summaryrefslogtreecommitdiff
path: root/vendor/cc/src
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/cc/src')
-rw-r--r--vendor/cc/src/command_helpers.rs461
-rw-r--r--vendor/cc/src/detect_compiler_family.c15
-rw-r--r--vendor/cc/src/flags.rs522
-rw-r--r--vendor/cc/src/lib.rs4335
-rw-r--r--vendor/cc/src/parallel/async_executor.rs118
-rw-r--r--vendor/cc/src/parallel/job_token.rs266
-rw-r--r--vendor/cc/src/parallel/mod.rs3
-rw-r--r--vendor/cc/src/parallel/stderr.rs91
-rw-r--r--vendor/cc/src/target.rs41
-rw-r--r--vendor/cc/src/target/apple.rs49
-rw-r--r--vendor/cc/src/target/generated.rs306
-rw-r--r--vendor/cc/src/target/llvm.rs315
-rw-r--r--vendor/cc/src/target/parser.rs563
-rw-r--r--vendor/cc/src/tempfile.rs86
-rw-r--r--vendor/cc/src/tool.rs552
-rw-r--r--vendor/cc/src/utilities.rs130
-rw-r--r--vendor/cc/src/windows/com.rs110
-rw-r--r--vendor/cc/src/windows/find_tools.rs1238
-rw-r--r--vendor/cc/src/windows/mod.rs22
-rw-r--r--vendor/cc/src/windows/registry.rs191
-rw-r--r--vendor/cc/src/windows/setup_config.rs283
-rw-r--r--vendor/cc/src/windows/vs_instances.rs199
-rw-r--r--vendor/cc/src/windows/winapi.rs146
-rw-r--r--vendor/cc/src/windows/windows_link.rs19
-rw-r--r--vendor/cc/src/windows/windows_sys.rs139
25 files changed, 10200 insertions, 0 deletions
diff --git a/vendor/cc/src/command_helpers.rs b/vendor/cc/src/command_helpers.rs
new file mode 100644
index 00000000..89dc1a33
--- /dev/null
+++ b/vendor/cc/src/command_helpers.rs
@@ -0,0 +1,461 @@
+//! Miscellaneous helpers for running commands
+
+use std::{
+ borrow::Cow,
+ collections::hash_map,
+ ffi::OsString,
+ fmt::Display,
+ fs,
+ hash::Hasher,
+ io::{self, Read, Write},
+ path::Path,
+ process::{Child, ChildStderr, Command, Stdio},
+ sync::{
+ atomic::{AtomicBool, Ordering},
+ Arc,
+ },
+};
+
+use crate::{Error, ErrorKind, Object};
+
+#[derive(Clone, Debug)]
+pub(crate) struct CargoOutput {
+ pub(crate) metadata: bool,
+ pub(crate) warnings: bool,
+ pub(crate) debug: bool,
+ pub(crate) output: OutputKind,
+ checked_dbg_var: Arc<AtomicBool>,
+}
+
+/// Different strategies for handling compiler output (to stdout)
+#[derive(Clone, Debug)]
+pub(crate) enum OutputKind {
+ /// Forward the output to this process' stdout ([`Stdio::inherit()`])
+ Forward,
+ /// Discard the output ([`Stdio::null()`])
+ Discard,
+ /// Capture the result (`[Stdio::piped()`])
+ Capture,
+}
+
+impl CargoOutput {
+ pub(crate) fn new() -> Self {
+ #[allow(clippy::disallowed_methods)]
+ Self {
+ metadata: true,
+ warnings: true,
+ output: OutputKind::Forward,
+ debug: match std::env::var_os("CC_ENABLE_DEBUG_OUTPUT") {
+ Some(v) => v != "0" && v != "false" && !v.is_empty(),
+ None => false,
+ },
+ checked_dbg_var: Arc::new(AtomicBool::new(false)),
+ }
+ }
+
+ pub(crate) fn print_metadata(&self, s: &dyn Display) {
+ if self.metadata {
+ println!("{}", s);
+ }
+ }
+
+ pub(crate) fn print_warning(&self, arg: &dyn Display) {
+ if self.warnings {
+ println!("cargo:warning={}", arg);
+ }
+ }
+
+ pub(crate) fn print_debug(&self, arg: &dyn Display) {
+ if self.metadata && !self.checked_dbg_var.load(Ordering::Relaxed) {
+ self.checked_dbg_var.store(true, Ordering::Relaxed);
+ println!("cargo:rerun-if-env-changed=CC_ENABLE_DEBUG_OUTPUT");
+ }
+ if self.debug {
+ println!("{}", arg);
+ }
+ }
+
+ fn stdio_for_warnings(&self) -> Stdio {
+ if self.warnings {
+ Stdio::piped()
+ } else {
+ Stdio::null()
+ }
+ }
+
+ fn stdio_for_output(&self) -> Stdio {
+ match self.output {
+ OutputKind::Capture => Stdio::piped(),
+ OutputKind::Forward => Stdio::inherit(),
+ OutputKind::Discard => Stdio::null(),
+ }
+ }
+}
+
+pub(crate) struct StderrForwarder {
+ inner: Option<(ChildStderr, Vec<u8>)>,
+ #[cfg(feature = "parallel")]
+ is_non_blocking: bool,
+ #[cfg(feature = "parallel")]
+ bytes_available_failed: bool,
+ /// number of bytes buffered in inner
+ bytes_buffered: usize,
+}
+
+const MIN_BUFFER_CAPACITY: usize = 100;
+
+impl StderrForwarder {
+ pub(crate) fn new(child: &mut Child) -> Self {
+ Self {
+ inner: child
+ .stderr
+ .take()
+ .map(|stderr| (stderr, Vec::with_capacity(MIN_BUFFER_CAPACITY))),
+ bytes_buffered: 0,
+ #[cfg(feature = "parallel")]
+ is_non_blocking: false,
+ #[cfg(feature = "parallel")]
+ bytes_available_failed: false,
+ }
+ }
+
+ fn forward_available(&mut self) -> bool {
+ if let Some((stderr, buffer)) = self.inner.as_mut() {
+ loop {
+ // For non-blocking we check to see if there is data available, so we should try to
+ // read at least that much. For blocking, always read at least the minimum amount.
