-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(env): cargo:rerun-if-env-changed doesn't work with env configuration #14058
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
|
@@ -357,7 +357,9 @@ mod dirty_reason; | |||||
|
||||||
use std::collections::hash_map::{Entry, HashMap}; | ||||||
|
||||||
use std::collections::BTreeMap; | ||||||
use std::env; | ||||||
use std::ffi::OsString; | ||||||
use std::hash::{self, Hash, Hasher}; | ||||||
use std::io; | ||||||
use std::path::{Path, PathBuf}; | ||||||
|
@@ -768,14 +770,35 @@ pub enum StaleItem { | |||||
impl LocalFingerprint { | ||||||
/// Read the environment variable of the given env `key`, and creates a new | ||||||
/// [`LocalFingerprint::RerunIfEnvChanged`] for it. | ||||||
/// | ||||||
// TODO: This is allowed at this moment. Should figure out if it makes | ||||||
// sense if permitting to read env from the config system. | ||||||
Comment on lines
-772
to
-773
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Instead of removing this, can we have a comment explaining why the I presume the problem is that the closure cannot access the GlobalContext, and thus is unable to access the env snapshot, and thus must access the raw environment directly? It seems like there are still options we can consider, such as wrapping the environment in Arc or something like that? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Agree |
||||||
#[allow(clippy::disallowed_methods)] | ||||||
fn from_env<K: AsRef<str>>(key: K) -> LocalFingerprint { | ||||||
let key = key.as_ref(); | ||||||
fn from_env<K: AsRef<str>>( | ||||||
epage marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
key: K, | ||||||
envs: &BTreeMap<String, Option<OsString>>, | ||||||
) -> LocalFingerprint { | ||||||
fn get_envs_case_insensitive( | ||||||
key: &str, | ||||||
envs: &BTreeMap<String, Option<OsString>>, | ||||||
) -> Option<OsString> { | ||||||
let upper_case_key: String = key.to_uppercase(); | ||||||
for (k, v) in envs { | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This conversion seems to be in a deeply nested loop. M This doesn't really seem to be a performance issue for general usage though. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. A small fix would be to check the map with the key as-is, and then only check for the case-insensitive if that fails. 99% of the time the case will match. |
||||||
if k.to_uppercase().eq(&upper_case_key) { | ||||||
return v.to_owned(); | ||||||
} | ||||||
} | ||||||
None | ||||||
} | ||||||
|
||||||
let key: &str = key.as_ref(); | ||||||
let var = key.to_owned(); | ||||||
let val = env::var(key).ok(); | ||||||
|
||||||
let val: Option<String> = if cfg!(windows) { | ||||||
get_envs_case_insensitive(key, envs) | ||||||
} else { | ||||||
envs.get(key).and_then(|v| v.to_owned()) | ||||||
} | ||||||
.or(env::var_os(key)) | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Lazy evaluation
Suggested change
|
||||||
.and_then(|os_str| os_str.into_string().ok()); | ||||||
|
||||||
LocalFingerprint::RerunIfEnvChanged { var, val } | ||||||
} | ||||||
|
||||||
|
@@ -1608,6 +1631,12 @@ fn build_script_local_fingerprints( | |||||
bool, | ||||||
) { | ||||||
assert!(unit.mode.is_run_custom_build()); | ||||||
let envs = build_runner | ||||||
.bcx | ||||||
.target_data | ||||||
.info(unit.kind) | ||||||
.get_target_envs() | ||||||
.clone(); | ||||||
epage marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
// First up, if this build script is entirely overridden, then we just | ||||||
// return the hash of what we overrode it with. This is the easy case! | ||||||
if let Some(fingerprint) = build_script_override_fingerprint(build_runner, unit) { | ||||||
|
@@ -1660,7 +1689,12 @@ fn build_script_local_fingerprints( | |||||
// Ok so now we're in "new mode" where we can have files listed as | ||||||
// dependencies as well as env vars listed as dependencies. Process | ||||||
// them all here. | ||||||
Ok(Some(local_fingerprints_deps(deps, &target_dir, &pkg_root))) | ||||||
Ok(Some(local_fingerprints_deps( | ||||||
deps, | ||||||
&target_dir, | ||||||
&pkg_root, | ||||||
&envs, | ||||||
))) | ||||||
}; | ||||||
|
||||||
// Note that `false` == "not overridden" | ||||||
|
@@ -1695,6 +1729,7 @@ fn local_fingerprints_deps( | |||||
deps: &BuildDeps, | ||||||
target_root: &Path, | ||||||
pkg_root: &Path, | ||||||
envs: &BTreeMap<String, Option<OsString>>, | ||||||
) -> Vec<LocalFingerprint> { | ||||||
debug!("new local fingerprints deps {:?}", pkg_root); | ||||||
let mut local = Vec::new(); | ||||||
|
@@ -1719,7 +1754,7 @@ fn local_fingerprints_deps( | |||||
local.extend( | ||||||
deps.rerun_if_env_changed | ||||||
.iter() | ||||||
.map(LocalFingerprint::from_env), | ||||||
.map(|v| LocalFingerprint::from_env(v, &envs)), | ||||||
); | ||||||
|
||||||
local | ||||||
|
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
|
@@ -20,13 +20,13 @@ fn rerun_if_env_changes_config() { | |||||
