the go builders, the workflow argument `options.artifact_executable_name` | ||
interface is used to provide a handler name that resolves to an executable. This | ||
enables sam support for cargo workspaces allowing for one rust project to have multiple lambdas. Cargo workspaces have a notion of a `package` and `bin`. A `package` can have | ||
multiple bins but typically `packages` have a 1-to-1 relationship with a default `bin`: `main.rs`. | ||
|
||
The following table defines handler name to package/bin semantics. | ||
|
||
| Handler name | Package | Bin | | ||
|--------------|---------|-----| | ||
| foo | foo | foo | | ||
| foo.foo | foo | foo | | ||
| foo.bar | foo | bar | |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
""" | ||
Builds Rust Lambda functions using Cargo | ||
""" | ||
|
||
from .workflow import RustCargoWorkflow |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,233 @@ | ||
""" | ||
Rust Cargo build actions | ||
""" | ||
|
||
import os | ||
import subprocess | ||
import shutil | ||
import json | ||
|
||
from aws_lambda_builders.workflow import BuildMode | ||
from aws_lambda_builders.actions import ActionFailedError, BaseAction, Purpose | ||
|
||
CARGO_TARGET = "x86_64-unknown-linux-musl" | ||
|
||
|
||
class BuilderError(Exception): | ||
MESSAGE = "Builder Failed: {message}" | ||
|
||
def __init__(self, **kwargs): | ||
Exception.__init__(self, self.MESSAGE.format(**kwargs)) | ||
|
||
|
||
class OSUtils(object): | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. A comment from a first time contributor. These utils while helpful seem to be duplicated for just about every builder that does something with popen. Perhaps it would be useful to extract a common util so that new builders didn't need to continue the copy process. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is mostly code debt now. I can't quite remember exactly why we elected to do this in the beginning, but there was some reason. Over time, it just became 'easier' but we should extract these out. If you want to do it, I would open up a new PR for it but I wouldn't make that refactoring a requirement for this PR to get through. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Thanks.
The irony is it made it harder for me. I had to copy util code and in doing so had to copy the tests for that util code to uphold this projects codecov requirements.
I'd plotted out the time to set aside to get these changes worked through and estimate the time to get this integrated into the separate sam cli repo before starting this journey. Given the review turnaround time, I don't anticipate being able to invest additional time in cleaning up this project's existing tech debt. It would be a good investment on behalf of the project maintainers though. I just wanted to capture in a note some of the experience from a first time contributor incase that was useful to project maintainers. |
||
""" | ||
Wrapper around file system functions, to make it easy to | ||
unit test actions in memory | ||
""" | ||
|
||
def popen(self, command, stdout=None, stderr=None, env=None, cwd=None): | ||
return subprocess.Popen(command, stdout=stdout, stderr=stderr, env=env, cwd=cwd) | ||
|
||
def copyfile(self, source, destination): | ||
shutil.copyfile(source, destination) | ||
|
||
def makedirs(self, path): | ||
if not os.path.exists(path): | ||
os.makedirs(path) | ||
|
||
|
||
def parse_handler(handler): | ||
softprops marked this conversation as resolved.
Show resolved
Hide resolved
|
||
""" | ||
Parse package and binary from handler name | ||
|
||
If the handler contains a period, assume `package.bin_name` | ||
otherwise assume common case where bin_name is the same as the package | ||
""" | ||
spec = handler.split(".", 1) | ||
if len(spec) == 1: | ||
return (spec[0], spec[0]) | ||
else: | ||
return (spec[0], spec[1]) | ||
|
||
|
||
class BuildAction(BaseAction): | ||
NAME = "CargoBuild" | ||
DESCRIPTION = "Building the project using Cargo" | ||
PURPOSE = Purpose.COMPILE_SOURCE | ||
|
||
def __init__(self, source_dir, handler, binaries, platform, mode, osutils=OSUtils()): | ||
""" | ||
Build the a rust executable | ||
|
||
:type source_dir: str | ||
:param source_dir: | ||
Path to a folder containing the source code | ||
|
||
:type handler: str | ||
:param handler: | ||
Handler name in `package.bin_name` or `bin_name` format | ||
|
||
:type binaries: dict | ||
:param binaries: | ||
Resolved path dependencies | ||
|
||
:type platform: string | ||
:param platform: | ||
Platform builder is being run on | ||
|
||
:type mode: str | ||
:param mode: | ||
Mode the build should produce | ||
|
||
:type osutils: object | ||
:param osutils: | ||
Optional, External IO utils | ||
""" | ||
self.source_dir = source_dir | ||
self.handler = handler | ||
self.mode = mode | ||
self.binaries = binaries | ||
self.platform = platform | ||
self.osutils = osutils | ||
|
||
def cargo_metadata(self): | ||
p = self.osutils.popen( | ||
["cargo", "metadata", "--no-deps", "--format-version=1"], | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. What is There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. See this doc stable rust features are often designed with retaining stability in mind. In this case the In the previous pr an external oython toml dependency was added to manually parse out a binary name from a cargo.toml file. I found the extra dependency was not needed when a stable way to access the same information was built directly into the build tool in a way that is not likely to break as cargo evolves. |