+ #[cfg(not(feature = "parallel"))]
+ let to_reserve = MIN_BUFFER_CAPACITY;
+ #[cfg(feature = "parallel")]
+ let to_reserve = if self.is_non_blocking && !self.bytes_available_failed {
+ match crate::parallel::stderr::bytes_available(stderr) {
+ #[cfg(windows)]
+ Ok(0) => break false,
+ #[cfg(unix)]
+ Ok(0) => {
+ // On Unix, depending on the implementation, we may sometimes get 0 in a
+ // loop (either there is data available or the pipe is broken), so
+ // continue with the non-blocking read anyway.
+ MIN_BUFFER_CAPACITY
+ }
+ #[cfg(windows)]
+ Err(_) => {
+ // On Windows, if we get an error then the pipe is broken, so flush
+ // the buffer and bail.
+ if !buffer.is_empty() {
+ write_warning(&buffer[..]);
+ }
+ self.inner = None;
+ break true;
+ }
+ #[cfg(unix)]
+ Err(_) => {
+ // On Unix, depending on the implementation, we may get spurious
+ // errors so make a note not to use bytes_available again and try
+ // the non-blocking read anyway.
+ self.bytes_available_failed = true;
+ MIN_BUFFER_CAPACITY
+ }
+ #[cfg(target_family = "wasm")]
+ Err(_) => panic!("bytes_available should always succeed on wasm"),
+ Ok(bytes_available) => MIN_BUFFER_CAPACITY.max(bytes_available),
+ }
+ } else {
+ MIN_BUFFER_CAPACITY
+ };
+ if self.bytes_buffered + to_reserve > buffer.len() {
+ buffer.resize(self.bytes_buffered + to_reserve, 0);
+ }
+
+ match stderr.read(&mut buffer[self.bytes_buffered..]) {
+ Err(err) if err.kind() == std::io::ErrorKind::WouldBlock => {
+ // No data currently, yield back.
+ break false;
+ }
+ Err(err) if err.kind() == std::io::ErrorKind::Interrupted => {
+ // Interrupted, try again.
+ continue;
+ }
+ Ok(bytes_read) if bytes_read != 0 => {
+ self.bytes_buffered += bytes_read;
+ let mut consumed = 0;
+ for line in buffer[..self.bytes_buffered].split_inclusive(|&b| b == b'\n') {
+ // Only forward complete lines, leave the rest in the buffer.
+ if let Some((b'\n', line)) = line.split_last() {
+ consumed += line.len() + 1;
+ write_warning(line);
+ }
+ }
+ if consumed > 0 && consumed < self.bytes_buffered {
+ // Remove the consumed bytes from buffer
+ buffer.copy_within(consumed.., 0);
+ }
+ self.bytes_buffered -= consumed;
+ }
+ res => {
+ // End of stream: flush remaining data and bail.
