Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: support rust via cargo #174

Closed
wants to merge 21 commits into from
Closed
Show file tree
Hide file tree
Changes from 20 commits
Commits
Show all changes
21 commits
Select commit Hold shift + click to select a range
8b21a12
feat: support rust via cargo
softprops May 26, 2020
8bd50e0
make black reformat
softprops May 26, 2020
deeceed
install minimal rustup profile without interactions
softprops May 27, 2020
5092dc1
use os.path.join in path assertion tests to address windows paths
softprops May 27, 2020
da8cc79
address pylint ci errors
softprops May 28, 2020
e2901c1
fix reformatted list comprehensions
softprops May 28, 2020
0da7e1b
try passing rust-lld linker on windows
softprops May 28, 2020
45dc201
update rust cargo design doc. windows support was added and tested
softprops May 28, 2020
9aa694b
add test for cargo workspaces project
softprops May 28, 2020
734d658
reformat test sources
softprops May 28, 2020
9d43a74
build with musl on linux because glibc may differ on lambda
softprops Jun 1, 2020
27d49bd
add musl tools to ubuntu ci build
softprops Jun 2, 2020
0d1c9fb
fix apt-get command
softprops Jun 2, 2020
85cdb7c
update linux copy and bin paths
softprops Jun 2, 2020
65bf74e
update make test again, use the version appveyor is complaining about
softprops Jun 26, 2020
bb938db
update integration tests for rust cargo with latest aws rust runtime …
softprops Jul 1, 2020
bc91737
align TestCustomMakeWorkflow integ test assumptions with appveyor rea…
softprops Jul 2, 2020
4afe4fd
make x86_64-unknown-linux-musl a const for the rust cargo workflow
softprops Jul 10, 2020
903f7aa
add integ test for failing cargo rust build
softprops Jul 15, 2020
1f8820f
Merge branch 'develop' into rust-cargo-workflow
sriram-mv Jul 20, 2020
80ab588
Merge branch 'develop' into rust-cargo-workflow
mndeveci Feb 3, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 17 additions & 0 deletions .appveyor.yml
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,15 @@ for:
# setup make
- "choco install make"

# setup rust
- appveyor-retry appveyor DownloadFile https://win.rustup.rs/ -FileName rustup-init.exe
- rustup-init.exe -y --default-host x86_64-pc-windows-msvc --default-toolchain stable
- set PATH=%PATH%;C:\Users\appveyor\.cargo\bin
- set RUST_BACKTRACE=1
- rustup target add x86_64-unknown-linux-musl --toolchain stable
- rustc -V
- cargo -V

# Echo final Path
- "echo %PATH%"

Expand Down Expand Up @@ -103,6 +112,14 @@ for:
- sh: "sudo unzip -d /opt/gradle /tmp/gradle-*.zip"
- sh: "PATH=/opt/gradle/gradle-5.5/bin:$PATH"

# Install rust
- sh: "curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --profile minimal"
- sh: "PATH=${HOME}/.cargo/bin:$PATH"
- sh: "rustup target add x86_64-unknown-linux-musl --toolchain stable"
- sh: "sudo apt-get install -y musl-tools"
- sh: "rustc -V"
- sh: "cargo -V"

# Install black
- sh: "wget -O /tmp/black https://github.com/python/black/releases/download/19.10b0/black"
- sh: "chmod +x /tmp/black"
Expand Down
5 changes: 4 additions & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,13 @@ init:
LAMBDA_BUILDERS_DEV=1 pip install -e '.[dev]'

test:
# Run unit tests
# Run unit and functional tests
# Fail if coverage falls below 94%
LAMBDA_BUILDERS_DEV=1 pytest --cov aws_lambda_builders --cov-report term-missing --cov-fail-under 94 tests/unit tests/functional

unit-test:
LAMBDA_BUILDERS_DEV=1 pytest tests/unit

func-test:
LAMBDA_BUILDERS_DEV=1 pytest tests/functional

Expand Down
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ Lambda Builders currently contains the following workflows
* Ruby with Bundler
* Go with Dep
* Go with Mod
* Rust with Cargo

Lambda Builders is the brains behind the `sam build` command from [AWS SAM CLI](https://github.com/awslabs/aws-sam-cli)

