Skip to main content

cargo/core/compiler/
mod.rs

1//! # Interact with the compiler
2//!
3//! If you consider [`ops::cargo_compile::compile`] as a `rustc` driver but on
4//! Cargo side, this module is kinda the `rustc_interface` for that merits.
5//! It contains all the interaction between Cargo and the rustc compiler,
6//! from preparing the context for the entire build process, to scheduling
7//! and executing each unit of work (e.g. running `rustc`), to managing and
8//! caching the output artifact of a build.
9//!
10//! However, it hasn't yet exposed a clear definition of each phase or session,
11//! like what rustc has done. Also, no one knows if Cargo really needs that.
12//! To be pragmatic, here we list a handful of items you may want to learn:
13//!
14//! * [`BuildContext`] is a static context containing all information you need
15//!   before a build gets started.
16//! * [`BuildRunner`] is the center of the world, coordinating a running build and
17//!   collecting information from it.
18//! * [`custom_build`] is the home of build script executions and output parsing.
19//! * [`fingerprint`] not only defines but also executes a set of rules to
20//!   determine if a re-compile is needed.
21//! * [`job_queue`] is where the parallelism, job scheduling, and communication
22//!   machinery happen between Cargo and the compiler.
23//! * [`layout`] defines and manages output artifacts of a build in the filesystem.
24//! * [`unit_dependencies`] is for building a dependency graph for compilation
25//!   from a result of dependency resolution.
26//! * [`Unit`] contains sufficient information to build something, usually
27//!   turning into a compiler invocation in a later phase.
28//!
29//! [`ops::cargo_compile::compile`]: crate::ops::compile
30
31pub mod artifact;
32mod build_config;
33pub(crate) mod build_context;
34pub(crate) mod build_runner;
35mod compilation;
36mod compile_kind;
37mod crate_type;
38mod custom_build;
39pub(crate) mod fingerprint;
40pub mod future_incompat;
41pub(crate) mod job_queue;
42pub(crate) mod layout;
43mod links;
44mod locking;
45mod lto;
46mod output_depinfo;
47mod output_sbom;
48pub mod rustdoc;
49pub mod standard_lib;
50pub mod timings;
51mod unit;
52pub mod unit_dependencies;
53pub mod unit_graph;
54mod unused_deps;
55
56use std::borrow::Cow;
57use std::cell::OnceCell;
58use std::collections::{BTreeMap, HashMap, HashSet};
59use std::env;
60use std::ffi::{OsStr, OsString};
61use std::fmt::Display;
62use std::fs::{self, File};
63use std::io::{BufRead, BufWriter, Write};
64use std::ops::Range;
65use std::path::{Path, PathBuf};
66use std::sync::{Arc, LazyLock};
67
68use anyhow::{Context as _, Error};
69use cargo_platform::{Cfg, Platform};
70use cargo_util_terminal::report::{AnnotationKind, Group, Level, Renderer, Snippet};
71use itertools::Itertools;
72use regex::Regex;
73use tracing::{debug, instrument, trace};
74
75pub use self::build_config::UserIntent;
76pub use self::build_config::{BuildConfig, CompileMode, MessageFormat};
77pub use self::build_context::BuildContext;
78pub use self::build_context::DepKindSet;
79pub use self::build_context::FileFlavor;
80pub use self::build_context::FileType;
81pub use self::build_context::RustcTargetData;
82pub use self::build_context::TargetInfo;
83pub use self::build_runner::{BuildRunner, Metadata, UnitHash};
84pub use self::compilation::{Compilation, Doctest, UnitOutput};
85pub use self::compile_kind::{CompileKind, CompileKindFallback, CompileTarget};
86pub use self::crate_type::CrateType;
87pub use self::custom_build::LinkArgTarget;
88pub use self::custom_build::{BuildOutput, BuildScriptOutputs, BuildScripts, LibraryPath};
89pub(crate) use self::fingerprint::DirtyReason;
90pub use self::fingerprint::RustdocFingerprint;
91pub use self::job_queue::Freshness;
92use self::job_queue::{Job, JobQueue, JobState, Work};
93pub(crate) use self::layout::Layout;
94pub use self::lto::Lto;
95use self::output_depinfo::output_depinfo;
96use self::output_sbom::build_sbom;
97use self::unit_graph::UnitDep;
98
99use crate::core::compiler::future_incompat::FutureIncompatReport;
100use crate::core::compiler::locking::LockKey;
101use crate::core::compiler::timings::SectionTiming;
102pub use crate::core::compiler::unit::Unit;
103pub use crate::core::compiler::unit::UnitIndex;
104pub use crate::core::compiler::unit::UnitInterner;
105use crate::core::manifest::TargetSourcePath;
106use crate::core::profiles::{FramePointers, PanicStrategy, Profile, StripInner};
107use crate::core::{Feature, PackageId, Target};
108use crate::lints::get_key_value;
109use crate::util::OnceExt;
110use crate::util::errors::{CargoResult, VerboseError};
111use crate::util::interning::InternedString;
112use crate::util::machine_message::{self, Message};
113use crate::util::{add_path_args, internal, path_args};
114
115use cargo_util::{ProcessBuilder, ProcessError, paths};
116use cargo_util_schemas::manifest::TomlDebugInfo;
117use cargo_util_schemas::manifest::TomlTrimPaths;
118use cargo_util_schemas::manifest::TomlTrimPathsValue;
119use cargo_util_terminal::Verbosity;
120use rustfix::diagnostics::Applicability;
121
122const RUSTDOC_CRATE_VERSION_FLAG: &str = "--crate-version";
123
124/// A glorified callback for executing calls to rustc. Rather than calling rustc
125/// directly, we'll use an `Executor`, giving clients an opportunity to intercept
126/// the build calls.
127pub trait Executor: Send + Sync + 'static {
128    /// Called after a rustc process invocation is prepared up-front for a given
129    /// unit of work (may still be modified for runtime-known dependencies, when
130    /// the work is actually executed).
131    fn init(&self, _build_runner: &BuildRunner<'_, '_>, _unit: &Unit) {}
132
133    /// In case of an `Err`, Cargo will not continue with the build process for
134    /// this package.
135    fn exec(
136        &self,
137        cmd: &ProcessBuilder,
138        id: PackageId,
139        target: &Target,
140        mode: CompileMode,
141        on_stdout_line: &mut dyn FnMut(&str) -> CargoResult<()>,
142        on_stderr_line: &mut dyn FnMut(&str) -> CargoResult<()>,
143    ) -> CargoResult<()>;
144
145    /// Queried when queuing each unit of work. If it returns true, then the
146    /// unit will always be rebuilt, independent of whether it needs to be.
147    fn force_rebuild(&self, _unit: &Unit) -> bool {
148        false
149    }
150}
151
152/// A `DefaultExecutor` calls rustc without doing anything else. It is Cargo's
153/// default behaviour.
154#[derive(Copy, Clone)]
155pub struct DefaultExecutor;
156
157impl Executor for DefaultExecutor {
158    #[instrument(name = "rustc", skip_all, fields(package = id.name().as_str(), process = cmd.to_string()))]
159    fn exec(
160        &self,
161        cmd: &ProcessBuilder,
162        id: PackageId,
163        _target: &Target,
164        _mode: CompileMode,
165        on_stdout_line: &mut dyn FnMut(&str) -> CargoResult<()>,
166        on_stderr_line: &mut dyn FnMut(&str) -> CargoResult<()>,
167    ) -> CargoResult<()> {
168        cmd.exec_with_streaming(on_stdout_line, on_stderr_line, false)
169            .map(drop)
170    }
171}
172
173/// Builds up and enqueue a list of pending jobs onto the `job` queue.
174///
175/// Starting from the `unit`, this function recursively calls itself to build
176/// all jobs for dependencies of the `unit`. Each of these jobs represents
177/// compiling a particular package.
178///
179/// Note that **no actual work is executed as part of this**, that's all done
180/// next as part of [`JobQueue::execute`] function which will run everything
181/// in order with proper parallelism.
182#[tracing::instrument(skip(build_runner, jobs, exec))]
183fn compile<'gctx>(
184    build_runner: &mut BuildRunner<'_, 'gctx>,
185    jobs: &mut JobQueue<'gctx>,
186    unit: &Unit,
187    exec: &Arc<dyn Executor>,
188    force_rebuild: bool,
189) -> CargoResult<()> {
190    if !build_runner.compiled.insert(unit.clone()) {
191        return Ok(());
192    }
193
194    let lock = if build_runner.bcx.gctx.cli_unstable().fine_grain_locking {
195        Some(build_runner.lock_manager.lock_shared(build_runner, unit)?)
196    } else {
197        None
198    };
199
200    // If we are in `--compile-time-deps` and the given unit is not a compile time
201    // dependency, skip compiling the unit and jumps to dependencies, which still
202    // have chances to be compile time dependencies
203    if !unit.skip_non_compile_time_dep {
204        // Build up the work to be done to compile this unit, enqueuing it once
205        // we've got everything constructed.
206        fingerprint::prepare_init(build_runner, unit)?;
207
208        let job = if unit.mode.is_run_custom_build() {
209            custom_build::prepare(build_runner, unit)?
210        } else if unit.mode.is_doc_test() {
211            // We run these targets later, so this is just a no-op for now.
212            Job::new_fresh()
213        } else {
214            let force = exec.force_rebuild(unit) || force_rebuild;
215            let mut job = fingerprint::prepare_target(build_runner, unit, force)?;
216            job.before(if job.freshness().is_dirty() {
217                let work = if unit.mode.is_doc() || unit.mode.is_doc_scrape() {
218                    rustdoc(build_runner, unit)?
219                } else {
220                    rustc(build_runner, unit, exec)?
221                };
222                work.then(link_targets(build_runner, unit, false)?)
223            } else {
224                let output_options = OutputOptions::for_fresh(build_runner, unit);
225                let manifest = ManifestErrorContext::new(build_runner, unit);
226                let work = replay_output_cache(
227                    unit.pkg.package_id(),
228                    manifest,
229                    &unit.target,
230                    build_runner.files().message_cache_path(unit),
231                    output_options,
232                );
233                // Need to link targets on both the dirty and fresh.
234                work.then(link_targets(build_runner, unit, true)?)
235            });
236
237            // If -Zfine-grain-locking is enabled, we wrap the job with an upgrade to exclusive
238            // lock before starting, then downgrade to a shared lock after the job is finished.
239            if build_runner.bcx.gctx.cli_unstable().fine_grain_locking && job.freshness().is_dirty()
240            {
241                if let Some(lock) = lock {
242                    // Here we unlock the current shared lock to avoid deadlocking with other cargo
243                    // processes. Then we configure our compile job to take an exclusive lock
244                    // before starting. Once we are done compiling (including both rmeta and rlib)
245                    // we downgrade to a shared lock to allow other cargo's to read the build unit.
246                    // We will hold this shared lock for the remainder of compilation to prevent
247                    // other cargo from re-compiling while we are still using the unit.
248                    build_runner.lock_manager.unlock(&lock)?;
249                    job.before(prebuild_lock_exclusive(lock.clone()));
250                    job.after(downgrade_lock_to_shared(lock));
251                }
252            }
253
254            job
255        };
256        jobs.enqueue(build_runner, unit, job)?;
257    }
258
259    // Be sure to compile all dependencies of this target as well.
260    let deps = Vec::from(build_runner.unit_deps(unit)); // Create vec due to mutable borrow.
261    for dep in deps {
262        compile(build_runner, jobs, &dep.unit, exec, false)?;
263    }
264
265    Ok(())
266}
267
268/// Generates the warning message used when fallible doc-scrape units fail,
269/// either for rustdoc or rustc.
270fn make_failed_scrape_diagnostic(
271    build_runner: &BuildRunner<'_, '_>,
272    unit: &Unit,
273    top_line: impl Display,
274) -> String {
275    let manifest_path = unit.pkg.manifest_path();
276    let relative_manifest_path = manifest_path
277        .strip_prefix(build_runner.bcx.ws.root())
278        .unwrap_or(&manifest_path);
279
280    format!(
281        "\
282{top_line}
283    Try running with `--verbose` to see the error message.
284    If an example should not be scanned, then consider adding `doc-scrape-examples = false` to its `[[example]]` definition in {}",
285        relative_manifest_path.display()
286    )
287}
288
289/// Creates a unit of work invoking `rustc` for building the `unit`.
290fn rustc(
291    build_runner: &mut BuildRunner<'_, '_>,
292    unit: &Unit,
293    exec: &Arc<dyn Executor>,
294) -> CargoResult<Work> {
295    let mut rustc = prepare_rustc(build_runner, unit)?;
296
297    let name = unit.pkg.name();
298
299    let outputs = build_runner.outputs(unit)?;
300    let root = build_runner.files().output_dir(unit);
301
302    // Prepare the native lib state (extra `-L` and `-l` flags).
303    let build_script_outputs = Arc::clone(&build_runner.build_script_outputs);
304    let current_id = unit.pkg.package_id();
305    let manifest = ManifestErrorContext::new(build_runner, unit);
306    let build_scripts = build_runner.build_scripts.get(unit).cloned();
307
308    // If we are a binary and the package also contains a library, then we
309    // don't pass the `-l` flags.