+ if self.bytes_buffered > 0 {
+ write_warning(&buffer[..self.bytes_buffered]);
+ }
+ if let Err(err) = res {
+ write_warning(
+ format!("Failed to read from child stderr: {err}").as_bytes(),
+ );
+ }
+ self.inner.take();
+ break true;
+ }
+ }
+ }
+ } else {
+ true
+ }
+ }
+
+ #[cfg(feature = "parallel")]
+ pub(crate) fn set_non_blocking(&mut self) -> Result<(), Error> {
+ assert!(!self.is_non_blocking);
+
+ #[cfg(unix)]
+ if let Some((stderr, _)) = self.inner.as_ref() {
+ crate::parallel::stderr::set_non_blocking(stderr)?;
+ }
+
+ self.is_non_blocking = true;
+ Ok(())
+ }
+
+ #[cfg(feature = "parallel")]
+ fn forward_all(&mut self) {
+ while !self.forward_available() {}
+ }
+
+ #[cfg(not(feature = "parallel"))]
+ fn forward_all(&mut self) {
+ let forward_result = self.forward_available();
+ assert!(forward_result, "Should have consumed all data");
+ }
+}
+
+fn write_warning(line: &[u8]) {
+ let stdout = io::stdout();
+ let mut stdout = stdout.lock();
+ stdout.write_all(b"cargo:warning=").unwrap();
+ stdout.write_all(line).unwrap();
+ stdout.write_all(b"\n").unwrap();
+}
+
+fn wait_on_child(
+ cmd: &Command,
+ child: &mut Child,
+ cargo_output: &CargoOutput,
+) -> Result<(), Error> {
+ StderrForwarder::new(child).forward_all();
+
+ let status = match child.wait() {
+ Ok(s) => s,
+ Err(e) => {
+ return Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!("failed to wait on spawned child process `{cmd:?}`: {e}"),
+ ));
+ }
+ };
+
+ cargo_output.print_debug(&status);
+
+ if status.success() {
+ Ok(())
+ } else {
+ Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!("command did not execute successfully (status code {status}): {cmd:?}"),
+ ))
+ }
+}
+
+/// Find the destination object path for each file in the input source files,
+/// and store them in the output Object.
+pub(crate) fn objects_from_files(files: &[Arc<Path>], dst: &Path) -> Result<Vec<Object>, Error> {
+ let mut objects = Vec::with_capacity(files.len());
+ for file in files {
+ let basename = file
+ .file_name()
+ .ok_or_else(|| {
+ Error::new(
+ ErrorKind::InvalidArgument,
+ "No file_name for object file path!",
+ )
+ })?
+ .to_string_lossy();
+ let dirname = file
+ .parent()
+ .ok_or_else(|| {
+ Error::new(
+ ErrorKind::InvalidArgument,
+ "No parent for object file path!",
+ )
+ })?
+ .to_string_lossy();
+
+ // Hash the dirname. This should prevent conflicts if we have multiple
+ // object files with the same filename in different subfolders.
+ let mut hasher = hash_map::DefaultHasher::new();
+
+ // Make the dirname relative (if possible) to avoid full system paths influencing the sha
+ // and making the output system-dependent
+ //
+ // NOTE: Here we allow using std::env::var (instead of Build::getenv) because
+ // CARGO_* variables always trigger a rebuild when changed
+ #[allow(clippy::disallowed_methods)]
+ let dirname = if let Some(root) = std::env::var_os("CARGO_MANIFEST_DIR") {
+ let root = root.to_string_lossy();
+ Cow::Borrowed(dirname.strip_prefix(&*root).unwrap_or(&dirname))
+ } else {
+ dirname
+ };
+
+ hasher.write(dirname.as_bytes());
+ if let Some(extension) = file.extension() {
+ hasher.write(extension.to_string_lossy().as_bytes());
+ }
+ let obj = dst
+ .join(format!("{:016x}-{}", hasher.finish(), basename))
+ .with_extension("o");
+
+ match obj.parent() {
+ Some(s) => fs::create_dir_all(s)?,
+ None => {
+ return Err(Error::new(
+ ErrorKind::InvalidArgument,
+ "dst is an invalid path with no parent",
+ ));
+ }
+ };
+
+ objects.push(Object::new(file.to_path_buf(), obj));
+ }
+
+ Ok(objects)
+}
+
+pub(crate) fn run(cmd: &mut Command, cargo_output: &CargoOutput) -> Result<(), Error> {
+ let mut child = spawn(cmd, cargo_output)?;
+ wait_on_child(cmd, &mut child, cargo_output)
+}
+
+pub(crate) fn run_output(cmd: &mut Command, cargo_output: &CargoOutput) -> Result<Vec<u8>, Error> {
+ // We specifically need the output to be captured, so override default
+ let mut captured_cargo_output = cargo_output.clone();
+ captured_cargo_output.output = OutputKind::Capture;
+ let mut child = spawn(cmd, &captured_cargo_output)?;
+
+ let mut stdout = vec![];
+ child
+ .stdout
+ .take()
+ .unwrap()
+ .read_to_end(&mut stdout)
+ .unwrap();
+
+ // Don't care about this output, use the normal settings
+ wait_on_child(cmd, &mut child, cargo_output)?;
+
+ Ok(stdout)
+}
+
+pub(crate) fn spawn(cmd: &mut Command, cargo_output: &CargoOutput) -> Result<Child, Error> {
+ struct ResetStderr<'cmd>(&'cmd mut Command);
+
+ impl Drop for ResetStderr<'_> {
+ fn drop(&mut self) {
+ // Reset stderr to default to release pipe_writer so that print thread will
+ // not block forever.