Expand Down
1 change: 1 addition & 0 deletions aws_lambda_builders/workflows/__init__.py
Original file line number Diff line number Diff line change
Expand Up @@ -11,3 +11,4 @@
import aws_lambda_builders.workflows.java_maven
import aws_lambda_builders.workflows.dotnet_clipackage
import aws_lambda_builders.workflows.custom_make
import aws_lambda_builders.workflows.rust_cargo
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just to call it our for those less familiar. This is the architecture hook that I understood existed for the purposes of updating the workflow registry

The feedback given on twitter may have indicated that this is not the way this repo is supposed to be extended

https://twitter.com/alexwwood/status/1281413395585961984?s=19

Please advise

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@softprops I will bring this up with the team today and chat with Alex. I think there may be some kind of miss understanding going on here.

My view:
We should be enabling things like Rust through cargo, just because it is a 'provided' runtime doesn't mean we can't add a builder for it. Once we add a builder here, SAM CLI will need to be updated to 'discover' the cargo.toml file and run this builder.

What Alex might be referring to here is that this will work for sam build but not for sam build --use-container, since the build container for provided may not have what it needs to build (cargo/rust). But since rust is compiled to a binary (and assume rust can cross compile), this shouldn't block customers from building. We will probably want to add a further check on the sam build --use-container to prompt that rust/cargo cannot be built with a container.

I am going to start reviewing this and providing feedback now. I will also sync up with the team to make sure we are all on the same page going forward.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks.

Once we add a builder here, SAM CLI will need to be updated to 'discover' the cargo.toml file and run this builder.

I'm aware and planned to do that work. This seemed like the the part that needed to come first. I already familiarized myself with how the two projects work despite python not being my my strong suit :) as mentioned I had plotted out the time it would take to do both but had not factored in the review feedback latency. I didn't have a baseline to compare it too up front.

but not for sam build --use-container, since the build container for provided may not have what it needs to build (cargo/rust)

Understand able the same is true for go I think there's a built-in hook I saw for for communicating that I could leverage. That said I should note I've been maintaining the serverless plugin for rust for years and am intimately familiar with the docker option. We use lambdaci projects provided builder with rustup preinstalled. I'm really starting to favor local builds after. That experience but if you need it, I know how to make the docker option work

44 changes: 44 additions & 0 deletions aws_lambda_builders/workflows/rust_cargo/DESIGN.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
# Rust Cargo Builder

## Scope

This package enables the creation of a Lambda deployment package for Rust projects managed using the [cargo](https://doc.rust-lang.org/cargo/) build tool targeting Lambda's "provided" runtime. Rust support for the provided runtime is bundled as a compilation dependency of these projects, provided by the [lambda](https://github.com/awslabs/aws-lambda-rust-runtime) crate.

## Implementation

The general algorithm for preparing a rust executable for use on AWS Lambda
is as follows.

### Build

It builds a binary in the standard cargo target directory.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will want to make this configurable like all the other builders. When SAM CLI builds, it places all the artifacts into a .aws-sam/build directory in the project. This is so we can:

  1. keep the source clean
  2. update the template to the new location of the build code.

This is kind of baked in and not sure we want to change that behavior now. To support this, we will want to be able to build into 'sam cli's target dir' when that configuration is passed into this library.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The way this is setup for rust is not unlike other workflows. The target directory for is provided as am argument to the workflow. The section below is there the builder copies the deployable artifact while also renaming it, the provided runtime expects the entry point to be a well known executable called "bootstap". This is covered in tests


### Copy and Rename executable

It then copies the executable to the target directory renaming the executable to "bootstrap" to honor the provided runtime's [expectation on executable names](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-custom.html).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@softprops I currently have the following serverless.yml that I would like to migrate to this SAM approach:

https://github.com/brainstorm/htsget-aws/blob/master/serverless.yml#L29

Before I do, would it be possible to have both reads and variants functions deployed and not just a single bootstrap?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

replied here #174 (comment)


## Challenges

### Cross compilation

Cargo builds binaries targeting host platforms. When the host platform is not the same as the target platform it leverages a parameterized notion of a named target, typically installed and managed by [rustup](https://github.com/rust-lang/rustup). In the case of `sam` we default this target to to `x86_64-unknown-linux-musl` when the host is not linux based.