||
stderr=subprocess.PIPE, | ||
stdout=subprocess.PIPE, | ||
env=os.environ.copy(), | ||
cwd=self.source_dir, | ||
) | ||
out, err = p.communicate() | ||
if p.returncode != 0: | ||
raise BuilderError(message=err.decode("utf8").strip()) | ||
return json.loads(out) | ||
|
||
def build_command(self, package): | ||
cmd = [self.binaries["cargo"].binary_path, "build", "-p", package, "--target", CARGO_TARGET] | ||
if self.mode != BuildMode.DEBUG: | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can we invert this to Unless maybe this makes sense for Rust. Does Rust build a debuggable artifact by default unless There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Correct. Rust builds debug artifacts by default. The default assumes you are building something you will run locally then asks you to pass --release for a deployment optimized artifact. Sam is the opposite you assume deployment artifact by default and debug on demand Inverting would largely depend on Sam or some higher level construct consitently passing debug mode workflow rather than something like None. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Let me know if you feel strongly about this. I'd like to try to make the implementation follow sams semantics, default to deploy unless opting into debug. |
||
cmd.append("--release") | ||
return cmd | ||
|
||
def resolve_binary(self, cargo_meta): | ||
""" | ||
Interrogate cargo metadata to resolve a handler function | ||
|
||
:type cargo_meta: dict | ||
:param cargo_meta: | ||
Build metadata emitted by cargo | ||
""" | ||
(package, binary) = parse_handler(self.handler) | ||
exists = any( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I realize this expression is kind of dense to parse but I didn't know if there was a more pythonic way of expressing this beyond a series of There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. hmm.. Let me think through this and parse it out. This is hard to understand in the current state. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. You can use the tests for this to guide your understanding. |
||
[ | ||
kind == "bin" | ||
for pkg in cargo_meta["packages"] | ||
if pkg["name"] == package | ||
for target in pkg["targets"] | ||
if target["name"] == binary | ||
for kind in target["kind"] | ||
] | ||
) | ||
if not exists: | ||
raise BuilderError(message="Cargo project does not contain a {handler} binary".format(handler=self.handler)) | ||
|
||
return (package, binary) | ||
|
||
def build_env(self): | ||
env = os.environ.copy() | ||
if self.platform.lower() == "darwin": | ||
softprops marked this conversation as resolved.
Show resolved
Hide resolved
|
||
# on osx we assume a musl cross compilation | ||
# linker installed via `brew install filosottile/musl-cross/musl-cross` | ||
# This requires the follow env vars when invoking cargo build | ||
env.update( | ||
{ | ||
"RUSTFLAGS": "{rust_flags} -Clinker=x86_64-linux-musl-gcc".format( | ||
rust_flags=env.get("RUSTFLAGS", "") | ||
), | ||
"TARGET_CC": "x86_64-linux-musl-gcc", | ||
"CC_x86_64_unknown_linux_musl": "x86_64-linux-musl-gcc", | ||
} | ||
) | ||
if self.platform.lower() == "windows": | ||
# on windows we assume a musl cross compilation | ||
# linker is available via rusts embedded llvm linker "rust-lld" | ||
# but cc is used as the default | ||
# source: https://github.com/KodrAus/rust-cross-compile | ||
# This requires the follow env vars when invoking cargo build | ||
env.update( | ||
{ | ||
"RUSTFLAGS": "{rust_flags} -Clinker=rust-lld".format(rust_flags=env.get("RUSTFLAGS", "")), | ||
"TARGET_CC": "rust-lld", | ||
"CC_x86_64_unknown_linux_musl": "rust-lld", | ||
} | ||
) | ||
return env | ||
|
||
def execute(self): | ||
try: | ||
(package, _) = self.resolve_binary(self.cargo_metadata()) | ||
p = self.osutils.popen( | ||
self.build_command(package), | ||
stderr=subprocess.PIPE, | ||
stdout=subprocess.PIPE, | ||
env=self.build_env(), | ||
cwd=self.source_dir, | ||
) | ||
out, err = p.communicate() | ||
if p.returncode != 0: | ||
raise BuilderError(message=err.decode("utf8").strip()) | ||
return out.decode("utf8").strip() | ||
except Exception as ex: | ||
raise ActionFailedError(str(ex)) | ||
|
||
|
||
class CopyAndRenameAction(BaseAction): | ||
NAME = "CopyAndRename" | ||
DESCRIPTION = "Copy executable renaming if needed" | ||
PURPOSE = Purpose.COPY_SOURCE | ||
|
||
def __init__(self, source_dir, handler, artifacts_dir, platform, mode, osutils=OSUtils()): | ||
""" | ||
Copy and rename rust executable | ||
|
||
:type source_dir: str | ||
:param source_dir: | ||
Path to a folder containing the source code | ||
|
||
:type handler: str | ||
:param handler: | ||
Handler name in `package.bin_name` or `bin_name` format | ||
|
||
:type artifacts_dir: str | ||
:param binaries: | ||
Path to a folder containing the deployable artifacts | ||
|
||
:type platform: string | ||
:param platform: | ||
Platform builder is being run on | ||
|
||
:type mode: str | ||
:param mode: | ||
Mode the build should produce | ||