+ self.0.stderr(Stdio::inherit());
+ }
+ }
+
+ cargo_output.print_debug(&format_args!("running: {:?}", cmd));
+
+ let cmd = ResetStderr(cmd);
+ let child = cmd
+ .0
+ .stderr(cargo_output.stdio_for_warnings())
+ .stdout(cargo_output.stdio_for_output())
+ .spawn();
+ match child {
+ Ok(child) => Ok(child),
+ Err(ref e) if e.kind() == io::ErrorKind::NotFound => {
+ let extra = if cfg!(windows) {
+ " (see https://docs.rs/cc/latest/cc/#compile-time-requirements for help)"
+ } else {
+ ""
+ };
+ Err(Error::new(
+ ErrorKind::ToolNotFound,
+ format!("failed to find tool {:?}: {e}{extra}", cmd.0.get_program()),
+ ))
+ }
+ Err(e) => Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!("command `{:?}` failed to start: {e}", cmd.0),
+ )),
+ }
+}
+
+pub(crate) struct CmdAddOutputFileArgs {
+ pub(crate) cuda: bool,
+ pub(crate) is_assembler_msvc: bool,
+ pub(crate) msvc: bool,
+ pub(crate) clang: bool,
+ pub(crate) gnu: bool,
+ pub(crate) is_asm: bool,
+ pub(crate) is_arm: bool,
+}
+
+pub(crate) fn command_add_output_file(cmd: &mut Command, dst: &Path, args: CmdAddOutputFileArgs) {
+ if args.is_assembler_msvc
+ || !(!args.msvc || args.clang || args.gnu || args.cuda || (args.is_asm && args.is_arm))
+ {
+ let mut s = OsString::from("-Fo");
+ s.push(dst);
+ cmd.arg(s);
+ } else {
+ cmd.arg("-o").arg(dst);
+ }
+}
+
+#[cfg(feature = "parallel")]
+pub(crate) fn try_wait_on_child(
+ cmd: &Command,
+ child: &mut Child,
+ stdout: &mut dyn io::Write,
+ stderr_forwarder: &mut StderrForwarder,
+) -> Result<Option<()>, Error> {
+ stderr_forwarder.forward_available();
+
+ match child.try_wait() {
+ Ok(Some(status)) => {
+ stderr_forwarder.forward_all();
+
+ let _ = writeln!(stdout, "{}", status);
+
+ if status.success() {
+ Ok(Some(()))
+ } else {
+ Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!("command did not execute successfully (status code {status}): {cmd:?}"),
+ ))
+ }
+ }
+ Ok(None) => Ok(None),
+ Err(e) => {
+ stderr_forwarder.forward_all();
+ Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!("failed to wait on spawned child process `{cmd:?}`: {e}"),
+ ))
+ }
+ }
+}
diff --git a/vendor/cc/src/detect_compiler_family.c b/vendor/cc/src/detect_compiler_family.c
new file mode 100644
index 00000000..601cee6c
--- /dev/null
+++ b/vendor/cc/src/detect_compiler_family.c
@@ -0,0 +1,15 @@
+#ifdef __clang__
+#pragma message "clang"
+#endif
+
+#ifdef __GNUC__
+#pragma message "gcc"
+#endif
+
+#ifdef __EMSCRIPTEN__
+#pragma message "emscripten"
+#endif
+
+#ifdef __VXWORKS__
+#pragma message "VxWorks"
+#endif
diff --git a/vendor/cc/src/flags.rs b/vendor/cc/src/flags.rs
new file mode 100644
index 00000000..91e9470a
--- /dev/null
+++ b/vendor/cc/src/flags.rs
@@ -0,0 +1,522 @@
+use crate::target::TargetInfo;
+use crate::{Build, Error, ErrorKind, Tool, ToolFamily};
+use std::borrow::Cow;
+use std::ffi::OsString;
+
+#[derive(Debug, PartialEq, Default)]
+pub(crate) struct RustcCodegenFlags<'a> {
+ branch_protection: Option<&'a str>,
+ code_model: Option<&'a str>,
+ no_vectorize_loops: bool,
+ no_vectorize_slp: bool,
+ profile_generate: Option<&'a str>,
+ profile_use: Option<&'a str>,
+ control_flow_guard: Option<&'a str>,
+ lto: Option<&'a str>,
+ relocation_model: Option<&'a str>,
+ embed_bitcode: Option<bool>,
+ force_frame_pointers: Option<bool>,
+ no_redzone: Option<bool>,
+ soft_float: Option<bool>,
+ dwarf_version: Option<u32>,
+}
+
+impl<'this> RustcCodegenFlags<'this> {
+ // Parse flags obtained from CARGO_ENCODED_RUSTFLAGS
+ pub(crate) fn parse(rustflags_env: &'this str) -> Result<Self, Error> {
+ fn is_flag_prefix(flag: &str) -> bool {
+ [
+ "-Z",
+ "-C",
+ "--codegen",
+ "-L",
+ "-l",
+ "-o",
+ "-W",
+ "--warn",
+ "-A",
+ "--allow",
+ "-D",
+ "--deny",
+ "-F",
+ "--forbid",
+ ]
+ .contains(&flag)
+ }
+
+ fn handle_flag_prefix<'a>(prev: &'a str, curr: &'a str) -> (&'a str, &'a str) {
+ match prev {
+ "--codegen" | "-C" => ("-C", curr),
+ // Handle flags passed like --codegen=code-model=small
+ _ if curr.starts_with("--codegen=") => ("-C", &curr[10..]),
+ "-Z" => ("-Z", curr),
+ "-L" | "-l" | "-o" => (prev, curr),
+ // Handle lint flags
+ "-W" | "--warn" => ("-W", curr),
+ "-A" | "--allow" => ("-A", curr),