.file( | ||||||
"build.rs", | ||||||
r#" | ||||||
fn main() { | ||||||
println!("cargo:rerun-if-env-changed=FOO"); | ||||||
if let Ok(foo) = std::env::var("FOO") { | ||||||
assert!(&foo != "bad"); | ||||||
} | ||||||
} | ||||||
"#, | ||||||
fn main() { | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This formatting change shouldn't have happened, or should merge into the first commit adding the test. |
||||||
println!("cargo:rerun-if-env-changed=FOO"); | ||||||
if let Ok(foo) = std::env::var("FOO") { | ||||||
assert!(&foo != "bad"); | ||||||
} | ||||||
} | ||||||
"#, | ||||||
) | ||||||
.build(); | ||||||
|
||||||
|
@@ -47,47 +47,38 @@ fn rerun_if_env_changes_config() { | |||||
); | ||||||
|
||||||
p.cargo("check") | ||||||
.with_status(101) | ||||||
.with_stderr_data(str![[r#" | ||||||
[FINISHED] `dev` profile [unoptimized + debuginfo] target(s) in [ELAPSED]s | ||||||
|
||||||
[COMPILING] foo v0.1.0 ([ROOT]/foo) | ||||||
[ERROR] failed to run custom build command for `foo v0.1.0 ([ROOT]/foo)` | ||||||
... | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We should better check if our assertion actually causes the error message. Perhaps add an assertion message |
||||||
"#]]) | ||||||
.run(); | ||||||
|
||||||
p.cargo("clean").run(); | ||||||
p.cargo("check") | ||||||
.with_status(101) | ||||||
.with_stderr_data( | ||||||
"\ | ||||||
[COMPILING] foo v0.1.0 ([ROOT]/foo) | ||||||
[ERROR] failed to run custom build command for `foo v0.1.0 ([..])` | ||||||
...", | ||||||
) | ||||||
.run(); | ||||||
} | ||||||
|
||||||
#[cfg(windows)] | ||||||
#[cargo_test] | ||||||
fn rerun_if_env_changes_config_windows() { | ||||||
fn rerun_if_env_changes_config_in_windows() { | ||||||
heisen-li marked this conversation as resolved.
Show resolved
Hide resolved
|
||||||
let p = project() | ||||||
.file("Cargo.toml", &basic_manifest("foo", "0.1.0")) | ||||||
.file("src/main.rs", "fn main() {}") | ||||||
.file( | ||||||
".cargo/config.toml", | ||||||
r#" | ||||||
[env] | ||||||
FOO = "good" | ||||||
Foo = "good" | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Could you merge this into the commit that the test first appeared? |
||||||
"#, | ||||||
) | ||||||
.file( | ||||||
"build.rs", | ||||||
r#" | ||||||
fn main() { | ||||||
println!("cargo:rerun-if-env-changed=Foo"); | ||||||
if let Ok(foo) = std::env::var("Foo") { | ||||||
assert!(&foo != "bad"); | ||||||
} | ||||||
} | ||||||
"#, | ||||||
fn main() { | ||||||
println!("cargo:rerun-if-env-changed=foo"); | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. double colons syntax is preferrable
Suggested change
|
||||||
if let Ok(foo) = std::env::var("FOo") { | ||||||
assert!(&foo != "bad"); | ||||||
} | ||||||
} | ||||||
"#, | ||||||
) | ||||||
.build(); | ||||||
|
||||||
|
@@ -103,26 +94,17 @@ fn rerun_if_env_changes_config_windows() { | |||||
".cargo/config.toml", | ||||||
r#" | ||||||
[env] | ||||||
FOO = "bad" | ||||||
FoO = "bad" | ||||||
"#, | ||||||
); | ||||||
|
||||||
p.cargo("check") | ||||||
.with_stderr_data(str![[r#" | ||||||
[FINISHED] `dev` profile [unoptimized + debuginfo] target(s) in [ELAPSED]s | ||||||
|
||||||
"#]]) | ||||||
.run(); | ||||||
|
||||||
p.cargo("clean").run(); | ||||||
p.cargo("check") | ||||||
.with_status(101) | ||||||
.with_stderr_data( | ||||||
"\ | ||||||
.with_stderr_data(str![[r#" | ||||||
[COMPILING] foo v0.1.0 ([ROOT]/foo) | ||||||
[ERROR] failed to run custom build command for `foo v0.1.0 ([..])` | ||||||
...", | ||||||
) | ||||||
[ERROR] failed to run custom build command for `foo v0.1.0 ([ROOT]/foo)` | ||||||
... | ||||||
"#]]) | ||||||
.run(); | ||||||
} | ||||||
|
||||||
|
@@ -158,6 +140,7 @@ fn rerun_if_env_changes_cargo_set_env_variable() { | |||||
|
||||||
p.cargo("check") | ||||||
.with_stderr_data(str![[r#" | ||||||
[COMPILING] foo v0.0.1 ([ROOT]/foo) | ||||||
[FINISHED] `dev` profile [unoptimized + debuginfo] target(s) in [ELAPSED]s | ||||||
|
||||||
"#]]) | ||||||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Accessing
crate_type_process
seems like a hacky shortcut to me. The process is for learning target info from rustc, but fingerprint is for actual rustc compilation. One extension point for putting it here is for supporting #10273, though I believe that will need other rounds of env var system overhual in Cargo.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would agree, the chance of this having unintended consequences seems kinda high since it isn't obvious when looking at
TargetInfo
that this would also influence build-script environment fingerprinting.Would it be possible to rewrite
apply_env_config
so that there is a separate function that yields a map of resolved config values? Then the code in the fingerprint module could call that and collect the results into a map that it could then pass into the closure.(I also wonder if it ends up creating a new map, if it could pre-normalize it on Windows to avoid the inner case-check loop.)