|
||
:type osutils: object | ||
:param osutils: | ||
Optional, External IO utils | ||
""" | ||
self.source_dir = source_dir | ||
self.handler = handler | ||
self.artifacts_dir = artifacts_dir | ||
self.platform = platform | ||
self.mode = mode | ||
self.osutils = osutils | ||
|
||
def binary_path(self): | ||
(_, binary) = parse_handler(self.handler) | ||
profile = "debug" if self.mode == BuildMode.DEBUG else "release" | ||
target = os.path.join(self.source_dir, "target", CARGO_TARGET) | ||
return os.path.join(target, profile, binary) | ||
|
||
def execute(self): | ||
self.osutils.makedirs(self.artifacts_dir) | ||
self.osutils.copyfile(self.binary_path(), os.path.join(self.artifacts_dir, "bootstrap")) |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
""" | ||
Rust Cargo Workflow | ||
""" | ||
import platform | ||
from aws_lambda_builders.path_resolver import PathResolver | ||
from aws_lambda_builders.workflow import BaseWorkflow, Capability | ||
from .actions import BuildAction, CopyAndRenameAction | ||
|
||
|
||
class RustCargoWorkflow(BaseWorkflow): | ||
|
||
NAME = "RustCargoBuilder" | ||
|
||
CAPABILITY = Capability(language="rust", dependency_manager="cargo", application_framework=None) | ||
|
||
SUPPORTED_MANIFESTS = ["Cargo.toml"] | ||
|
||
def __init__(self, source_dir, artifacts_dir, scratch_dir, manifest_path, runtime=None, mode=None, **kwargs): | ||
super(RustCargoWorkflow, self).__init__( | ||
source_dir, artifacts_dir, scratch_dir, manifest_path, runtime=runtime, **kwargs | ||
) | ||
|
||
# we utilize the handler identifier to | ||
# select the binary to build | ||
options = kwargs.get("options") or {} | ||
handler = options.get("artifact_executable_name", None) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm reusing this interface used also by the go runtime to pass along a reference to a handler identifier. I didn't want to reinvent another interface |
||
system_platform = platform.system().lower() | ||
self.actions = [ | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is there any reason why we don't follow the 'scratch directory` concept the rest of the builders use? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Could you provide some direction? These seems like it would not provide addition benefit for rust and further complicated the workflow implementation. The way rust handles build isolation is it's builtin notion of a target directory. The deployable components of that are copied to Sams notion of a target dir, the one provided as an argument to the workflow. |
||
BuildAction(source_dir, handler, self.binaries, system_platform, mode), | ||
CopyAndRenameAction(source_dir, handler, artifacts_dir, system_platform, mode), | ||
] | ||
|
||
def get_resolvers(self): | ||
""" | ||
specialized path resolver that just returns the list of executable for the runtime on the path. | ||
""" | ||
return [PathResolver(runtime=self.runtime, binary="cargo")] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just to call it our for those less familiar. This is the architecture hook that I understood existed for the purposes of updating the workflow registry
The feedback given on twitter may have indicated that this is not the way this repo is supposed to be extended
https://twitter.com/alexwwood/status/1281413395585961984?s=19
Please advise
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@softprops I will bring this up with the team today and chat with Alex. I think there may be some kind of miss understanding going on here.
My view:
We should be enabling things like Rust through cargo, just because it is a 'provided' runtime doesn't mean we can't add a builder for it. Once we add a builder here, SAM CLI will need to be updated to 'discover' the
cargo.toml
file and run this builder.What Alex might be referring to here is that this will work for
sam build
but not forsam build --use-container
, since the build container for provided may not have what it needs to build (cargo/rust). But since rust is compiled to a binary (and assume rust can cross compile), this shouldn't block customers from building. We will probably want to add a further check on thesam build --use-container
to prompt that rust/cargo cannot be built with a container.I am going to start reviewing this and providing feedback now. I will also sync up with the team to make sure we are all on the same page going forward.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks.
I'm aware and planned to do that work. This seemed like the the part that needed to come first. I already familiarized myself with how the two projects work despite python not being my my strong suit :) as mentioned I had plotted out the time it would take to do both but had not factored in the review feedback latency. I didn't have a baseline to compare it too up front.
Understand able the same is true for go I think there's a built-in hook I saw for for communicating that I could leverage. That said I should note I've been maintaining the serverless plugin for rust for years and am intimately familiar with the docker option. We use lambdaci projects provided builder with rustup preinstalled. I'm really starting to favor local builds after. That experience but if you need it, I know how to make the docker option work