+ "-D" | "--deny" => ("-D", curr),
+ "-F" | "--forbid" => ("-F", curr),
+ _ => ("", curr),
+ }
+ }
+
+ let mut codegen_flags = Self::default();
+
+ let mut prev_prefix = None;
+ for curr in rustflags_env.split("\u{1f}") {
+ let prev = prev_prefix.take().unwrap_or("");
+ if prev.is_empty() && is_flag_prefix(curr) {
+ prev_prefix = Some(curr);
+ continue;
+ }
+
+ let (prefix, rustc_flag) = handle_flag_prefix(prev, curr);
+ codegen_flags.set_rustc_flag(prefix, rustc_flag)?;
+ }
+
+ Ok(codegen_flags)
+ }
+
+ fn set_rustc_flag(&mut self, prefix: &str, flag: &'this str) -> Result<(), Error> {
+ // Convert a textual representation of a bool-like rustc flag argument into an actual bool
+ fn arg_to_bool(arg: impl AsRef<str>) -> Option<bool> {
+ match arg.as_ref() {
+ "y" | "yes" | "on" | "true" => Some(true),
+ "n" | "no" | "off" | "false" => Some(false),
+ _ => None,
+ }
+ }
+
+ fn arg_to_u32(arg: impl AsRef<str>) -> Option<u32> {
+ arg.as_ref().parse().ok()
+ }
+
+ let (flag, value) = if let Some((flag, value)) = flag.split_once('=') {
+ (flag, Some(value))
+ } else {
+ (flag, None)
+ };
+ let flag = if prefix.is_empty() {
+ Cow::Borrowed(flag)
+ } else {
+ Cow::Owned(format!("{prefix}{flag}"))
+ };
+
+ fn flag_ok_or<'flag>(
+ flag: Option<&'flag str>,
+ msg: &'static str,
+ ) -> Result<&'flag str, Error> {
+ flag.ok_or(Error::new(ErrorKind::InvalidFlag, msg))
+ }
+
+ match flag.as_ref() {
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#code-model
+ "-Ccode-model" => {
+ self.code_model = Some(flag_ok_or(value, "-Ccode-model must have a value")?);
+ }
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#no-vectorize-loops
+ "-Cno-vectorize-loops" => self.no_vectorize_loops = true,
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#no-vectorize-slp
+ "-Cno-vectorize-slp" => self.no_vectorize_slp = true,
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#profile-generate
+ "-Cprofile-generate" => {
+ self.profile_generate =
+ Some(flag_ok_or(value, "-Cprofile-generate must have a value")?);
+ }
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#profile-use
+ "-Cprofile-use" => {
+ self.profile_use = Some(flag_ok_or(value, "-Cprofile-use must have a value")?);
+ }
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#control-flow-guard
+ "-Ccontrol-flow-guard" => self.control_flow_guard = value.or(Some("true")),
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#lto
+ "-Clto" => self.lto = value.or(Some("true")),
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#relocation-model
+ "-Crelocation-model" => {
+ self.relocation_model =
+ Some(flag_ok_or(value, "-Crelocation-model must have a value")?);
+ }
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#embed-bitcode
+ "-Cembed-bitcode" => self.embed_bitcode = value.map_or(Some(true), arg_to_bool),
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#force-frame-pointers
+ "-Cforce-frame-pointers" => {
+ self.force_frame_pointers = value.map_or(Some(true), arg_to_bool)
+ }
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#no-redzone
+ "-Cno-redzone" => self.no_redzone = value.map_or(Some(true), arg_to_bool),
+ // https://doc.rust-lang.org/rustc/codegen-options/index.html#soft-float
+ // Note: This flag is now deprecated in rustc.
+ "-Csoft-float" => self.soft_float = value.map_or(Some(true), arg_to_bool),
+ // https://doc.rust-lang.org/beta/unstable-book/compiler-flags/branch-protection.html
+ // FIXME: Drop the -Z variant and update the doc link once the option is stabilised
+ "-Zbranch-protection" | "-Cbranch-protection" => {
+ self.branch_protection =
+ Some(flag_ok_or(value, "-Zbranch-protection must have a value")?);
+ }
+ // https://doc.rust-lang.org/beta/unstable-book/compiler-flags/dwarf-version.html
+ // FIXME: Drop the -Z variant and update the doc link once the option is stablized
+ "-Zdwarf-version" | "-Cdwarf-version" => {
+ self.dwarf_version = Some(value.and_then(arg_to_u32).ok_or(Error::new(
+ ErrorKind::InvalidFlag,
+ "-Zdwarf-version must have a value",
+ ))?);
+ }
+ _ => {}
+ }
+ Ok(())
+ }
+
+ // Rust and clang/cc don't agree on what equivalent flags should look like.