310    let pass_l_flag = unit.target.is_lib() || !unit.pkg.targets().iter().any(|t| t.is_lib());
311
312    let dep_info_name =
313        if let Some(c_extra_filename) = build_runner.files().metadata(unit).c_extra_filename() {
314            format!("{}-{}.d", unit.target.crate_name(), c_extra_filename)
315        } else {
316            format!("{}.d", unit.target.crate_name())
317        };
318    let rustc_dep_info_loc = root.join(dep_info_name);
319    let dep_info_loc = fingerprint::dep_info_loc(build_runner, unit);
320
321    let mut output_options = OutputOptions::for_dirty(build_runner, unit);
322    let package_id = unit.pkg.package_id();
323    let target = Target::clone(&unit.target);
324    let mode = unit.mode;
325
326    exec.init(build_runner, unit);
327    let exec = exec.clone();
328
329    let root_output = build_runner.files().host_dest().map(|v| v.to_path_buf());
330    let build_dir = build_runner.bcx.ws.build_dir().into_path_unlocked();
331    let pkg_root = unit.pkg.root().to_path_buf();
332    let cwd = rustc
333        .get_cwd()
334        .unwrap_or_else(|| build_runner.bcx.gctx.cwd())
335        .to_path_buf();
336    let fingerprint_dir = build_runner.files().fingerprint_dir(unit);
337    let script_metadatas = build_runner.find_build_script_metadatas(unit);
338    let is_local = unit.is_local();
339    let artifact = unit.artifact;
340    let sbom_files = build_runner.sbom_output_files(unit)?;
341    let sbom = build_sbom(build_runner, unit)?;
342
343    let hide_diagnostics_for_scrape_unit = build_runner.bcx.unit_can_fail_for_docscraping(unit)
344        && !matches!(
345            build_runner.bcx.gctx.shell().verbosity(),
346            Verbosity::Verbose
347        );
348    let failed_scrape_diagnostic = hide_diagnostics_for_scrape_unit.then(|| {
349        // If this unit is needed for doc-scraping, then we generate a diagnostic that
350        // describes the set of reverse-dependencies that cause the unit to be needed.
351        let target_desc = unit.target.description_named();
352        let mut for_scrape_units = build_runner
353            .bcx
354            .scrape_units_have_dep_on(unit)
355            .into_iter()
356            .map(|unit| unit.target.description_named())
357            .collect::<Vec<_>>();
358        for_scrape_units.sort();
359        let for_scrape_units = for_scrape_units.join(", ");
360        make_failed_scrape_diagnostic(build_runner, unit, format_args!("failed to check {target_desc} in package `{name}` as a prerequisite for scraping examples from: {for_scrape_units}"))
361    });
362    if hide_diagnostics_for_scrape_unit {
363        output_options.show_diagnostics = false;
364    }
365    let env_config = Arc::clone(build_runner.bcx.gctx.env_config()?);
366    return Ok(Work::new(move |state| {
367        // Artifacts are in a different location than typical units,
368        // hence we must assure the crate- and target-dependent
369        // directory is present.
370        if artifact.is_true() {
371            paths::create_dir_all(&root)?;
372        }
373
374        // Only at runtime have we discovered what the extra -L and -l
375        // arguments are for native libraries, so we process those here. We
376        // also need to be sure to add any -L paths for our plugins to the
377        // dynamic library load path as a plugin's dynamic library may be
378        // located somewhere in there.
379        // Finally, if custom environment variables have been produced by
380        // previous build scripts, we include them in the rustc invocation.
381        if let Some(build_scripts) = build_scripts {
382            let script_outputs = build_script_outputs.lock().unwrap();
383            add_native_deps(
384                &mut rustc,
385                &script_outputs,
386                &build_scripts,
387                pass_l_flag,
388                &target,
389                current_id,
390                mode,
391            )?;
392            if let Some(ref root_output) = root_output {
393                add_plugin_deps(&mut rustc, &script_outputs, &build_scripts, root_output)?;
394            }
395            add_custom_flags(&mut rustc, &script_outputs, script_metadatas)?;
396        }
397
398        for output in outputs.iter() {
399            // If there is both an rmeta and rlib, rustc will prefer to use the
400            // rlib, even if it is older. Therefore, we must delete the rlib to
401            // force using the new rmeta.
402            if output.path.extension() == Some(OsStr::new("rmeta")) {
403                let dst = root.join(&output.path).with_extension("rlib");
404                if dst.exists() {
405                    paths::remove_file(&dst)?;
406                }
407            }
408
409            // Some linkers do not remove the executable, but truncate and modify it.
410            // That results in the old hard-link being modified even after renamed.
411            // We delete the old artifact here to prevent this behavior from confusing users.
412            // See rust-lang/cargo#8348.
413            if output.hardlink.is_some() && output.path.exists() {
414                _ = paths::remove_file(&output.path).map_err(|e| {
415                    tracing::debug!(
416                        "failed to delete previous output file `{:?}`: {e:?}",
417                        output.path
418                    );
419                });
420            }
421        }
422
423        state.running(&rustc);
424        let timestamp = paths::set_invocation_time(&fingerprint_dir)?;
425        for file in sbom_files {
426            tracing::debug!("writing sbom to {}", file.display());
427            let outfile = BufWriter::new(paths::create(&file)?);
428            serde_json::to_writer(outfile, &sbom)?;
429        }
430
431        let result = exec
432            .exec(
433                &rustc,
434                package_id,
435                &target,
436                mode,
437                &mut |line| on_stdout_line(state, line, package_id, &target),
438                &mut |line| {
439                    on_stderr_line(
440                        state,
441                        line,
442                        package_id,
443                        &manifest,
444                        &target,
445                        &mut output_options,
446                    )
447                },
448            )
449            .map_err(|e| {
450                if output_options.errors_seen == 0 {
451                    // If we didn't expect an error, do not require --verbose to fail.
452                    // This is intended to debug
453                    // https://github.com/rust-lang/crater/issues/733, where we are seeing
454                    // Cargo exit unsuccessfully while seeming to not show any errors.
455                    e
456                } else {
457                    verbose_if_simple_exit_code(e)
458                }
459            })
460            .with_context(|| {
461                // adapted from rustc_errors/src/lib.rs
462                let warnings = match output_options.warnings_seen {
463                    0 => String::new(),
464                    1 => "; 1 warning emitted".to_string(),
465                    count => format!("; {} warnings emitted", count),
466                };
467                let errors = match output_options.errors_seen {
468                    0 => String::new(),
469                    1 => " due to 1 previous error".to_string(),
470                    count => format!(" due to {} previous errors", count),
471                };
472                let name = descriptive_pkg_name(&name, &target, &mode);
473                format!("could not compile {name}{errors}{warnings}")
474            });
475
476        if let Err(e) = result {
477            if let Some(diagnostic) = failed_scrape_diagnostic {
478                state.warning(diagnostic);
479            }
480
481            return Err(e);
482        }
483
484        // Exec should never return with success *and* generate an error.
485        debug_assert_eq!(output_options.errors_seen, 0);
486
487        if rustc_dep_info_loc.exists() {
488            fingerprint::translate_dep_info(
489                &rustc_dep_info_loc,
490                &dep_info_loc,
491                &cwd,
492                &pkg_root,
493                &build_dir,
494                &rustc,
495                // Do not track source files in the fingerprint for registry dependencies.
496                is_local,
497                &env_config,
498            )
499            .with_context(|| {
500                internal(format!(
501                    "could not parse/generate dep info at: {}",
502                    rustc_dep_info_loc.display()
503                ))
504            })?;
505            // This mtime shift allows Cargo to detect if a source file was
506            // modified in the middle of the build.
507            paths::set_file_time_no_err(dep_info_loc, timestamp);
508        }
509
510        // This mtime shift for .rmeta is a workaround as rustc incremental build
511        // since rust-lang/rust#114669 (1.90.0) skips unnecessary rmeta generation.
512        //
513        // The situation is like this:
514        //
515        // 1. When build script execution's external dependendies
516        //    (rerun-if-changed, rerun-if-env-changed) got updated,
517        //    the execution unit reran and got a newer mtime.
518        // 2. rustc type-checked the associated crate, though with incremental
519        //    compilation, no rmeta regeneration. Its `.rmeta` stays old.
520        // 3. Run `cargo check` again. Cargo found build script execution had
521        //    a new mtime than existing crate rmeta, so re-checking the crate.
522        //    However the check is a no-op (input has no change), so stuck.
523        if mode.is_check() {
524            for output in outputs.iter() {
525                paths::set_file_time_no_err(&output.path, timestamp);
526            }
527        }
528
529        Ok(())
530    }));
531
532    // Add all relevant `-L` and `-l` flags from dependencies (now calculated and
533    // present in `state`) to the command provided.
534    fn add_native_deps(
535        rustc: &mut ProcessBuilder,
536        build_script_outputs: &BuildScriptOutputs,
537        build_scripts: &BuildScripts,
538        pass_l_flag: bool,
539        target: &Target,
540        current_id: PackageId,
541        mode: CompileMode,
542    ) -> CargoResult<()> {
543        let mut library_paths = vec![];
544
545        for key in build_scripts.to_link.iter() {
546            let output = build_script_outputs.get(key.1).ok_or_else(|| {
547                internal(format!(
548                    "couldn't find build script output for {}/{}",
549                    key.0, key.1
550                ))
551            })?;
552            library_paths.extend(output.library_paths.iter());
553        }
554
555        // NOTE: This very intentionally does not use the derived ord from LibraryPath because we need to
556        // retain relative ordering within the same type (i.e. not lexicographic). The use of a stable sort
557        // is also important here because it ensures that paths of the same type retain the same relative
558        // ordering (for an unstable sort to work here, the list would need to retain the idx of each element
559        // and then sort by that idx when the type is equivalent.
560        library_paths.sort_by_key(|p| match p {
561            LibraryPath::CargoArtifact(_) => 0,
562            LibraryPath::External(_) => 1,
563        });
564
565        for path in library_paths.iter() {
566            rustc.arg("-L").arg(path.as_ref());
567        }
568
569        for key in build_scripts.to_link.iter() {
570            let output = build_script_outputs.get(key.1).ok_or_else(|| {
571                internal(format!(
572                    "couldn't find build script output for {}/{}",
573                    key.0, key.1
574                ))
575            })?;
576
577            if key.0 == current_id {
578                if pass_l_flag {
579                    for name in output.library_links.iter() {
580                        rustc.arg("-l").arg(name);
581                    }
582                }
583            }
584
585            for (lt, arg) in &output.linker_args {
586                // There was an unintentional change where cdylibs were
587                // allowed to be passed via transitive dependencies. This
588                // clause should have been kept in the `if` block above. For
589                // now, continue allowing it for cdylib only.
590                // See https://github.com/rust-lang/cargo/issues/9562
591                if lt.applies_to(target, mode)
592                    && (key.0 == current_id || *lt == LinkArgTarget::Cdylib)
593                {
594                    rustc.arg("-C").arg(format!("link-arg={}", arg));
595                }
596            }
597        }
598        Ok(())
599    }
600}
601
602fn verbose_if_simple_exit_code(err: Error) -> Error {
603    // If a signal on unix (`code == None`) or an abnormal termination
604    // on Windows (codes like `0xC0000409`), don't hide the error details.
605    match err
606        .downcast_ref::<ProcessError>()
607        .as_ref()
608        .and_then(|perr| perr.code)
609    {
610        Some(n) if cargo_util::is_simple_exit_code(n) => VerboseError::new(err).into(),
611        _ => err,
612    }
613}
614
615fn prebuild_lock_exclusive(lock: LockKey) -> Work {
616    Work::new(move |state| {
617        state.lock_exclusive(&lock)?;
618        Ok(())
619    })
620}
621
622fn downgrade_lock_to_shared(lock: LockKey) -> Work {
623    Work::new(move |state| {
624        state.downgrade_to_shared(&lock)?;
625        Ok(())
626    })
627}
628
629/// Link the compiled target (often of form `foo-{metadata_hash}`) to the
630/// final target. This must happen during both "Fresh" and "Compile".
631fn link_targets(
632    build_runner: &mut BuildRunner<'_, '_>,
633    unit: &Unit,
634    fresh: bool,
635) -> CargoResult<Work> {
636    let bcx = build_runner.bcx;
637    let outputs = build_runner.outputs(unit)?;
638    let export_dir = build_runner.files().export_dir();
639    let package_id = unit.pkg.package_id();
640    let manifest_path = PathBuf::from(unit.pkg.manifest_path());
641    let profile = unit.profile.clone();
642    let unit_mode = unit.mode;
643    let features = unit.features.iter().map(|s| s.to_string()).collect();
644    let json_messages = bcx.build_config.emit_json();
645    let executable = build_runner.get_executable(unit)?;
646    let mut target = Target::clone(&unit.target);
647    if let TargetSourcePath::Metabuild = target.src_path() {
648        // Give it something to serialize.
649        let path = unit
650            .pkg
651            .manifest()
652            .metabuild_path(build_runner.bcx.ws.build_dir());
653        target.set_src_path(TargetSourcePath::Path(path));
654    }
655
656    Ok(Work::new(move |state| {
657        // If we're a "root crate", e.g., the target of this compilation, then we
658        // hard link our outputs out of the `deps` directory into the directory
659        // above. This means that `cargo build` will produce binaries in
660        // `target/debug` which one probably expects.
661        let mut destinations = vec![];
662        for output in outputs.iter() {
663            let src = &output.path;
664            // This may have been a `cargo rustc` command which changes the
665            // output, so the source may not actually exist.