Users can simply run `rustup target add x86_64-unknown-linux-musl` if needed. It's also possible for sam to detect this when needed and do that for users by parsing the output of `rustup target list --installed` but it would be unusual for sam to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do you think this is unusual behavior? How will we communicate that customers need to do this before running build?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For rust customers this isn't exactly unusual. Rustup is the default installation tool for rust.

I would imagine possibly in a readme of sorts there's some documentation for individual runtimes. I would add the note there. I can use some guidance on the current state of customer documentation entry points.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To extend that thought there are likely two kinds of customers for any given runtime.

  1. those that know lambda but don't know the runtime's target language

  2. those that know the runtime's targeted language

That's how I would structure documentation for Sam. I just don't know where to put that documentation today beyond the design docs

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps a bit too forward looking, but let's say that AWS could (potentially?) build lambdas to be run on to of Graviton2 for the underlying lambda runner infra... I reckon that SAM should be able to retarget to those automatically? (given a specific setting on the SAM template).

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I reckon that with the new provided.al2, all references to MUSL should be removed for simplicity since x86_64-unknown-linux works fine, potentially faster and with less object size issues?

install toolchain components on a users behalf.

The challenge is not installing the cargo target. The challenge is ensuring external linker dependencies of that target are present at build time. Setting this up varies from platform to platform. And example for osx can be found [here](https://www.andrew-thorburn.com/cross-compiling-a-simple-rust-web-app/). This may warrant requiring a building inside a docker container that is linux based.

## Notes

Like the go builders, the workflow argument `options.artifact_executable_name`
interface is used to provide a handler name that resolves to an executable. This
enables sam support for cargo workspaces allowing for one rust project to have multiple lambdas. Cargo workspaces have a notion of a `package` and `bin`. A `package` can have
multiple bins but typically `packages` have a 1-to-1 relationship with a default `bin`: `main.rs`.

The following table defines handler name to package/bin semantics.

| Handler name | Package | Bin |
|--------------|---------|-----|
| foo | foo | foo |
| foo.foo | foo | foo |
| foo.bar | foo | bar |
5 changes: 5 additions & 0 deletions aws_lambda_builders/workflows/rust_cargo/__init__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
"""
Builds Rust Lambda functions using Cargo
"""

from .workflow import RustCargoWorkflow
233 changes: 233 additions & 0 deletions aws_lambda_builders/workflows/rust_cargo/actions.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,233 @@
"""
Rust Cargo build actions
"""

import os
import subprocess
import shutil
import json

from aws_lambda_builders.workflow import BuildMode
from aws_lambda_builders.actions import ActionFailedError, BaseAction, Purpose

CARGO_TARGET = "x86_64-unknown-linux-musl"


class BuilderError(Exception):
MESSAGE = "Builder Failed: {message}"

def __init__(self, **kwargs):
Exception.__init__(self, self.MESSAGE.format(**kwargs))


class OSUtils(object):
Copy link
Contributor Author

@softprops softprops May 26, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A comment from a first time contributor. These utils while helpful seem to be duplicated for just about every builder that does something with popen. Perhaps it would be useful to extract a common util so that new builders didn't need to continue the copy process.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is mostly code debt now. I can't quite remember exactly why we elected to do this in the beginning, but there was some reason. Over time, it just became 'easier' but we should extract these out. If you want to do it, I would open up a new PR for it but I wouldn't make that refactoring a requirement for this PR to get through.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks.

Over time, it just became 'easier' but we should extract these out.

The irony is it made it harder for me. I had to copy util code and in doing so had to copy the tests for that util code to uphold this projects codecov requirements.

If you want to do it, I would open up a new PR

I'd plotted out the time to set aside to get these changes worked through and estimate the time to get this integrated into the separate sam cli repo before starting this journey.

Given the review turnaround time, I don't anticipate being able to invest additional time in cleaning up this project's existing tech debt. It would be a good investment on behalf of the project maintainers though. I just wanted to capture in a note some of the experience from a first time contributor incase that was useful to project maintainers.