+ pub(crate) fn cc_flags(&self, build: &Build, tool: &mut Tool, target: &TargetInfo<'_>) {
+ let family = tool.family;
+ // Push `flag` to `flags` if it is supported by the currently used CC
+ let mut push_if_supported = |flag: OsString| {
+ if build
+ .is_flag_supported_inner(&flag, tool, target)
+ .unwrap_or(false)
+ {
+ tool.args.push(flag);
+ } else {
+ build.cargo_output.print_warning(&format!(
+ "Inherited flag {:?} is not supported by the currently used CC",
+ flag
+ ));
+ }
+ };
+
+ let clang_or_gnu =
+ matches!(family, ToolFamily::Clang { .. }) || matches!(family, ToolFamily::Gnu);
+
+ // Flags shared between clang and gnu
+ if clang_or_gnu {
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mbranch-protection
+ // https://gcc.gnu.org/onlinedocs/gcc/AArch64-Options.html#index-mbranch-protection (Aarch64)
+ // https://gcc.gnu.org/onlinedocs/gcc/ARM-Options.html#index-mbranch-protection-1 (ARM)
+ // https://developer.arm.com/documentation/101754/0619/armclang-Reference/armclang-Command-line-Options/-mbranch-protection
+ if let Some(value) = self.branch_protection {
+ push_if_supported(
+ format!("-mbranch-protection={}", value.replace(",", "+")).into(),
+ );
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mcmodel
+ // https://gcc.gnu.org/onlinedocs/gcc/Option-Summary.html (several archs, search for `-mcmodel=`).
+ // FIXME(madsmtm): Parse the model, to make sure we pass the correct value (depending on arch).
+ if let Some(value) = self.code_model {
+ push_if_supported(format!("-mcmodel={value}").into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fno-vectorize
+ // https://gcc.gnu.org/onlinedocs/gnat_ugn/Vectorization-of-loops.html
+ if self.no_vectorize_loops {
+ push_if_supported("-fno-vectorize".into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fno-slp-vectorize
+ // https://gcc.gnu.org/onlinedocs/gnat_ugn/Vectorization-of-loops.html
+ if self.no_vectorize_slp {
+ push_if_supported("-fno-slp-vectorize".into());
+ }
+ if let Some(value) = self.relocation_model {
+ let cc_flag = match value {
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fPIC
+ // https://gcc.gnu.org/onlinedocs/gcc/Code-Gen-Options.html#index-fPIC
+ "pic" => Some("-fPIC"),
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fPIE
+ // https://gcc.gnu.org/onlinedocs/gcc/Code-Gen-Options.html#index-fPIE
+ "pie" => Some("-fPIE"),
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mdynamic-no-pic
+ // https://gcc.gnu.org/onlinedocs/gcc/RS_002f6000-and-PowerPC-Options.html#index-mdynamic-no-pic
+ "dynamic-no-pic" => Some("-mdynamic-no-pic"),
+ _ => None,
+ };
+ if let Some(cc_flag) = cc_flag {
+ push_if_supported(cc_flag.into());
+ }
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fno-omit-frame-pointer
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fomit-frame-pointer
+ // https://gcc.gnu.org/onlinedocs/gcc/Optimize-Options.html#index-fomit-frame-pointer
+ if let Some(value) = self.force_frame_pointers {
+ let cc_flag = if value {
+ "-fno-omit-frame-pointer"
+ } else {
+ "-fomit-frame-pointer"
+ };
+ push_if_supported(cc_flag.into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mno-red-zone
+ // https://gcc.gnu.org/onlinedocs/gcc/x86-Options.html#index-mno-red-zone
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mred-zone
+ // https://gcc.gnu.org/onlinedocs/gcc/x86-Options.html#index-mred-zone
+ if let Some(value) = self.no_redzone {
+ let cc_flag = if value { "-mno-red-zone" } else { "-mred-zone" };
+ push_if_supported(cc_flag.into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-msoft-float
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mhard-float
+ // https://gcc.gnu.org/onlinedocs/gcc/Option-Summary.html (several archs, search for `-msoft-float`).
+ // https://gcc.gnu.org/onlinedocs/gcc/Option-Summary.html (several archs, search for `-mhard-float`).
+ if let Some(value) = self.soft_float {
+ let cc_flag = if value {
+ "-msoft-float"
+ } else {
+ // Do not use -mno-soft-float, that's basically just an alias for -mno-implicit-float.
+ "-mhard-float"
+ };
+ push_if_supported(cc_flag.into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-gdwarf-2
+ // https://gcc.gnu.org/onlinedocs/gcc/Debugging-Options.html#index-gdwarf
+ if let Some(value) = self.dwarf_version {
+ push_if_supported(format!("-gdwarf-{value}").into());
+ }
+ }
+
+ // Compiler-exclusive flags
+ match family {
+ ToolFamily::Clang { .. } => {
+ // GNU and Clang compilers both support the same PGO flags, but they use different libraries and
+ // different formats for the profile files which are not compatible.