666            if !src.exists() {
667                continue;
668            }
669            let Some(dst) = output.hardlink.as_ref() else {
670                destinations.push(src.clone());
671                continue;
672            };
673            destinations.push(dst.clone());
674            paths::link_or_copy(src, dst)?;
675            if let Some(ref path) = output.export_path {
676                let export_dir = export_dir.as_ref().unwrap();
677                paths::create_dir_all(export_dir)?;
678
679                paths::link_or_copy(src, path)?;
680            }
681        }
682
683        if json_messages {
684            let debuginfo = match profile.debuginfo.into_inner() {
685                TomlDebugInfo::None => machine_message::ArtifactDebuginfo::Int(0),
686                TomlDebugInfo::Limited => machine_message::ArtifactDebuginfo::Int(1),
687                TomlDebugInfo::Full => machine_message::ArtifactDebuginfo::Int(2),
688                TomlDebugInfo::LineDirectivesOnly => {
689                    machine_message::ArtifactDebuginfo::Named("line-directives-only")
690                }
691                TomlDebugInfo::LineTablesOnly => {
692                    machine_message::ArtifactDebuginfo::Named("line-tables-only")
693                }
694            };
695            let art_profile = machine_message::ArtifactProfile {
696                opt_level: profile.opt_level.as_str(),
697                debuginfo: Some(debuginfo),
698                debug_assertions: profile.debug_assertions,
699                overflow_checks: profile.overflow_checks,
700                test: unit_mode.is_any_test(),
701            };
702
703            let msg = machine_message::Artifact {
704                package_id: package_id.to_spec(),
705                manifest_path,
706                target: &target,
707                profile: art_profile,
708                features,
709                filenames: destinations,
710                executable,
711                fresh,
712            }
713            .to_json_string();
714            state.stdout(msg)?;
715        }
716        Ok(())
717    }))
718}
719
720// For all plugin dependencies, add their -L paths (now calculated and present
721// in `build_script_outputs`) to the dynamic library load path for the command
722// to execute.
723fn add_plugin_deps(
724    rustc: &mut ProcessBuilder,
725    build_script_outputs: &BuildScriptOutputs,
726    build_scripts: &BuildScripts,
727    root_output: &Path,
728) -> CargoResult<()> {
729    let var = paths::dylib_path_envvar();
730    let search_path = rustc.get_env(var).unwrap_or_default();
731    let mut search_path = env::split_paths(&search_path).collect::<Vec<_>>();
732    for (pkg_id, metadata) in &build_scripts.plugins {
733        let output = build_script_outputs
734            .get(*metadata)
735            .ok_or_else(|| internal(format!("couldn't find libs for plugin dep {}", pkg_id)))?;
736        search_path.append(&mut filter_dynamic_search_path(
737            output.library_paths.iter().map(AsRef::as_ref),
738            root_output,
739        ));
740    }
741    let search_path = paths::join_paths(&search_path, var)?;
742    rustc.env(var, &search_path);
743    Ok(())
744}
745
746fn get_dynamic_search_path(path: &Path) -> &Path {
747    match path.to_str().and_then(|s| s.split_once("=")) {
748        Some(("native" | "crate" | "dependency" | "framework" | "all", path)) => Path::new(path),
749        _ => path,
750    }
751}
752
753// Determine paths to add to the dynamic search path from -L entries
754//
755// Strip off prefixes like "native=" or "framework=" and filter out directories
756// **not** inside our output directory since they are likely spurious and can cause
757// clashes with system shared libraries (issue #3366).
758fn filter_dynamic_search_path<'a, I>(paths: I, root_output: &Path) -> Vec<PathBuf>
759where
760    I: Iterator<Item = &'a PathBuf>,
761{
762    let mut search_path = vec![];
763    for dir in paths {
764        let dir = get_dynamic_search_path(dir);
765        if dir.starts_with(&root_output) {
766            search_path.push(dir.to_path_buf());
767        } else {
768            debug!(
769                "Not including path {} in runtime library search path because it is \
770                 outside target root {}",
771                dir.display(),
772                root_output.display()
773            );
774        }
775    }
776    search_path
777}
778
779/// Prepares flags and environments we can compute for a `rustc` invocation
780/// before the job queue starts compiling any unit.
781///
782/// This builds a static view of the invocation. Flags depending on the
783/// completion of other units will be added later in runtime, such as flags
784/// from build scripts.
785fn prepare_rustc(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> CargoResult<ProcessBuilder> {
786    let gctx = build_runner.bcx.gctx;
787    let is_primary = build_runner.is_primary_package(unit);
788    let is_workspace = build_runner.bcx.ws.is_member(&unit.pkg);
789
790    let mut base = build_runner
791        .compilation
792        .rustc_process(unit, is_primary, is_workspace)?;
793    build_base_args(build_runner, &mut base, unit)?;
794    if unit.pkg.manifest().is_embedded() {
795        if !gctx.cli_unstable().script {
796            anyhow::bail!(
797                "parsing `{}` requires `-Zscript`",
798                unit.pkg.manifest_path().display()
799            );
800        }
801        base.arg("-Z").arg("crate-attr=feature(frontmatter)");
802        base.arg("-Z").arg("crate-attr=allow(unused_features)");
803    }
804
805    base.inherit_jobserver(&build_runner.jobserver);
806    build_deps_args(&mut base, build_runner, unit)?;
807    add_cap_lints(build_runner.bcx, unit, &mut base);
808    if let Some(args) = build_runner.bcx.extra_args_for(unit) {
809        base.args(args);
810    }
811    base.args(&unit.rustflags);
812    if gctx.cli_unstable().binary_dep_depinfo {
813        base.arg("-Z").arg("binary-dep-depinfo");
814    }
815    if build_runner.bcx.gctx.cli_unstable().checksum_freshness {
816        base.arg("-Z").arg("checksum-hash-algorithm=blake3");
817    }
818
819    if is_primary {
820        base.env("CARGO_PRIMARY_PACKAGE", "1");
821        let file_list = build_runner.sbom_output_files(unit)?;
822        if !file_list.is_empty() {
823            let file_list = std::env::join_paths(file_list)?;
824            base.env("CARGO_SBOM_PATH", file_list);
825        }
826    }
827
828    if unit.target.is_test() || unit.target.is_bench() {
829        let tmp = build_runner
830            .files()
831            .layout(unit.kind)
832            .build_dir()
833            .prepare_tmp()?;
834        base.env("CARGO_TARGET_TMPDIR", tmp.display().to_string());
835    }
836
837    if build_runner.bcx.gctx.cli_unstable().cargo_lints {
838        // Added last to reduce the risk of RUSTFLAGS or `[lints]` from interfering with
839        // `unused_dependencies` tracking
840        base.arg("--force-warn=unused_crate_dependencies");
841    }
842
843    Ok(base)
844}
845
846/// Prepares flags and environments we can compute for a `rustdoc` invocation
847/// before the job queue starts compiling any unit.
848///
849/// This builds a static view of the invocation. Flags depending on the
850/// completion of other units will be added later in runtime, such as flags
851/// from build scripts.
852fn prepare_rustdoc(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> CargoResult<ProcessBuilder> {
853    let bcx = build_runner.bcx;
854    // script_metadata is not needed here, it is only for tests.
855    let mut rustdoc = build_runner.compilation.rustdoc_process(unit, None)?;
856    if unit.pkg.manifest().is_embedded() {
857        if !bcx.gctx.cli_unstable().script {
858            anyhow::bail!(
859                "parsing `{}` requires `-Zscript`",
860                unit.pkg.manifest_path().display()
861            );
862        }
863        rustdoc.arg("-Z").arg("crate-attr=feature(frontmatter)");
864        rustdoc.arg("-Z").arg("crate-attr=allow(unused_features)");
865    }
866    rustdoc.inherit_jobserver(&build_runner.jobserver);
867    let crate_name = unit.target.crate_name();
868    rustdoc.arg("--crate-name").arg(&crate_name);
869    add_path_args(bcx.ws, unit, &mut rustdoc);
870    add_cap_lints(bcx, unit, &mut rustdoc);
871
872    unit.kind.add_target_arg(&mut rustdoc);
873
874    let doc_dir = if build_runner.bcx.build_config.intent.wants_doc_json_output() {
875        // Always use new layout for '--output-format=json'.
876        // In fix for https://github.com/rust-lang/cargo/issues/16291
877
878        build_runner.files().out_dir_new_layout(unit)
879    } else {
880        build_runner.files().output_dir(unit)
881    };
882
883    rustdoc.arg("-o").arg(&doc_dir);
884    rustdoc.args(&features_args(unit));
885    rustdoc.args(&check_cfg_args(unit));
886
887    add_error_format_and_color(build_runner, &mut rustdoc);
888    add_allow_features(build_runner, &mut rustdoc);
889
890    if build_runner.bcx.gctx.cli_unstable().rustdoc_depinfo {
891        // html-static-files is required for keeping the shared styling resources
892        // html-non-static-files is required for keeping the original rustdoc emission
893        let mut arg = if build_runner.bcx.gctx.cli_unstable().rustdoc_mergeable_info {
894            // toolchain resources are written at the end, at the same time as merging
895            OsString::from("--emit=html-non-static-files,dep-info=")
896        } else {
897            // if not using mergeable CCI, everything is written every time
898            OsString::from("--emit=html-static-files,html-non-static-files,dep-info=")
899        };
900        arg.push(rustdoc_dep_info_loc(build_runner, unit));
901        rustdoc.arg(arg);
902
903        if build_runner.bcx.gctx.cli_unstable().checksum_freshness {
904            rustdoc.arg("-Z").arg("checksum-hash-algorithm=blake3");
905        }
906
907        rustdoc.arg("-Zunstable-options");
908    } else if build_runner.bcx.gctx.cli_unstable().rustdoc_mergeable_info {
909        // toolchain resources are written at the end, at the same time as merging
910        rustdoc.arg("--emit=html-non-static-files");
911        rustdoc.arg("-Zunstable-options");
912    }
913
914    if build_runner.bcx.gctx.cli_unstable().rustdoc_mergeable_info {
915        // write out mergeable data to be imported
916        rustdoc.arg("--merge=none");
917        let mut arg = OsString::from("--parts-out-dir=");
918        // `-Zrustdoc-mergeable-info` always uses the new layout.
919        arg.push(build_runner.files().out_dir_new_layout(unit));
920        rustdoc.arg(arg);
921    }
922
923    if let Some(trim_paths) = unit.profile.trim_paths.as_ref() {
924        trim_paths_args_rustdoc(&mut rustdoc, build_runner, unit, trim_paths)?;
925    }
926
927    rustdoc.args(unit.pkg.manifest().lint_rustflags());
928
929    let metadata = build_runner.metadata_for_doc_units[unit];
930    rustdoc
931        .arg("-C")
932        .arg(format!("metadata={}", metadata.c_metadata()));
933
934    if unit.mode.is_doc_scrape() {
935        debug_assert!(build_runner.bcx.scrape_units.contains(unit));
936
937        if unit.target.is_test() {
938            rustdoc.arg("--scrape-tests");
939        }
940
941        rustdoc.arg("-Zunstable-options");
942
943        rustdoc
944            .arg("--scrape-examples-output-path")
945            .arg(scrape_output_path(build_runner, unit)?);
946
947        // Only scrape example for items from crates in the workspace, to reduce generated file size
948        for pkg in build_runner.bcx.packages.packages() {
949            let names = pkg
950                .targets()
951                .iter()
952                .map(|target| target.crate_name())
953                .collect::<HashSet<_>>();
954            for name in names {
955                rustdoc.arg("--scrape-examples-target-crate").arg(name);
956            }
957        }
958    }
959
960    if should_include_scrape_units(build_runner.bcx, unit) {
961        rustdoc.arg("-Zunstable-options");
962    }
963
964    build_deps_args(&mut rustdoc, build_runner, unit)?;
965    rustdoc::add_root_urls(build_runner, unit, &mut rustdoc)?;
966
967    rustdoc::add_output_format(build_runner, &mut rustdoc)?;
968
969    if let Some(args) = build_runner.bcx.extra_args_for(unit) {
970        rustdoc.args(args);
971    }
972    rustdoc.args(&unit.rustdocflags);
973
974    if !crate_version_flag_already_present(&rustdoc) {
975        append_crate_version_flag(unit, &mut rustdoc);
976    }
977
978    Ok(rustdoc)
979}
980
981/// Creates a unit of work invoking `rustdoc` for documenting the `unit`.
982fn rustdoc(build_runner: &mut BuildRunner<'_, '_>, unit: &Unit) -> CargoResult<Work> {
983    let mut rustdoc = prepare_rustdoc(build_runner, unit)?;
984
985    let crate_name = unit.target.crate_name();
986    let is_json_output = build_runner.bcx.build_config.intent.wants_doc_json_output();
987    let doc_dir = build_runner.files().output_dir(unit);
988    // Create the documentation directory ahead of time as rustdoc currently has
989    // a bug where concurrent invocations will race to create this directory if
990    // it doesn't already exist.