"""
Wrapper around file system functions, to make it easy to
unit test actions in memory
"""

def popen(self, command, stdout=None, stderr=None, env=None, cwd=None):
return subprocess.Popen(command, stdout=stdout, stderr=stderr, env=env, cwd=cwd)

def copyfile(self, source, destination):
shutil.copyfile(source, destination)

def makedirs(self, path):
if not os.path.exists(path):
os.makedirs(path)


def parse_handler(handler):
"""
Parse package and binary from handler name

If the handler contains a period, assume `package.bin_name`
otherwise assume common case where bin_name is the same as the package
"""
spec = handler.split(".", 1)
if len(spec) == 1:
return (spec[0], spec[0])
else:
return (spec[0], spec[1])


class BuildAction(BaseAction):
NAME = "CargoBuild"
DESCRIPTION = "Building the project using Cargo"
PURPOSE = Purpose.COMPILE_SOURCE

def __init__(self, source_dir, handler, binaries, platform, mode, osutils=OSUtils()):
"""
Build the a rust executable

:type source_dir: str
:param source_dir:
Path to a folder containing the source code

:type handler: str
:param handler:
Handler name in `package.bin_name` or `bin_name` format

:type binaries: dict
:param binaries:
Resolved path dependencies

:type platform: string
:param platform:
Platform builder is being run on

:type mode: str
:param mode:
Mode the build should produce

:type osutils: object
:param osutils:
Optional, External IO utils
"""
self.source_dir = source_dir
self.handler = handler
self.mode = mode
self.binaries = binaries
self.platform = platform
self.osutils = osutils

def cargo_metadata(self):
p = self.osutils.popen(
["cargo", "metadata", "--no-deps", "--format-version=1"],
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is --format-version=1 is this formatting the output or something else?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

See this doc stable rust features are often designed with retaining stability in mind. In this case the cargo metadata command provides a way to structural stable way to extract project information.

In the previous pr an external oython toml dependency was added to manually parse out a binary name from a cargo.toml file. I found the extra dependency was not needed when a stable way to access the same information was built directly into the build tool in a way that is not likely to break as cargo evolves.

stderr=subprocess.PIPE,
stdout=subprocess.PIPE,
env=os.environ.copy(),
cwd=self.source_dir,
)
out, err = p.communicate()
if p.returncode != 0:
raise BuilderError(message=err.decode("utf8").strip())
return json.loads(out)

def build_command(self, package):
cmd = [self.binaries["cargo"].binary_path, "build", "-p", package, "--target", CARGO_TARGET]
if self.mode != BuildMode.DEBUG:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we invert this to if self.mode == BuildMode.Release. That way if we introduce a new mode, we are not blanketly applying --release too it?

Unless maybe this makes sense for Rust. Does Rust build a debuggable artifact by default unless --release is added?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does Rust build a debuggable artifact by default unless --release is added?

Correct. Rust builds debug artifacts by default. The default assumes you are building something you will run locally then asks you to pass --release for a deployment optimized artifact.

Sam is the opposite you assume deployment artifact by default and debug on demand

Inverting would largely depend on Sam or some higher level construct consitently passing debug mode workflow rather than something like None.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let me know if you feel strongly about this. I'd like to try to make the implementation follow sams semantics, default to deploy unless opting into debug.

cmd.append("--release")
return cmd

def resolve_binary(self, cargo_meta):
"""
Interrogate cargo metadata to resolve a handler function

:type cargo_meta: dict
:param cargo_meta:
Build metadata emitted by cargo
"""
(package, binary) = parse_handler(self.handler)
exists = any(
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I realize this expression is kind of dense to parse but I didn't know if there was a more pythonic way of expressing this beyond a series of maps and anys

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm.. Let me think through this and parse it out. This is hard to understand in the current state.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can use the tests for this to guide your understanding.

[
kind == "bin"
for pkg in cargo_meta["packages"]
if pkg["name"] == package
for target in pkg["targets"]
if target["name"] == binary
for kind in target["kind"]
]
)
if not exists:
raise BuilderError(message="Cargo project does not contain a {handler} binary".format(handler=self.handler))

return (package, binary)

def build_env(self):
env = os.environ.copy()
if self.platform.lower() == "darwin":
# on osx we assume a musl cross compilation
# linker installed via `brew install filosottile/musl-cross/musl-cross`
# This requires the follow env vars when invoking cargo build
env.update(
{
"RUSTFLAGS": "{rust_flags} -Clinker=x86_64-linux-musl-gcc".format(
rust_flags=env.get("RUSTFLAGS", "")
),
"TARGET_CC": "x86_64-linux-musl-gcc",
"CC_x86_64_unknown_linux_musl": "x86_64-linux-musl-gcc",
}
)
if self.platform.lower() == "windows":
# on windows we assume a musl cross compilation
# linker is available via rusts embedded llvm linker "rust-lld"
# but cc is used as the default
# source: https://github.com/KodrAus/rust-cross-compile
# This requires the follow env vars when invoking cargo build
env.update(
{
"RUSTFLAGS": "{rust_flags} -Clinker=rust-lld".format(rust_flags=env.get("RUSTFLAGS", "")),
"TARGET_CC": "rust-lld",
"CC_x86_64_unknown_linux_musl": "rust-lld",
}
)
return env