+ // clang and rustc both internally use llvm, so we want to inherit the PGO flags only for clang.
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fprofile-generate
+ if let Some(value) = self.profile_generate {
+ push_if_supported(format!("-fprofile-generate={value}").into());
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fprofile-use
+ if let Some(value) = self.profile_use {
+ push_if_supported(format!("-fprofile-use={value}").into());
+ }
+
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-fembed-bitcode
+ if let Some(value) = self.embed_bitcode {
+ let cc_val = if value { "all" } else { "off" };
+ push_if_supported(format!("-fembed-bitcode={cc_val}").into());
+ }
+
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-flto
+ if let Some(value) = self.lto {
+ let cc_val = match value {
+ "y" | "yes" | "on" | "true" | "fat" => Some("full"),
+ "thin" => Some("thin"),
+ _ => None,
+ };
+ if let Some(cc_val) = cc_val {
+ push_if_supported(format!("-flto={cc_val}").into());
+ }
+ }
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mguard
+ if let Some(value) = self.control_flow_guard {
+ let cc_val = match value {
+ "y" | "yes" | "on" | "true" | "checks" => Some("cf"),
+ "nochecks" => Some("cf-nochecks"),
+ "n" | "no" | "off" | "false" => Some("none"),
+ _ => None,
+ };
+ if let Some(cc_val) = cc_val {
+ push_if_supported(format!("-mguard={cc_val}").into());
+ }
+ }
+ }
+ ToolFamily::Gnu => {}
+ ToolFamily::Msvc { .. } => {
+ // https://learn.microsoft.com/en-us/cpp/build/reference/guard-enable-control-flow-guard
+ if let Some(value) = self.control_flow_guard {
+ let cc_val = match value {
+ "y" | "yes" | "on" | "true" | "checks" => Some("cf"),
+ "n" | "no" | "off" | "false" => Some("cf-"),
+ _ => None,
+ };
+ if let Some(cc_val) = cc_val {
+ push_if_supported(format!("/guard:{cc_val}").into());
+ }
+ }
+ // https://learn.microsoft.com/en-us/cpp/build/reference/oy-frame-pointer-omission
+ if let Some(value) = self.force_frame_pointers {
+ // Flag is unsupported on 64-bit arches
+ if !target.arch.contains("64") {
+ let cc_flag = if value { "/Oy-" } else { "/Oy" };
+ push_if_supported(cc_flag.into());
+ }
+ }
+ }
+ }
+ }
+}
+
+#[cfg(test)]
+mod tests {
+ use super::*;
+
+ #[track_caller]
+ fn check(env: &str, expected: &RustcCodegenFlags) {
+ let actual = RustcCodegenFlags::parse(env).unwrap();
+ assert_eq!(actual, *expected);
+ }
+
+ #[test]
+ fn codegen_type() {
+ let expected = RustcCodegenFlags {
+ code_model: Some("tiny"),
+ ..RustcCodegenFlags::default()
+ };
+ check("-Ccode-model=tiny", &expected);
+ check("-C\u{1f}code-model=tiny", &expected);
+ check("--codegen\u{1f}code-model=tiny", &expected);
+ check("--codegen=code-model=tiny", &expected);
+ }
+
+ #[test]
+ fn precedence() {
+ check(
+ "-ccode-model=tiny\u{1f}-Ccode-model=small",
+ &RustcCodegenFlags {
+ code_model: Some("small"),
+ ..RustcCodegenFlags::default()
+ },
+ );
+ }
+
+ #[test]
+ fn two_valid_prefixes() {
+ let expected = RustcCodegenFlags::default();
+ check("-L\u{1f}-Clto", &expected);
+ }
+
+ #[test]
+ fn three_valid_prefixes() {
+ let expected = RustcCodegenFlags {
+ lto: Some("true"),
+ ..RustcCodegenFlags::default()
+ };
+ check("-L\u{1f}-L\u{1f}-Clto", &expected);
+ }
+
+ #[test]
+ fn all_rustc_flags() {
+ // Throw all possible flags at the parser to catch false positives
+ let flags = [
+ // Set all the flags we recognise first
+ "-Ccode-model=tiny",
+ "-Ccontrol-flow-guard=yes",
+ "-Cembed-bitcode=no",
+ "-Cforce-frame-pointers=yes",
+ "-Clto=false",
+ "-Clink-dead-code=yes",
+ "-Cno-redzone=yes",
+ "-Cno-vectorize-loops",
+ "-Cno-vectorize-slp",
+ "-Cprofile-generate=fooprofile",
+ "-Cprofile-use=fooprofile",
+ "-Crelocation-model=pic",
+ "-Csoft-float=yes",
+ "-Zbranch-protection=bti,pac-ret,leaf",
+ "-Zdwarf-version=5",
+ // Set flags we don't recognise but rustc supports next