991    paths::create_dir_all(&doc_dir)?;
992
993    let target_desc = unit.target.description_named();
994    let name = unit.pkg.name();
995    let build_script_outputs = Arc::clone(&build_runner.build_script_outputs);
996    let package_id = unit.pkg.package_id();
997    let target = Target::clone(&unit.target);
998    let manifest = ManifestErrorContext::new(build_runner, unit);
999
1000    let rustdoc_dep_info_loc = rustdoc_dep_info_loc(build_runner, unit);
1001    let dep_info_loc = fingerprint::dep_info_loc(build_runner, unit);
1002    let build_dir = build_runner.bcx.ws.build_dir().into_path_unlocked();
1003    let pkg_root = unit.pkg.root().to_path_buf();
1004    let cwd = rustdoc
1005        .get_cwd()
1006        .unwrap_or_else(|| build_runner.bcx.gctx.cwd())
1007        .to_path_buf();
1008    let fingerprint_dir = build_runner.files().fingerprint_dir(unit);
1009    let is_local = unit.is_local();
1010    let env_config = Arc::clone(build_runner.bcx.gctx.env_config()?);
1011    let rustdoc_depinfo_enabled = build_runner.bcx.gctx.cli_unstable().rustdoc_depinfo;
1012
1013    let mut output_options = OutputOptions::for_dirty(build_runner, unit);
1014    let script_metadatas = build_runner.find_build_script_metadatas(unit);
1015    let scrape_outputs = if should_include_scrape_units(build_runner.bcx, unit) {
1016        Some(
1017            build_runner
1018                .bcx
1019                .scrape_units
1020                .iter()
1021                .map(|unit| {
1022                    Ok((
1023                        build_runner.files().metadata(unit).unit_id(),
1024                        scrape_output_path(build_runner, unit)?,
1025                    ))
1026                })
1027                .collect::<CargoResult<HashMap<_, _>>>()?,
1028        )
1029    } else {
1030        None
1031    };
1032
1033    let failed_scrape_units = Arc::clone(&build_runner.failed_scrape_units);
1034    let hide_diagnostics_for_scrape_unit = build_runner.bcx.unit_can_fail_for_docscraping(unit)
1035        && !matches!(
1036            build_runner.bcx.gctx.shell().verbosity(),
1037            Verbosity::Verbose
1038        );
1039    let failed_scrape_diagnostic = hide_diagnostics_for_scrape_unit.then(|| {
1040        make_failed_scrape_diagnostic(
1041            build_runner,
1042            unit,
1043            format_args!("failed to scan {target_desc} in package `{name}` for example code usage"),
1044        )
1045    });
1046    if hide_diagnostics_for_scrape_unit {
1047        output_options.show_diagnostics = false;
1048    }
1049
1050    Ok(Work::new(move |state| {
1051        add_custom_flags(
1052            &mut rustdoc,
1053            &build_script_outputs.lock().unwrap(),
1054            script_metadatas,
1055        )?;
1056
1057        // Add the output of scraped examples to the rustdoc command.
1058        // This action must happen after the unit's dependencies have finished,
1059        // because some of those deps may be Docscrape units which have failed.
1060        // So we dynamically determine which `--with-examples` flags to pass here.
1061        if let Some(scrape_outputs) = scrape_outputs {
1062            let failed_scrape_units = failed_scrape_units.lock().unwrap();
1063            for (metadata, output_path) in &scrape_outputs {
1064                if !failed_scrape_units.contains(metadata) {
1065                    rustdoc.arg("--with-examples").arg(output_path);
1066                }
1067            }
1068        }
1069
1070        if !is_json_output {
1071            let crate_dir = doc_dir.join(&crate_name);
1072            if crate_dir.exists() {
1073                // Remove output from a previous build. This ensures that stale
1074                // files for removed items are removed.
1075                debug!("removing pre-existing doc directory {:?}", crate_dir);
1076                paths::remove_dir_all(&crate_dir)?;
1077            }
1078        };
1079        state.running(&rustdoc);
1080        let timestamp = paths::set_invocation_time(&fingerprint_dir)?;
1081
1082        let result = rustdoc
1083            .exec_with_streaming(
1084                &mut |line| on_stdout_line(state, line, package_id, &target),
1085                &mut |line| {
1086                    on_stderr_line(
1087                        state,
1088                        line,
1089                        package_id,
1090                        &manifest,
1091                        &target,
1092                        &mut output_options,
1093                    )
1094                },
1095                false,
1096            )
1097            .map_err(verbose_if_simple_exit_code)
1098            .with_context(|| format!("could not document `{}`", name));
1099
1100        if let Err(e) = result {
1101            if let Some(diagnostic) = failed_scrape_diagnostic {
1102                state.warning(diagnostic);
1103            }
1104
1105            return Err(e);
1106        }
1107
1108        if rustdoc_depinfo_enabled && rustdoc_dep_info_loc.exists() {
1109            fingerprint::translate_dep_info(
1110                &rustdoc_dep_info_loc,
1111                &dep_info_loc,
1112                &cwd,
1113                &pkg_root,
1114                &build_dir,
1115                &rustdoc,
1116                // Should we track source file for doc gen?
1117                is_local,
1118                &env_config,
1119            )
1120            .with_context(|| {
1121                internal(format_args!(
1122                    "could not parse/generate dep info at: {}",
1123                    rustdoc_dep_info_loc.display()
1124                ))
1125            })?;
1126            // This mtime shift allows Cargo to detect if a source file was
1127            // modified in the middle of the build.
1128            paths::set_file_time_no_err(dep_info_loc, timestamp);
1129        }
1130
1131        Ok(())
1132    }))
1133}
1134
1135// The --crate-version flag could have already been passed in RUSTDOCFLAGS
1136// or as an extra compiler argument for rustdoc
1137fn crate_version_flag_already_present(rustdoc: &ProcessBuilder) -> bool {
1138    rustdoc.get_args().any(|flag| {
1139        flag.to_str()
1140            .map_or(false, |flag| flag.starts_with(RUSTDOC_CRATE_VERSION_FLAG))
1141    })
1142}
1143
1144fn append_crate_version_flag(unit: &Unit, rustdoc: &mut ProcessBuilder) {
1145    rustdoc
1146        .arg(RUSTDOC_CRATE_VERSION_FLAG)
1147        .arg(unit.pkg.version().to_string());
1148}
1149
1150/// Adds [`--cap-lints`] to the command to execute.
1151///
1152/// [`--cap-lints`]: https://doc.rust-lang.org/nightly/rustc/lints/levels.html#capping-lints
1153fn add_cap_lints(bcx: &BuildContext<'_, '_>, unit: &Unit, cmd: &mut ProcessBuilder) {
1154    // If this is an upstream dep we don't want warnings from, turn off all
1155    // lints.
1156    if !unit.show_warnings(bcx.gctx) {
1157        cmd.arg("--cap-lints").arg("allow");
1158
1159    // If this is an upstream dep but we *do* want warnings, make sure that they
1160    // don't fail compilation.
1161    } else if !unit.is_local() {
1162        cmd.arg("--cap-lints").arg("warn");
1163    }
1164}
1165
1166/// Forwards [`-Zallow-features`] if it is set for cargo.
1167///
1168/// [`-Zallow-features`]: https://doc.rust-lang.org/nightly/cargo/reference/unstable.html#allow-features
1169fn add_allow_features(build_runner: &BuildRunner<'_, '_>, cmd: &mut ProcessBuilder) {
1170    if let Some(allow) = &build_runner.bcx.gctx.cli_unstable().allow_features {
1171        use std::fmt::Write;
1172        let mut arg = String::from("-Zallow-features=");
1173        for f in allow {
1174            let _ = write!(&mut arg, "{f},");
1175        }
1176        cmd.arg(arg.trim_end_matches(','));
1177    }
1178}
1179
1180/// Adds [`--error-format`] to the command to execute.
1181///
1182/// Cargo always uses JSON output. This has several benefits, such as being
1183/// easier to parse, handles changing formats (for replaying cached messages),
1184/// ensures atomic output (so messages aren't interleaved), allows for
1185/// intercepting messages like rmeta artifacts, etc. rustc includes a
1186/// "rendered" field in the JSON message with the message properly formatted,
1187/// which Cargo will extract and display to the user.
1188///
1189/// [`--error-format`]: https://doc.rust-lang.org/nightly/rustc/command-line-arguments.html#--error-format-control-how-errors-are-produced
1190fn add_error_format_and_color(build_runner: &BuildRunner<'_, '_>, cmd: &mut ProcessBuilder) {
1191    let enable_timings =
1192        build_runner.bcx.gctx.cli_unstable().section_timings && build_runner.bcx.logger.is_some();
1193    if enable_timings {
1194        cmd.arg("-Zunstable-options");
1195    }
1196
1197    cmd.arg("--error-format=json");
1198
1199    let mut json = String::from("--json=diagnostic-rendered-ansi,artifacts,future-incompat");
1200    if build_runner.bcx.gctx.cli_unstable().cargo_lints {
1201        json.push_str(",unused-externs-silent");
1202    }
1203    if let MessageFormat::Short | MessageFormat::Json { short: true, .. } =
1204        build_runner.bcx.build_config.message_format
1205    {
1206        json.push_str(",diagnostic-short");
1207    } else if build_runner.bcx.gctx.shell().err_unicode()
1208        && build_runner.bcx.gctx.cli_unstable().rustc_unicode
1209    {
1210        json.push_str(",diagnostic-unicode");
1211    }
1212    if enable_timings {
1213        json.push_str(",timings");
1214    }
1215    cmd.arg(json);
1216
1217    let gctx = build_runner.bcx.gctx;
1218    if let Some(width) = gctx.shell().err_width().diagnostic_terminal_width() {
1219        cmd.arg(format!("--diagnostic-width={width}"));
1220    }
1221}
1222
1223/// Adds essential rustc flags and environment variables to the command to execute.
1224fn build_base_args(
1225    build_runner: &BuildRunner<'_, '_>,
1226    cmd: &mut ProcessBuilder,
1227    unit: &Unit,
1228) -> CargoResult<()> {
1229    assert!(!unit.mode.is_run_custom_build());
1230
1231    let bcx = build_runner.bcx;
1232    let Profile {
1233        ref opt_level,
1234        codegen_backend,
1235        codegen_units,
1236        debuginfo,
1237        debug_assertions,
1238        split_debuginfo,
1239        overflow_checks,
1240        rpath,
1241        ref panic,
1242        incremental,
1243        strip,
1244        rustflags: profile_rustflags,
1245        trim_paths,
1246        hint_mostly_unused: profile_hint_mostly_unused,
1247        frame_pointers,
1248        ..
1249    } = unit.profile.clone();
1250    let hints = unit.pkg.hints().cloned().unwrap_or_default();
1251    let test = unit.mode.is_any_test();
1252
1253    let warn = |msg: &str| {
1254        bcx.gctx.shell().warn(format!(
1255            "{}@{}: {msg}",
1256            unit.pkg.package_id().name(),
1257            unit.pkg.package_id().version()
1258        ))
1259    };
1260    let unit_capped_warn = |msg: &str| {
1261        if unit.show_warnings(bcx.gctx) {
1262            warn(msg)
1263        } else {
1264            Ok(())
1265        }
1266    };
1267
1268    cmd.arg("--crate-name").arg(&unit.target.crate_name());
1269
1270    let edition = unit.target.edition();
1271    edition.cmd_edition_arg(cmd);
1272
1273    add_path_args(bcx.ws, unit, cmd);
1274    add_error_format_and_color(build_runner, cmd);
1275    add_allow_features(build_runner, cmd);
1276
1277    let mut contains_dy_lib = false;
1278    if !test {
1279        for crate_type in &unit.target.rustc_crate_types() {
1280            cmd.arg("--crate-type").arg(crate_type.as_str());
1281            contains_dy_lib |= crate_type == &CrateType::Dylib;
1282        }
1283    }
1284
1285    if unit.mode.is_check() {
1286        cmd.arg("--emit=dep-info,metadata");
1287    } else if build_runner.bcx.gctx.cli_unstable().no_embed_metadata {
1288        // Nightly rustc supports the -Zembed-metadata=no flag, which tells it to avoid including
1289        // full metadata in rlib/dylib artifacts, to save space on disk. In this case, metadata
1290        // will only be stored in .rmeta files.
1291        // When we use this flag, we should also pass --emit=metadata to all artifacts that
1292        // contain useful metadata (rlib/dylib/proc macros), so that a .rmeta file is actually
1293        // generated. If we didn't do this, the full metadata would not get written anywhere.
1294        // However, we do not want to pass --emit=metadata to artifacts that never produce useful
1295        // metadata, such as binaries, because that would just unnecessarily create empty .rmeta
1296        // files on disk.
1297        if unit.benefits_from_no_embed_metadata() {
1298            cmd.arg("--emit=dep-info,metadata,link");
1299            cmd.args(&["-Z", "embed-metadata=no"]);
1300        } else {
1301            cmd.arg("--emit=dep-info,link");
1302        }
1303    } else {
1304        // If we don't use -Zembed-metadata=no, we emit .rmeta files only for rlib outputs.
1305        // This metadata may be used in this session for a pipelined compilation, or it may
1306        // be used in a future Cargo session as part of a pipelined compile.