def execute(self):
try:
(package, _) = self.resolve_binary(self.cargo_metadata())
p = self.osutils.popen(
self.build_command(package),
stderr=subprocess.PIPE,
stdout=subprocess.PIPE,
env=self.build_env(),
cwd=self.source_dir,
)
out, err = p.communicate()
if p.returncode != 0:
raise BuilderError(message=err.decode("utf8").strip())
return out.decode("utf8").strip()
except Exception as ex:
raise ActionFailedError(str(ex))


class CopyAndRenameAction(BaseAction):
NAME = "CopyAndRename"
DESCRIPTION = "Copy executable renaming if needed"
PURPOSE = Purpose.COPY_SOURCE

def __init__(self, source_dir, handler, artifacts_dir, platform, mode, osutils=OSUtils()):
"""
Copy and rename rust executable

:type source_dir: str
:param source_dir:
Path to a folder containing the source code

:type handler: str
:param handler:
Handler name in `package.bin_name` or `bin_name` format

:type artifacts_dir: str
:param binaries:
Path to a folder containing the deployable artifacts

:type platform: string
:param platform:
Platform builder is being run on

:type mode: str
:param mode:
Mode the build should produce

:type osutils: object
:param osutils:
Optional, External IO utils
"""
self.source_dir = source_dir
self.handler = handler
self.artifacts_dir = artifacts_dir
self.platform = platform
self.mode = mode
self.osutils = osutils

def binary_path(self):
(_, binary) = parse_handler(self.handler)
profile = "debug" if self.mode == BuildMode.DEBUG else "release"
target = os.path.join(self.source_dir, "target", CARGO_TARGET)
return os.path.join(target, profile, binary)

def execute(self):
self.osutils.makedirs(self.artifacts_dir)
self.osutils.copyfile(self.binary_path(), os.path.join(self.artifacts_dir, "bootstrap"))
37 changes: 37 additions & 0 deletions aws_lambda_builders/workflows/rust_cargo/workflow.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
"""
Rust Cargo Workflow
"""
import platform
from aws_lambda_builders.path_resolver import PathResolver
from aws_lambda_builders.workflow import BaseWorkflow, Capability
from .actions import BuildAction, CopyAndRenameAction


class RustCargoWorkflow(BaseWorkflow):

NAME = "RustCargoBuilder"

CAPABILITY = Capability(language="rust", dependency_manager="cargo", application_framework=None)

SUPPORTED_MANIFESTS = ["Cargo.toml"]

def __init__(self, source_dir, artifacts_dir, scratch_dir, manifest_path, runtime=None, mode=None, **kwargs):
super(RustCargoWorkflow, self).__init__(
source_dir, artifacts_dir, scratch_dir, manifest_path, runtime=runtime, **kwargs
)

# we utilize the handler identifier to
# select the binary to build
options = kwargs.get("options") or {}
handler = options.get("artifact_executable_name", None)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm reusing this interface used also by the go runtime to pass along a reference to a handler identifier. I didn't want to reinvent another interface

system_platform = platform.system().lower()
self.actions = [
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there any reason why we don't follow the 'scratch directory` concept the rest of the builders use?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you provide some direction? These seems like it would not provide addition benefit for rust and further complicated the workflow implementation.

The way rust handles build isolation is it's builtin notion of a target directory. The deployable components of that are copied to Sams notion of a target dir, the one provided as an argument to the workflow.

BuildAction(source_dir, handler, self.binaries, system_platform, mode),
CopyAndRenameAction(source_dir, handler, artifacts_dir, system_platform, mode),
]

def get_resolvers(self):
"""
specialized path resolver that just returns the list of executable for the runtime on the path.
"""
return [PathResolver(runtime=self.runtime, binary="cargo")]
Loading