1307        if !unit.requires_upstream_objects() {
1308            cmd.arg("--emit=dep-info,metadata,link");
1309        } else {
1310            cmd.arg("--emit=dep-info,link");
1311        }
1312    }
1313
1314    let prefer_dynamic = (unit.target.for_host() && !unit.target.is_custom_build())
1315        || (contains_dy_lib && !build_runner.is_primary_package(unit));
1316    if prefer_dynamic {
1317        cmd.arg("-C").arg("prefer-dynamic");
1318    }
1319
1320    if opt_level.as_str() != "0" {
1321        cmd.arg("-C").arg(&format!("opt-level={}", opt_level));
1322    }
1323
1324    if *panic != PanicStrategy::Unwind {
1325        cmd.arg("-C").arg(format!("panic={}", panic));
1326    }
1327    if *panic == PanicStrategy::ImmediateAbort {
1328        cmd.arg("-Z").arg("unstable-options");
1329    }
1330
1331    cmd.args(&lto_args(build_runner, unit));
1332
1333    if let Some(backend) = codegen_backend {
1334        cmd.arg("-Z").arg(&format!("codegen-backend={}", backend));
1335    }
1336
1337    if let Some(n) = codegen_units {
1338        cmd.arg("-C").arg(&format!("codegen-units={}", n));
1339    }
1340
1341    let debuginfo = debuginfo.into_inner();
1342    // Shorten the number of arguments if possible.
1343    if debuginfo != TomlDebugInfo::None {
1344        cmd.arg("-C").arg(format!("debuginfo={debuginfo}"));
1345        // This is generally just an optimization on build time so if we don't
1346        // pass it then it's ok. The values for the flag (off, packed, unpacked)
1347        // may be supported or not depending on the platform, so availability is
1348        // checked per-value. For example, at the time of writing this code, on
1349        // Windows the only stable valid value for split-debuginfo is "packed",
1350        // while on Linux "unpacked" is also stable.
1351        if let Some(split) = split_debuginfo {
1352            if build_runner
1353                .bcx
1354                .target_data
1355                .info(unit.kind)
1356                .supports_debuginfo_split(split)
1357            {
1358                cmd.arg("-C").arg(format!("split-debuginfo={split}"));
1359            }
1360        }
1361    }
1362
1363    if let Some(trim_paths) = trim_paths {
1364        trim_paths_args(cmd, build_runner, unit, &trim_paths)?;
1365    }
1366
1367    cmd.args(unit.pkg.manifest().lint_rustflags());
1368    cmd.args(&profile_rustflags);
1369
1370    // `-C overflow-checks` is implied by the setting of `-C debug-assertions`,
1371    // so we only need to provide `-C overflow-checks` if it differs from
1372    // the value of `-C debug-assertions` we would provide.
1373    if opt_level.as_str() != "0" {
1374        if debug_assertions {
1375            cmd.args(&["-C", "debug-assertions=on"]);
1376            if !overflow_checks {
1377                cmd.args(&["-C", "overflow-checks=off"]);
1378            }
1379        } else if overflow_checks {
1380            cmd.args(&["-C", "overflow-checks=on"]);
1381        }
1382    } else if !debug_assertions {
1383        cmd.args(&["-C", "debug-assertions=off"]);
1384        if overflow_checks {
1385            cmd.args(&["-C", "overflow-checks=on"]);
1386        }
1387    } else if !overflow_checks {
1388        cmd.args(&["-C", "overflow-checks=off"]);
1389    }
1390
1391    if test && unit.target.harness() {
1392        cmd.arg("--test");
1393
1394        // Cargo has historically never compiled `--test` binaries with
1395        // `panic=abort` because the `test` crate itself didn't support it.
1396        // Support is now upstream, however, but requires an unstable flag to be
1397        // passed when compiling the test. We require, in Cargo, an unstable
1398        // flag to pass to rustc, so register that here. Eventually this flag
1399        // will simply not be needed when the behavior is stabilized in the Rust
1400        // compiler itself.
1401        if *panic == PanicStrategy::Abort || *panic == PanicStrategy::ImmediateAbort {
1402            cmd.arg("-Z").arg("panic-abort-tests");
1403        }
1404    } else if test {
1405        cmd.arg("--cfg").arg("test");
1406    }
1407
1408    cmd.args(&features_args(unit));
1409    cmd.args(&check_cfg_args(unit));
1410
1411    let meta = build_runner.files().metadata(unit);
1412    cmd.arg("-C")
1413        .arg(&format!("metadata={}", meta.c_metadata()));
1414    if let Some(c_extra_filename) = meta.c_extra_filename() {
1415        cmd.arg("-C")
1416            .arg(&format!("extra-filename=-{c_extra_filename}"));
1417    }
1418
1419    if rpath {
1420        cmd.arg("-C").arg("rpath");
1421    }
1422
1423    cmd.arg("--out-dir")
1424        .arg(&build_runner.files().output_dir(unit));
1425
1426    unit.kind.add_target_arg(cmd);
1427
1428    add_codegen_linker(cmd, build_runner, unit, bcx.gctx.target_applies_to_host()?);
1429
1430    if incremental {
1431        add_codegen_incremental(cmd, build_runner, unit)
1432    }
1433
1434    let pkg_hint_mostly_unused = match hints.mostly_unused {
1435        None => None,
1436        Some(toml::Value::Boolean(b)) => Some(b),
1437        Some(v) => {
1438            unit_capped_warn(&format!(
1439                "ignoring unsupported value type ({}) for 'hints.mostly-unused', which expects a boolean",
1440                v.type_str()
1441            ))?;
1442            None
1443        }
1444    };
1445    if profile_hint_mostly_unused
1446        .or(pkg_hint_mostly_unused)
1447        .unwrap_or(false)
1448    {
1449        if bcx.gctx.cli_unstable().profile_hint_mostly_unused {
1450            cmd.arg("-Zhint-mostly-unused");
1451        } else {
1452            if profile_hint_mostly_unused.is_some() {
1453                // Profiles come from the top-level unit, so we don't use `unit_capped_warn` here.
1454                warn(
1455                    "ignoring 'hint-mostly-unused' profile option, pass `-Zprofile-hint-mostly-unused` to enable it",
1456                )?;
1457            } else if pkg_hint_mostly_unused.is_some() {
1458                unit_capped_warn(
1459                    "ignoring 'hints.mostly-unused', pass `-Zprofile-hint-mostly-unused` to enable it",
1460                )?;
1461            }
1462        }
1463    }
1464
1465    let strip = strip.into_inner();
1466    if strip != StripInner::None {
1467        cmd.arg("-C").arg(format!("strip={}", strip));
1468    }
1469
1470    if let Some(frame_pointers) = frame_pointers {
1471        let val = match frame_pointers {
1472            FramePointers::ForceOn => "on",
1473            FramePointers::ForceOff => "off",
1474        };
1475        cmd.arg("-C").arg(format!("force-frame-pointers={}", val));
1476    }
1477
1478    if unit.is_std {
1479        // -Zforce-unstable-if-unmarked prevents the accidental use of
1480        // unstable crates within the sysroot (such as "extern crate libc" or
1481        // any non-public crate in the sysroot).
1482        //
1483        // RUSTC_BOOTSTRAP allows unstable features on stable.
1484        cmd.arg("-Z")
1485            .arg("force-unstable-if-unmarked")
1486            .env("RUSTC_BOOTSTRAP", "1");
1487    }
1488
1489    Ok(())
1490}
1491
1492/// All active features for the unit passed as `--cfg features=<feature-name>`.
1493fn features_args(unit: &Unit) -> Vec<OsString> {
1494    let mut args = Vec::with_capacity(unit.features.len() * 2);
1495
1496    for feat in &unit.features {
1497        args.push(OsString::from("--cfg"));
1498        args.push(OsString::from(format!("feature=\"{}\"", feat)));
1499    }
1500
1501    args
1502}
1503
1504/// Like [`trim_paths_args`] but for rustdoc invocations.
1505fn trim_paths_args_rustdoc(
1506    cmd: &mut ProcessBuilder,
1507    build_runner: &BuildRunner<'_, '_>,
1508    unit: &Unit,
1509    trim_paths: &TomlTrimPaths,
1510) -> CargoResult<()> {
1511    match trim_paths {
1512        // rustdoc supports diagnostics trimming only.
1513        TomlTrimPaths::Values(values) if !values.contains(&TomlTrimPathsValue::Diagnostics) => {
1514            return Ok(());
1515        }
1516        _ => {}
1517    }
1518
1519    // feature gate was checked during manifest/config parsing.
1520    cmd.arg("-Zunstable-options");
1521
1522    // Order of `--remap-path-prefix` flags is important for `-Zbuild-std`.
1523    // We want to show `/rustc/<hash>/library/std` instead of `std-0.0.0`.
1524    cmd.arg(package_remap(build_runner, unit));
1525    cmd.arg(build_dir_remap(build_runner));
1526    cmd.arg(sysroot_remap(build_runner, unit));
1527
1528    Ok(())
1529}
1530
1531/// Generates the `--remap-path-scope` and `--remap-path-prefix` for [RFC 3127].
1532/// See also unstable feature [`-Ztrim-paths`].
1533///
1534/// [RFC 3127]: https://rust-lang.github.io/rfcs/3127-trim-paths.html
1535/// [`-Ztrim-paths`]: https://doc.rust-lang.org/nightly/cargo/reference/unstable.html#profile-trim-paths-option
1536fn trim_paths_args(
1537    cmd: &mut ProcessBuilder,
1538    build_runner: &BuildRunner<'_, '_>,
1539    unit: &Unit,
1540    trim_paths: &TomlTrimPaths,
1541) -> CargoResult<()> {
1542    if trim_paths.is_none() {
1543        return Ok(());
1544    }
1545
1546    // feature gate was checked during manifest/config parsing.
1547    cmd.arg(format!("--remap-path-scope={trim_paths}"));
1548
1549    // Order of `--remap-path-prefix` flags is important for `-Zbuild-std`.
1550    // We want to show `/rustc/<hash>/library/std` instead of `std-0.0.0`.
1551    cmd.arg(package_remap(build_runner, unit));
1552    cmd.arg(build_dir_remap(build_runner));
1553    cmd.arg(sysroot_remap(build_runner, unit));
1554
1555    Ok(())
1556}
1557
1558/// Path prefix remap rules for sysroot.
1559///
1560/// This remap logic aligns with rustc:
1561/// <https://github.com/rust-lang/rust/blob/c2ef3516/src/bootstrap/src/lib.rs#L1113-L1116>
1562fn sysroot_remap(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> OsString {
1563    let mut remap = OsString::from("--remap-path-prefix=");
1564    remap.push({
1565        // See also `detect_sysroot_src_path()`.
1566        let mut sysroot = build_runner.bcx.target_data.info(unit.kind).sysroot.clone();
1567        sysroot.push("lib");
1568        sysroot.push("rustlib");
1569        sysroot.push("src");
1570        sysroot.push("rust");
1571        sysroot
1572    });
1573    remap.push("=");
1574    remap.push("/rustc/");
1575    if let Some(commit_hash) = build_runner.bcx.rustc().commit_hash.as_ref() {
1576        remap.push(commit_hash);
1577    } else {
1578        remap.push(build_runner.bcx.rustc().version.to_string());
1579    }
1580    remap
1581}
1582
1583/// Path prefix remap rules for dependencies.
1584///
1585/// * Git dependencies: remove `~/.cargo/git/checkouts` prefix.
1586/// * Registry dependencies: remove `~/.cargo/registry/src` prefix.
1587/// * Others (e.g. path dependencies):
1588///     * relative paths to workspace root if inside the workspace directory.
1589///     * otherwise remapped to `<pkg>-<version>`.
1590fn package_remap(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> OsString {
1591    let pkg_root = unit.pkg.root();
1592    let ws_root = build_runner.bcx.ws.root();
1593    let mut remap = OsString::from("--remap-path-prefix=");
1594    let source_id = unit.pkg.package_id().source_id();
1595    if source_id.is_git() {
1596        remap.push(
1597            build_runner
1598                .bcx
1599                .gctx
1600                .git_checkouts_path()
1601                .as_path_unlocked(),
1602        );
1603        remap.push("=");
1604    } else if source_id.is_registry() {
1605        remap.push(
1606            build_runner
1607                .bcx
1608                .gctx
1609                .registry_source_path()
1610                .as_path_unlocked(),
1611        );
1612        remap.push("=");
1613    } else if pkg_root.strip_prefix(ws_root).is_ok() {
1614        remap.push(ws_root);
1615        remap.push("=."); // remap to relative rustc work dir explicitly
1616    } else {
1617        remap.push(pkg_root);
1618        remap.push("=");
1619        remap.push(unit.pkg.name());
1620        remap.push("-");
1621        remap.push(unit.pkg.version().to_string());
1622    }
1623    remap
1624}
1625
1626/// Remap all paths pointing to `build.build-dir`,
1627/// i.e., `[BUILD_DIR]/debug/deps/foo-[HASH].dwo` would be remapped to
1628/// `/cargo/build-dir/debug/deps/foo-[HASH].dwo`
1629/// (note the `/cargo/build-dir` prefix).
1630///
1631/// This covers scenarios like:
1632///
1633/// * Build script generated code. For example, a build script may call `file!`
1634///   macros, and the associated crate uses [`include!`] to include the expanded
1635///   [`file!`] macro in-place via the `OUT_DIR` environment.
1636/// * On Linux, `DW_AT_GNU_dwo_name` that contains paths to split debuginfo
1637///   files (dwp and dwo).
1638fn build_dir_remap(build_runner: &BuildRunner<'_, '_>) -> OsString {
1639    let build_dir = build_runner.bcx.ws.build_dir();
1640    let mut remap = OsString::from("--remap-path-prefix=");
1641    remap.push(build_dir.as_path_unlocked());
1642    remap.push("=/cargo/build-dir");
1643    remap
1644}
1645
1646/// Generates the `--check-cfg` arguments for the `unit`.
1647fn check_cfg_args(unit: &Unit) -> Vec<OsString> {
1648    // The routine below generates the --check-cfg arguments. Our goals here are to
1649    // enable the checking of conditionals and pass the list of declared features.
1650    //
1651    // In the simplified case, it would resemble something like this:
1652    //
1653    //   --check-cfg=cfg() --check-cfg=cfg(feature, values(...))
1654    //
1655    // but having `cfg()` is redundant with the second argument (as well-known names
1656    // and values are implicitly enabled when one or more `--check-cfg` argument is
1657    // passed) so we don't emit it and just pass:
1658    //
1659    //   --check-cfg=cfg(feature, values(...))
1660    //
1661    // This way, even if there are no declared features, the config `feature` will
1662    // still be expected, meaning users would get "unexpected value" instead of name.
1663    // This wasn't always the case, see rust-lang#119930 for some details.
1664
1665    let gross_cap_estimation = unit.pkg.summary().features().len() * 7 + 25;
1666    let mut arg_feature = OsString::with_capacity(gross_cap_estimation);
1667
1668    arg_feature.push("cfg(feature, values(");
1669    for (i, feature) in unit.pkg.summary().features().keys().enumerate() {
1670        if i != 0 {
1671            arg_feature.push(", ");
1672        }
1673        arg_feature.push("\"");
1674        arg_feature.push(feature);
1675        arg_feature.push("\"");
1676    }
1677    arg_feature.push("))");
1678
1679    // In addition to the package features, we also include the `test` cfg (since
1680    // compiler-team#785, as to be able to someday apply it conditionally), as well
1681    // the `docsrs` cfg from the docs.rs service.
1682    //
1683    // We include `docsrs` here (in Cargo) instead of rustc, since there is a much closer
1684    // relationship between Cargo and docs.rs than rustc and docs.rs. In particular, all
1685    // users of docs.rs use Cargo, but not all users of rustc (like Rust-for-Linux) use docs.rs.
1686
1687    vec![
1688        OsString::from("--check-cfg"),
1689        OsString::from("cfg(docsrs,test)"),
1690        OsString::from("--check-cfg"),
1691        arg_feature,
1692    ]
1693}
1694
1695/// Adds LTO related codegen flags.
1696fn lto_args(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> Vec<OsString> {
1697    let mut result = Vec::new();
1698    let mut push = |arg: &str| {
1699        result.push(OsString::from("-C"));
1700        result.push(OsString::from(arg));
1701    };
1702    match build_runner.lto[unit] {
1703        lto::Lto::Run(None) => push("lto"),
1704        lto::Lto::Run(Some(s)) => push(&format!("lto={}", s)),
1705        lto::Lto::Off => {
1706            push("lto=off");
1707            push("embed-bitcode=no");
1708        }
1709        lto::Lto::ObjectAndBitcode => {} // this is rustc's default
1710        lto::Lto::OnlyBitcode => push("linker-plugin-lto"),
1711        lto::Lto::OnlyObject => push("embed-bitcode=no"),
1712    }
1713    result
1714}
1715
1716/// Adds dependency-relevant rustc flags and environment variables
1717/// to the command to execute, such as [`-L`] and [`--extern`].
1718///
1719/// [`-L`]: https://doc.rust-lang.org/nightly/rustc/command-line-arguments.html#-l-add-a-directory-to-the-library-search-path
1720/// [`--extern`]: https://doc.rust-lang.org/nightly/rustc/command-line-arguments.html#--extern-specify-where-an-external-library-is-located
1721fn build_deps_args(
1722    cmd: &mut ProcessBuilder,
1723    build_runner: &BuildRunner<'_, '_>,
1724    unit: &Unit,
1725) -> CargoResult<()> {
1726    let bcx = build_runner.bcx;
1727
1728    for arg in lib_search_paths(build_runner, unit)? {
1729        cmd.arg(arg);
1730    }
1731
1732    let deps = build_runner.unit_deps(unit);
1733
1734    // If there is not one linkable target but should, rustc fails later
1735    // on if there is an `extern crate` for it. This may turn into a hard
1736    // error in the future (see PR #4797).
1737    if !deps
1738        .iter()
1739        .any(|dep| !dep.unit.mode.is_doc() && dep.unit.target.is_linkable())
1740    {
1741        if let Some(dep) = deps.iter().find(|dep| {
1742            !dep.unit.mode.is_doc() && dep.unit.target.is_lib() && !dep.unit.artifact.is_true()
1743        }) {
1744            let dep_name = dep.unit.target.crate_name();
1745            let name = unit.target.crate_name();
1746            bcx.gctx.shell().print_report(&[
1747                Level::WARNING.secondary_title(format!("the package `{dep_name}` provides no linkable target"))
1748                    .elements([
1749                        Level::NOTE.message(format!("this might cause `{name}` to fail compilation")),
1750                        Level::NOTE.message("this warning might turn into a hard error in the future"),
1751                        Level::HELP.message(format!("consider adding 'dylib' or 'rlib' to key 'crate-type' in `{dep_name}`'s Cargo.toml"))
1752                    ])
1753            ], false)?;
1754        }
1755    }
1756
1757    let mut unstable_opts = false;
1758
1759    // Add `OUT_DIR` environment variables for build scripts
1760    let first_custom_build_dep = deps.iter().find(|dep| dep.unit.mode.is_run_custom_build());
1761    if let Some(dep) = first_custom_build_dep {
1762        let out_dir = if bcx.gctx.cli_unstable().build_dir_new_layout {
1763            build_runner.files().out_dir_new_layout(&dep.unit)
1764        } else {
1765            build_runner.files().build_script_out_dir(&dep.unit)
1766        };
1767        cmd.env("OUT_DIR", &out_dir);
1768    }
1769
1770    // Adding output directory for each build script
1771    let is_multiple_build_scripts_enabled = unit
1772        .pkg
1773        .manifest()
1774        .unstable_features()
1775        .require(Feature::multiple_build_scripts())
1776        .is_ok();
1777
1778    if is_multiple_build_scripts_enabled {
1779        for dep in deps {
1780            if dep.unit.mode.is_run_custom_build() {
1781                let out_dir = if bcx.gctx.cli_unstable().build_dir_new_layout {
1782                    build_runner.files().out_dir_new_layout(&dep.unit)
1783                } else {
1784                    build_runner.files().build_script_out_dir(&dep.unit)
1785                };
1786                let target_name = dep.unit.target.name();
1787                let out_dir_prefix = target_name
1788                    .strip_prefix("build-script-")
1789                    .unwrap_or(target_name);
1790                let out_dir_name = format!("{out_dir_prefix}_OUT_DIR");
1791                cmd.env(&out_dir_name, &out_dir);
1792            }
1793        }
1794    }
1795    for arg in extern_args(build_runner, unit, &mut unstable_opts)? {
1796        cmd.arg(arg);
1797    }
1798
1799    for (var, env) in artifact::get_env(build_runner, unit, deps)? {
1800        cmd.env(&var, env);
1801    }
1802
1803    // This will only be set if we're already using a feature
1804    // requiring nightly rust
1805    if unstable_opts {
1806        cmd.arg("-Z").arg("unstable-options");
1807    }
1808
1809    Ok(())
1810}
1811
1812fn add_dep_arg<'a, 'b: 'a>(
1813    map: &mut BTreeMap<&'a Unit, PathBuf>,
1814    build_runner: &'b BuildRunner<'b, '_>,
1815    unit: &'a Unit,
1816) {
1817    if map.contains_key(&unit) {
1818        return;
1819    }
1820    map.insert(&unit, build_runner.files().deps_dir(&unit));
1821
1822    for dep in build_runner.unit_deps(unit) {
1823        add_dep_arg(map, build_runner, &dep.unit);
1824    }
1825}
1826
1827/// Adds extra rustc flags and environment variables collected from the output
1828/// of a build-script to the command to execute, include custom environment
1829/// variables and `cfg`.
1830fn add_custom_flags(
1831    cmd: &mut ProcessBuilder,
1832    build_script_outputs: &BuildScriptOutputs,
1833    metadata_vec: Option<Vec<UnitHash>>,
1834) -> CargoResult<()> {
1835    if let Some(metadata_vec) = metadata_vec {
1836        for metadata in metadata_vec {
1837            if let Some(output) = build_script_outputs.get(metadata) {
1838                for cfg in output.cfgs.iter() {
1839                    cmd.arg("--cfg").arg(cfg);
1840                }
1841                for check_cfg in &output.check_cfgs {
1842                    cmd.arg("--check-cfg").arg(check_cfg);
1843                }
1844                for (name, value) in output.env.iter() {
1845                    cmd.env(name, value);
1846                }
1847            }
1848        }
1849    }
1850
1851    Ok(())
1852}
1853
1854/// Generate a list of `-L` arguments
1855pub fn lib_search_paths(
1856    build_runner: &BuildRunner<'_, '_>,
1857    unit: &Unit,
1858) -> CargoResult<Vec<OsString>> {
1859    let mut lib_search_paths = Vec::new();
1860    if build_runner.bcx.gctx.cli_unstable().build_dir_new_layout {
1861        let mut map = BTreeMap::new();
1862
1863        // Recursively add all dependency args to rustc process
1864        add_dep_arg(&mut map, build_runner, unit);
1865
1866        let paths = map.into_iter().map(|(_, path)| path).sorted_unstable();
1867
1868        for path in paths {
1869            let mut deps = OsString::from("dependency=");
1870            deps.push(path);
1871            lib_search_paths.extend(["-L".into(), deps]);
1872        }
1873    } else {
1874        let mut deps = OsString::from("dependency=");
1875        deps.push(build_runner.files().deps_dir(unit));
1876        lib_search_paths.extend(["-L".into(), deps]);
1877    }
1878
1879    // Be sure that the host path is also listed. This'll ensure that proc macro
1880    // dependencies are correctly found (for reexported macros).
1881    if !unit.kind.is_host() {
1882        let mut deps = OsString::from("dependency=");
1883        deps.push(build_runner.files().host_deps(unit));
1884        lib_search_paths.extend(["-L".into(), deps]);
1885    }
1886
1887    Ok(lib_search_paths)
1888}
1889
1890/// Generates a list of `--extern` arguments.
1891pub fn extern_args(
1892    build_runner: &BuildRunner<'_, '_>,
1893    unit: &Unit,
1894    unstable_opts: &mut bool,
1895) -> CargoResult<Vec<OsString>> {
1896    let mut result = Vec::new();
1897    let deps = build_runner.unit_deps(unit);
1898
1899    let no_embed_metadata = build_runner.bcx.gctx.cli_unstable().no_embed_metadata;
1900
1901    // Closure to add one dependency to `result`.
1902    let mut link_to = |dep: &UnitDep,
1903                       extern_crate_name: InternedString,
1904                       noprelude: bool,
1905                       nounused: bool|
1906     -> CargoResult<()> {
1907        let mut value = OsString::new();
1908        let mut opts = Vec::new();
1909        let is_public_dependency_enabled = unit
1910            .pkg
1911            .manifest()
1912            .unstable_features()
1913            .require(Feature::public_dependency())
1914            .is_ok()
1915            || build_runner.bcx.gctx.cli_unstable().public_dependency;
1916        if !dep.public && unit.target.is_lib() && is_public_dependency_enabled {
1917            opts.push("priv");
1918            *unstable_opts = true;
1919        }
1920        if noprelude {
1921            opts.push("noprelude");
1922            *unstable_opts = true;
1923        }
1924        if nounused {
1925            opts.push("nounused");
1926            *unstable_opts = true;
1927        }
1928        if !opts.is_empty() {
1929            value.push(opts.join(","));
1930            value.push(":");
1931        }
1932        value.push(extern_crate_name.as_str());
1933        value.push("=");
1934
1935        let mut pass = |file| {
1936            let mut value = value.clone();
1937            value.push(file);
1938            result.push(OsString::from("--extern"));
1939            result.push(value);
1940        };
1941
1942        let outputs = build_runner.outputs(&dep.unit)?;
1943
1944        if build_runner.only_requires_rmeta(unit, &dep.unit) || dep.unit.mode.is_check() {
1945            // Example: rlib dependency for an rlib, rmeta is all that is required.
1946            let output = outputs
1947                .iter()
1948                .find(|output| output.flavor == FileFlavor::Rmeta)
1949                .expect("failed to find rmeta dep for pipelined dep");
1950            pass(&output.path);
1951        } else {
1952            // Example: a bin needs `rlib` for dependencies, it cannot use rmeta.
1953            for output in outputs.iter() {
1954                if output.flavor == FileFlavor::Linkable {
1955                    pass(&output.path);
1956                }
1957                // If we use -Zembed-metadata=no, we also need to pass the path to the
1958                // corresponding .rmeta file to the linkable artifact, because the
1959                // normal dependency (rlib) doesn't contain the full metadata.
1960                else if no_embed_metadata && output.flavor == FileFlavor::Rmeta {
1961                    pass(&output.path);
1962                }
1963            }
1964        }
1965        Ok(())
1966    };
1967
1968    for dep in deps {
1969        if dep.unit.target.is_linkable() && !dep.unit.mode.is_doc() {
1970            link_to(dep, dep.extern_crate_name, dep.noprelude, dep.nounused)?;
1971        }
1972    }
1973    if unit.target.proc_macro() {
1974        // Automatically import `proc_macro`.
1975        result.push(OsString::from("--extern"));
1976        result.push(OsString::from("proc_macro"));
1977    }
1978
1979    Ok(result)
1980}
1981
1982/// Adds `-C linker=<path>` if specified.
1983fn add_codegen_linker(
1984    cmd: &mut ProcessBuilder,
1985    build_runner: &BuildRunner<'_, '_>,
1986    unit: &Unit,
1987    target_applies_to_host: bool,
1988) {
1989    let linker = if unit.target.for_host() && !target_applies_to_host {
1990        build_runner
1991            .compilation
1992            .host_linker()
1993            .map(|s| s.as_os_str())
1994    } else {
1995        build_runner
1996            .compilation
1997            .target_linker(unit.kind)
1998            .map(|s| s.as_os_str())
1999    };
2000
2001    if let Some(linker) = linker {
2002        let mut arg = OsString::from("linker=");
2003        arg.push(linker);
2004        cmd.arg("-C").arg(arg);
2005    }
2006}
2007
2008/// Adds `-C incremental=<path>`.
2009fn add_codegen_incremental(
2010    cmd: &mut ProcessBuilder,
2011    build_runner: &BuildRunner<'_, '_>,
2012    unit: &Unit,
2013) {
2014    let dir = build_runner.files().incremental_dir(&unit);
2015    let mut arg = OsString::from("incremental=");
2016    arg.push(dir.as_os_str());
2017    cmd.arg("-C").arg(arg);
2018}
2019
2020fn envify(s: &str) -> String {
2021    s.chars()
2022        .flat_map(|c| c.to_uppercase())
2023        .map(|c| if c == '-' { '_' } else { c })
2024        .collect()
2025}
2026
2027/// Configuration of the display of messages emitted by the compiler,
2028/// e.g. diagnostics, warnings, errors, and message caching.
2029struct OutputOptions {
2030    /// What format we're emitting from Cargo itself.
2031    format: MessageFormat,
2032    /// Where to write the JSON messages to support playback later if the unit
2033    /// is fresh. The file is created lazily so that in the normal case, lots
2034    /// of empty files are not created. If this is None, the output will not
2035    /// be cached (such as when replaying cached messages).
2036    cache_cell: Option<(PathBuf, OnceCell<File>)>,
2037    /// If `true`, display any diagnostics.
2038    /// Other types of JSON messages are processed regardless
2039    /// of the value of this flag.
2040    ///
2041    /// This is used primarily for cache replay. If you build with `-vv`, the
2042    /// cache will be filled with diagnostics from dependencies. When the
2043    /// cache is replayed without `-vv`, we don't want to show them.
2044    show_diagnostics: bool,
2045    /// Tracks the number of warnings we've seen so far.
2046    warnings_seen: usize,
2047    /// Tracks the number of errors we've seen so far.
2048    errors_seen: usize,
2049}
2050
2051impl OutputOptions {
2052    fn for_dirty(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> OutputOptions {
2053        let path = build_runner.files().message_cache_path(unit);
2054        // Remove old cache, ignore ENOENT, which is the common case.
2055        drop(fs::remove_file(&path));
2056        let cache_cell = Some((path, OnceCell::new()));
2057
2058        let show_diagnostics = true;
2059
2060        let format = build_runner.bcx.build_config.message_format;
2061
2062        OutputOptions {
2063            format,
2064            cache_cell,
2065            show_diagnostics,
2066            warnings_seen: 0,
2067            errors_seen: 0,
2068        }
2069    }
2070
2071    fn for_fresh(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> OutputOptions {
2072        let cache_cell = None;
2073
2074        // We always replay the output cache,
2075        // since it might contain future-incompat-report messages
2076        let show_diagnostics = unit.show_warnings(build_runner.bcx.gctx);
2077
2078        let format = build_runner.bcx.build_config.message_format;
2079
2080        OutputOptions {
2081            format,
2082            cache_cell,
2083            show_diagnostics,
2084            warnings_seen: 0,
2085            errors_seen: 0,
2086        }
2087    }
2088}
2089
2090/// Cloned and sendable context about the manifest file.
2091///
2092/// Sometimes we enrich rustc's errors with some locations in the manifest file; this
2093/// contains a `Send`-able copy of the manifest information that we need for the
2094/// enriched errors.
2095struct ManifestErrorContext {
2096    /// The path to the manifest.
2097    path: PathBuf,
2098    /// The locations of various spans within the manifest.
2099    spans: Option<toml::Spanned<toml::de::DeTable<'static>>>,
2100    /// The raw manifest contents.
2101    contents: Option<String>,
2102    /// A lookup for all the unambiguous renamings, mapping from the original package
2103    /// name to the renamed one.
2104    rename_table: HashMap<InternedString, InternedString>,
2105    /// A list of targets we're compiling for, to determine which of the `[target.<something>.dependencies]`
2106    /// tables might be of interest.
2107    requested_kinds: Vec<CompileKind>,
2108    /// A list of all the collections of cfg values, one collection for each target, to determine
2109    /// which of the `[target.'cfg(...)'.dependencies]` tables might be of interest.
2110    cfgs: Vec<Vec<Cfg>>,
2111    host_name: InternedString,
2112    /// Cargo's working directory (for printing out a more friendly manifest path).
2113    cwd: PathBuf,
2114    /// Terminal width for formatting diagnostics.
2115    term_width: usize,
2116}
2117
2118fn on_stdout_line(
2119    state: &JobState<'_, '_>,
2120    line: &str,
2121    _package_id: PackageId,
2122    _target: &Target,
2123) -> CargoResult<()> {
2124    state.stdout(line.to_string())?;
2125    Ok(())
2126}
2127
2128fn on_stderr_line(
2129    state: &JobState<'_, '_>,
2130    line: &str,
2131    package_id: PackageId,
2132    manifest: &ManifestErrorContext,
2133    target: &Target,
2134    options: &mut OutputOptions,
2135) -> CargoResult<()> {
2136    if on_stderr_line_inner(state, line, package_id, manifest, target, options)? {
2137        // Check if caching is enabled.
2138        if let Some((path, cell)) = &mut options.cache_cell {
2139            // Cache the output, which will be replayed later when Fresh.
2140            let f = cell.try_borrow_mut_with(|| paths::create(path))?;
2141            debug_assert!(!line.contains('\n'));
2142            f.write_all(line.as_bytes())?;
2143            f.write_all(&[b'\n'])?;
2144        }
2145    }
2146    Ok(())
2147}
2148
2149/// Returns true if the line should be cached.
2150fn on_stderr_line_inner(
2151    state: &JobState<'_, '_>,
2152    line: &str,
2153    package_id: PackageId,
2154    manifest: &ManifestErrorContext,
2155    target: &Target,
2156    options: &mut OutputOptions,
2157) -> CargoResult<bool> {
2158    // We primarily want to use this function to process JSON messages from
2159    // rustc. The compiler should always print one JSON message per line, and
2160    // otherwise it may have other output intermingled (think RUST_LOG or
2161    // something like that), so skip over everything that doesn't look like a
2162    // JSON message.
2163    if !line.starts_with('{') {
2164        state.stderr(line.to_string())?;
2165        return Ok(true);
2166    }
2167
2168    let mut compiler_message: Box<serde_json::value::RawValue> = match serde_json::from_str(line) {
2169        Ok(msg) => msg,
2170
2171        // If the compiler produced a line that started with `{` but it wasn't
2172        // valid JSON, maybe it wasn't JSON in the first place! Forward it along
2173        // to stderr.
2174        Err(e) => {
2175            debug!("failed to parse json: {:?}", e);
2176            state.stderr(line.to_string())?;
2177            return Ok(true);
2178        }
2179    };
2180
2181    let count_diagnostic = |level, options: &mut OutputOptions| {
2182        if level == "warning" {
2183            options.warnings_seen += 1;
2184        } else if level == "error" {
2185            options.errors_seen += 1;
2186        }
2187    };
2188
2189    if let Ok(report) = serde_json::from_str::<FutureIncompatReport>(compiler_message.get()) {
2190        for item in &report.future_incompat_report {
2191            count_diagnostic(&*item.diagnostic.level, options);
2192        }
2193        state.future_incompat_report(report.future_incompat_report);
2194        return Ok(true);
2195    }
2196
2197    let res = serde_json::from_str::<SectionTiming>(compiler_message.get());
2198    if let Ok(timing_record) = res {
2199        state.on_section_timing_emitted(timing_record);
2200        return Ok(false);
2201    }
2202
2203    // Returns `true` if the diagnostic was modified.
2204    let add_pub_in_priv_diagnostic = |diag: &mut String| -> bool {
2205        // We are parsing the compiler diagnostic here, as this information isn't
2206        // currently exposed elsewhere.
2207        // At the time of writing this comment, rustc emits two different
2208        // "exported_private_dependencies" errors:
2209        //  - type `FromPriv` from private dependency 'priv_dep' in public interface
2210        //  - struct `FromPriv` from private dependency 'priv_dep' is re-exported
2211        // This regex matches them both. To see if it needs to be updated, grep the rust
2212        // source for "EXPORTED_PRIVATE_DEPENDENCIES".
2213        static PRIV_DEP_REGEX: LazyLock<Regex> =
2214            LazyLock::new(|| Regex::new("from private dependency '([A-Za-z0-9-_]+)'").unwrap());
2215        if let Some(crate_name) = PRIV_DEP_REGEX.captures(diag).and_then(|m| m.get(1))
2216            && let Some(ref contents) = manifest.contents
2217            && let Some(span) = manifest.find_crate_span(crate_name.as_str())
2218        {
2219            let rel_path = pathdiff::diff_paths(&manifest.path, &manifest.cwd)
2220                .unwrap_or_else(|| manifest.path.clone())
2221                .display()
2222                .to_string();
2223            let report = [Group::with_title(Level::NOTE.secondary_title(format!(
2224                "dependency `{}` declared here",
2225                crate_name.as_str()
2226            )))
2227            .element(
2228                Snippet::source(contents)
2229                    .path(rel_path)
2230                    .annotation(AnnotationKind::Context.span(span)),
2231            )];
2232
2233            let rendered = Renderer::styled()
2234                .term_width(manifest.term_width)
2235                .render(&report);
2236            diag.push_str(&rendered);
2237            diag.push('\n');
2238            return true;
2239        }
2240        false
2241    };
2242
2243    // Depending on what we're emitting from Cargo itself, we figure out what to
2244    // do with this JSON message.
2245    match options.format {
2246        // In the "human" output formats (human/short) or if diagnostic messages
2247        // from rustc aren't being included in the output of Cargo's JSON
2248        // messages then we extract the diagnostic (if present) here and handle
2249        // it ourselves.
2250        MessageFormat::Human
2251        | MessageFormat::Short
2252        | MessageFormat::Json {
2253            render_diagnostics: true,
2254            ..
2255        } => {
2256            #[derive(serde::Deserialize)]
2257            struct CompilerMessage<'a> {
2258                // `rendered` contains escape sequences, which can't be
2259                // zero-copy deserialized by serde_json.
2260                // See https://github.com/serde-rs/json/issues/742
2261                rendered: String,
2262                #[serde(borrow)]
2263                message: Cow<'a, str>,
2264                #[serde(borrow)]
2265                level: Cow<'a, str>,
2266                children: Vec<PartialDiagnostic>,
2267                code: Option<DiagnosticCode>,
2268            }
2269
2270            // A partial rustfix::diagnostics::Diagnostic. We deserialize only a
2271            // subset of the fields because rustc's output can be extremely
2272            // deeply nested JSON in pathological cases involving macro
2273            // expansion. Rustfix's Diagnostic struct is recursive containing a
2274            // field `children: Vec<Self>`, and it can cause deserialization to
2275            // hit serde_json's default recursion limit, or overflow the stack
2276            // if we turn that off. Cargo only cares about the 1 field listed
2277            // here.
2278            #[derive(serde::Deserialize)]
2279            struct PartialDiagnostic {
2280                spans: Vec<PartialDiagnosticSpan>,
2281            }
2282
2283            // A partial rustfix::diagnostics::DiagnosticSpan.
2284            #[derive(serde::Deserialize)]
2285            struct PartialDiagnosticSpan {
2286                suggestion_applicability: Option<Applicability>,
2287            }
2288
2289            #[derive(serde::Deserialize)]
2290            struct DiagnosticCode {
2291                code: String,
2292            }
2293
2294            if let Ok(mut msg) = serde_json::from_str::<CompilerMessage<'_>>(compiler_message.get())
2295            {
2296                if msg.message.starts_with("aborting due to")
2297                    || msg.message.ends_with("warning emitted")
2298                    || msg.message.ends_with("warnings emitted")
2299                {
2300                    // Skip this line; we'll print our own summary at the end.
2301                    return Ok(true);
2302                }
2303                // state.stderr will add a newline
2304                if msg.rendered.ends_with('\n') {
2305                    msg.rendered.pop();
2306                }
2307                let mut rendered = msg.rendered;
2308                if options.show_diagnostics {
2309                    let machine_applicable: bool = msg
2310                        .children
2311                        .iter()
2312                        .map(|child| {
2313                            child
2314                                .spans
2315                                .iter()
2316                                .filter_map(|span| span.suggestion_applicability)
2317                                .any(|app| app == Applicability::MachineApplicable)
2318                        })
2319                        .any(|b| b);
2320                    count_diagnostic(&msg.level, options);
2321                    if msg
2322                        .code
2323                        .as_ref()
2324                        .is_some_and(|c| c.code == "exported_private_dependencies")
2325                        && options.format != MessageFormat::Short
2326                    {
2327                        add_pub_in_priv_diagnostic(&mut rendered);
2328                    }
2329                    let lint = msg.code.is_some();
2330                    state.emit_diag(&msg.level, rendered, lint, machine_applicable)?;
2331                }
2332                return Ok(true);
2333            }
2334        }
2335
2336        MessageFormat::Json { ansi, .. } => {
2337            #[derive(serde::Deserialize, serde::Serialize)]
2338            struct CompilerMessage<'a> {
2339                rendered: String,
2340                #[serde(flatten, borrow)]
2341                other: std::collections::BTreeMap<Cow<'a, str>, serde_json::Value>,
2342                code: Option<DiagnosticCode<'a>>,
2343            }
2344
2345            #[derive(serde::Deserialize, serde::Serialize)]
2346            struct DiagnosticCode<'a> {
2347                code: String,
2348                #[serde(flatten, borrow)]
2349                other: std::collections::BTreeMap<Cow<'a, str>, serde_json::Value>,
2350            }
2351
2352            if let Ok(mut error) =
2353                serde_json::from_str::<CompilerMessage<'_>>(compiler_message.get())
2354            {
2355                let modified_diag = if error
2356                    .code
2357                    .as_ref()
2358                    .is_some_and(|c| c.code == "exported_private_dependencies")
2359                {
2360                    add_pub_in_priv_diagnostic(&mut error.rendered)
2361                } else {
2362                    false
2363                };
2364
2365                // Remove color information from the rendered string if color is not
2366                // enabled. Cargo always asks for ANSI colors from rustc. This allows
2367                // cached replay to enable/disable colors without re-invoking rustc.
2368                if !ansi {
2369                    error.rendered = anstream::adapter::strip_str(&error.rendered).to_string();
2370                }
2371                if !ansi || modified_diag {
2372                    let new_line = serde_json::to_string(&error)?;
2373                    compiler_message = serde_json::value::RawValue::from_string(new_line)?;
2374                }
2375            }
2376        }
2377    }
2378
2379    // We always tell rustc to emit messages about artifacts being produced.
2380    // These messages feed into pipelined compilation, as well as timing
2381    // information.
2382    //
2383    // Look for a matching directive and inform Cargo internally that a
2384    // metadata file has been produced.
2385    #[derive(serde::Deserialize)]
2386    struct ArtifactNotification<'a> {
2387        #[serde(borrow)]
2388        artifact: Cow<'a, str>,
2389    }
2390
2391    if let Ok(artifact) = serde_json::from_str::<ArtifactNotification<'_>>(compiler_message.get()) {
2392        trace!("found directive from rustc: `{}`", artifact.artifact);
2393        if artifact.artifact.ends_with(".rmeta") {
2394            debug!("looks like metadata finished early!");
2395            state.rmeta_produced();
2396        }
2397        return Ok(false);
2398    }
2399
2400    #[derive(serde::Deserialize)]
2401    struct UnusedExterns {
2402        unused_extern_names: Vec<String>,
2403    }
2404    if let Ok(uext) = serde_json::from_str::<UnusedExterns>(compiler_message.get()) {
2405        trace!(
2406            "obtained unused externs list from rustc: `{:?}`",
2407            uext.unused_extern_names
2408        );
2409        state.unused_externs(uext.unused_extern_names);
2410        return Ok(true);
2411    }
2412
2413    // And failing all that above we should have a legitimate JSON diagnostic
2414    // from the compiler, so wrap it in an external Cargo JSON message
2415    // indicating which package it came from and then emit it.
2416
2417    if !options.show_diagnostics {
2418        return Ok(true);
2419    }
2420
2421    #[derive(serde::Deserialize)]
2422    struct CompilerMessage<'a> {
2423        #[serde(borrow)]
2424        message: Cow<'a, str>,
2425        #[serde(borrow)]
2426        level: Cow<'a, str>,
2427    }
2428
2429    if let Ok(msg) = serde_json::from_str::<CompilerMessage<'_>>(compiler_message.get()) {
2430        if msg.message.starts_with("aborting due to")
2431            || msg.message.ends_with("warning emitted")
2432            || msg.message.ends_with("warnings emitted")
2433        {
2434            // Skip this line; we'll print our own summary at the end.
2435            return Ok(true);
2436        }
2437        count_diagnostic(&msg.level, options);
2438    }
2439
2440    let msg = machine_message::FromCompiler {
2441        package_id: package_id.to_spec(),
2442        manifest_path: &manifest.path,
2443        target,
2444        message: compiler_message,
2445    }
2446    .to_json_string();
2447
2448    // Switch json lines from rustc/rustdoc that appear on stderr to stdout
2449    // instead. We want the stdout of Cargo to always be machine parseable as
2450    // stderr has our colorized human-readable messages.
2451    state.stdout(msg)?;
2452    Ok(true)
2453}
2454
2455impl ManifestErrorContext {
2456    fn new(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> ManifestErrorContext {
2457        let mut duplicates = HashSet::new();
2458        let mut rename_table = HashMap::new();
2459
2460        for dep in build_runner.unit_deps(unit) {
2461            let unrenamed_id = dep.unit.pkg.package_id().name();
2462            if duplicates.contains(&unrenamed_id) {
2463                continue;
2464            }
2465            match rename_table.entry(unrenamed_id) {
2466                std::collections::hash_map::Entry::Occupied(occ) => {
2467                    occ.remove_entry();
2468                    duplicates.insert(unrenamed_id);
2469                }
2470                std::collections::hash_map::Entry::Vacant(vac) => {
2471                    vac.insert(dep.extern_crate_name);
2472                }
2473            }
2474        }
2475
2476        let bcx = build_runner.bcx;
2477        ManifestErrorContext {
2478            path: unit.pkg.manifest_path().to_owned(),
2479            spans: unit.pkg.manifest().document().cloned(),
2480            contents: unit.pkg.manifest().contents().map(String::from),
2481            requested_kinds: bcx.target_data.requested_kinds().to_owned(),
2482            host_name: bcx.rustc().host,
2483            rename_table,
2484            cwd: path_args(build_runner.bcx.ws, unit).1,
2485            cfgs: bcx
2486                .target_data
2487                .requested_kinds()
2488                .iter()
2489                .map(|k| bcx.target_data.cfg(*k).to_owned())
2490                .collect(),
2491            term_width: bcx
2492                .gctx
2493                .shell()
2494                .err_width()
2495                .diagnostic_terminal_width()
2496                .unwrap_or(cargo_util_terminal::report::renderer::DEFAULT_TERM_WIDTH),
2497        }
2498    }
2499
2500    fn requested_target_names(&self) -> impl Iterator<Item = &str> {
2501        self.requested_kinds.iter().map(|kind| match kind {
2502            CompileKind::Host => &self.host_name,
2503            CompileKind::Target(target) => target.short_name(),
2504        })
2505    }
2506
2507    /// Find a span for the dependency that specifies this unrenamed crate, if it's unique.
2508    ///
2509    /// rustc diagnostics (at least for public-in-private) mention the un-renamed
2510    /// crate: if you have `foo = { package = "bar" }`, the rustc diagnostic will
2511    /// say "bar".
2512    ///
2513    /// This function does its best to find a span for "bar", but it could fail if
2514    /// there are multiple candidates:
2515    ///
2516    /// ```toml
2517    /// foo = { package = "bar" }
2518    /// baz = { path = "../bar", package = "bar" }
2519    /// ```
2520    fn find_crate_span(&self, unrenamed: &str) -> Option<Range<usize>> {
2521        let Some(ref spans) = self.spans else {
2522            return None;
2523        };
2524
2525        let orig_name = self.rename_table.get(unrenamed)?.as_str();
2526
2527        if let Some((k, v)) = get_key_value(&spans, &["dependencies", orig_name]) {
2528            // We make some effort to find the unrenamed text: in
2529            //
2530            // ```
2531            // foo = { package = "bar" }
2532            // ```
2533            //
2534            // we try to find the "bar", but fall back to "foo" if we can't (which might
2535            // happen if the renaming took place in the workspace, for example).
2536            if let Some(package) = v.get_ref().as_table().and_then(|t| t.get("package")) {
2537                return Some(package.span());
2538            } else {
2539                return Some(k.span());
2540            }
2541        }
2542
2543        // The dependency could also be in a target-specific table, like
2544        // [target.x86_64-unknown-linux-gnu.dependencies] or
2545        // [target.'cfg(something)'.dependencies]. We filter out target tables
2546        // that don't match a requested target or a requested cfg.
2547        if let Some(target) = spans
2548            .as_ref()
2549            .get("target")
2550            .and_then(|t| t.as_ref().as_table())
2551        {
2552            for (platform, platform_table) in target.iter() {
2553                match platform.as_ref().parse::<Platform>() {
2554                    Ok(Platform::Name(name)) => {
2555                        if !self.requested_target_names().any(|n| n == name) {
2556                            continue;
2557                        }
2558                    }
2559                    Ok(Platform::Cfg(cfg_expr)) => {
2560                        if !self.cfgs.iter().any(|cfgs| cfg_expr.matches(cfgs)) {
2561                            continue;
2562                        }
2563                    }
2564                    Err(_) => continue,
2565                }
2566
2567                let Some(platform_table) = platform_table.as_ref().as_table() else {
2568                    continue;
2569                };
2570
2571                if let Some(deps) = platform_table
2572                    .get("dependencies")
2573                    .and_then(|d| d.as_ref().as_table())
2574                {
2575                    if let Some((k, v)) = deps.get_key_value(orig_name) {
2576                        if let Some(package) = v.get_ref().as_table().and_then(|t| t.get("package"))
2577                        {
2578                            return Some(package.span());
2579                        } else {
2580                            return Some(k.span());
2581                        }
2582                    }
2583                }
2584            }
2585        }
2586        None
2587    }
2588}
2589
2590/// Creates a unit of work that replays the cached compiler message.
2591///
2592/// Usually used when a job is fresh and doesn't need to recompile.
2593fn replay_output_cache(
2594    package_id: PackageId,
2595    manifest: ManifestErrorContext,
2596    target: &Target,
2597    path: PathBuf,
2598    mut output_options: OutputOptions,
2599) -> Work {
2600    let target = target.clone();
2601    Work::new(move |state| {
2602        if !path.exists() {
2603            // No cached output, probably didn't emit anything.
2604            return Ok(());
2605        }
2606        // We sometimes have gigabytes of output from the compiler, so avoid
2607        // loading it all into memory at once, as that can cause OOM where
2608        // otherwise there would be none.
2609        let file = paths::open(&path)?;
2610        let mut reader = std::io::BufReader::new(file);
2611        let mut line = String::new();
2612        loop {
2613            let length = reader.read_line(&mut line)?;
2614            if length == 0 {
2615                break;
2616            }
2617            let trimmed = line.trim_end_matches(&['\n', '\r'][..]);
2618            on_stderr_line(
2619                state,
2620                trimmed,
2621                package_id,
2622                &manifest,
2623                &target,
2624                &mut output_options,
2625            )?;
2626            line.clear();
2627        }
2628        Ok(())
2629    })
2630}
2631
2632/// Provides a package name with descriptive target information,
2633/// e.g., '`foo` (bin "bar" test)', '`foo` (lib doctest)'.
2634fn descriptive_pkg_name(name: &str, target: &Target, mode: &CompileMode) -> String {
2635    let desc_name = target.description_named();
2636    let mode = if mode.is_rustc_test() && !(target.is_test() || target.is_bench()) {
2637        " test"
2638    } else if mode.is_doc_test() {
2639        " doctest"
2640    } else if mode.is_doc() {
2641        " doc"
2642    } else {
2643        ""
2644    };
2645    format!("`{name}` ({desc_name}{mode})")
2646}
2647
2648/// Applies environment variables from config `[env]` to [`ProcessBuilder`].
2649pub(crate) fn apply_env_config(
2650    gctx: &crate::GlobalContext,
2651    cmd: &mut ProcessBuilder,
2652) -> CargoResult<()> {
2653    for (key, value) in gctx.env_config()?.iter() {
2654        // never override a value that has already been set by cargo
2655        if cmd.get_envs().contains_key(key) {
2656            continue;
2657        }
2658        cmd.env(key, value);
2659    }
2660    Ok(())
2661}
2662
2663/// Checks if there are some scrape units waiting to be processed.
2664fn should_include_scrape_units(bcx: &BuildContext<'_, '_>, unit: &Unit) -> bool {
2665    unit.mode.is_doc() && bcx.scrape_units.len() > 0 && bcx.ws.unit_needs_doc_scrape(unit)
2666}
2667
2668/// Gets the file path of function call information output from `rustdoc`.
2669fn scrape_output_path(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> CargoResult<PathBuf> {
2670    assert!(unit.mode.is_doc() || unit.mode.is_doc_scrape());
2671    build_runner
2672        .outputs(unit)
2673        .map(|outputs| outputs[0].path.clone())
2674}
2675
2676/// Gets the dep-info file emitted by rustdoc.
2677fn rustdoc_dep_info_loc(build_runner: &BuildRunner<'_, '_>, unit: &Unit) -> PathBuf {
2678    let mut loc = build_runner.files().fingerprint_file_path(unit, "");
2679    loc.set_extension("d");
2680    loc
2681}