+ // rustc flags
+ "--cfg",
+ "a",
+ "--check-cfg 'cfg(verbose)",
+ "-L",
+ "/usr/lib/foo",
+ "-l",
+ "static:+whole-archive=mylib",
+ "--crate-type=dylib",
+ "--crate-name=foo",
+ "--edition=2021",
+ "--emit=asm",
+ "--print=crate-name",
+ "-g",
+ "-O",
+ "-o",
+ "foooutput",
+ "--out-dir",
+ "foooutdir",
+ "--target",
+ "aarch64-unknown-linux-gnu",
+ "-W",
+ "missing-docs",
+ "-D",
+ "unused-variables",
+ "--force-warn",
+ "dead-code",
+ "-A",
+ "unused",
+ "-F",
+ "unused",
+ "--cap-lints",
+ "warn",
+ "--version",
+ "--verbose",
+ "-v",
+ "--extern",
+ "foocrate",
+ "--sysroot",
+ "fooroot",
+ "--error-format",
+ "human",
+ "--color",
+ "auto",
+ "--diagnostic-width",
+ "80",
+ "--remap-path-prefix",
+ "foo=bar",
+ "--json=artifact",
+ // Codegen flags
+ "-Car",
+ "-Ccodegen-units=1",
+ "-Ccollapse-macro-debuginfo=yes",
+ "-Cdebug-assertions=yes",
+ "-Cdebuginfo=1",
+ "-Cdefault-linker-libraries=yes",
+ "-Cdlltool=foo",
+ "-Cextra-filename=foo",
+ "-Cforce-unwind-tables=yes",
+ "-Cincremental=foodir",
+ "-Cinline-threshold=6",
+ "-Cinstrument-coverage",
+ "-Clink-arg=-foo",
+ "-Clink-args=-foo",
+ "-Clink-self-contained=yes",
+ "-Clinker=lld",
+ "-Clinker-flavor=ld.lld",
+ "-Clinker-plugin-lto=yes",
+ "-Cllvm-args=foo",
+ "-Cmetadata=foo",
+ "-Cno-prepopulate-passes",
+ "-Cno-stack-check",
+ "-Copt-level=3",
+ "-Coverflow-checks=yes",
+ "-Cpanic=abort",
+ "-Cpasses=foopass",
+ "-Cprefer-dynamic=yes",
+ "-Crelro-level=partial",
+ "-Cremark=all",
+ "-Crpath=yes",
+ "-Csave-temps=yes",
+ "-Csplit-debuginfo=packed",
+ "-Cstrip=symbols",
+ "-Csymbol-mangling-version=v0",
+ "-Ctarget-cpu=native",
+ "-Ctarget-feature=+sve",
+ // Unstable options
+ "-Ztune-cpu=machine",
+ ];
+ check(
+ &flags.join("\u{1f}"),
+ &RustcCodegenFlags {
+ code_model: Some("tiny"),
+ control_flow_guard: Some("yes"),
+ embed_bitcode: Some(false),
+ force_frame_pointers: Some(true),
+ lto: Some("false"),
+ no_redzone: Some(true),
+ no_vectorize_loops: true,
+ no_vectorize_slp: true,
+ profile_generate: Some("fooprofile"),
+ profile_use: Some("fooprofile"),
+ relocation_model: Some("pic"),
+ soft_float: Some(true),
+ branch_protection: Some("bti,pac-ret,leaf"),
+ dwarf_version: Some(5),
+ },
+ );
+ }
+}
diff --git a/vendor/cc/src/lib.rs b/vendor/cc/src/lib.rs
new file mode 100644
index 00000000..78e12f87
--- /dev/null
+++ b/vendor/cc/src/lib.rs
@@ -0,0 +1,4335 @@
+//! A library for [Cargo build scripts](https://doc.rust-lang.org/cargo/reference/build-scripts.html)
+//! to compile a set of C/C++/assembly/CUDA files into a static archive for Cargo
+//! to link into the crate being built. This crate does not compile code itself;
+//! it calls out to the default compiler for the platform. This crate will
+//! automatically detect situations such as cross compilation and
+//! [various environment variables](#external-configuration-via-environment-variables) and will build code appropriately.
+//!
+//! # Example
+//!
+//! First, you'll want to both add a build script for your crate (`build.rs`) and
+//! also add this crate to your `Cargo.toml` via:
+//!
+//! ```toml
+//! [build-dependencies]
+//! cc = "1.0"
+//! ```
+//!
+//! Next up, you'll want to write a build script like so:
+//!
+//! ```rust,no_run
+//! // build.rs
+//! cc::Build::new()
+//! .file("foo.c")
+//! .file("bar.c")
+//! .compile("foo");
+//! ```
+//!
+//! And that's it! Running `cargo build` should take care of the rest and your Rust
+//! application will now have the C files `foo.c` and `bar.c` compiled into a file
+//! named `libfoo.a`. If the C files contain
+//!
+//! ```c
+//! void foo_function(void) { ... }
+//! ```
+//!
+//! and
+//!
+//! ```c
+//! int32_t bar_function(int32_t x) { ... }
+//! ```
+//!
+//! you can call them from Rust by declaring them in
+//! your Rust code like so:
+//!
+//! ```rust,no_run
+//! extern "C" {
+//! fn foo_function();
+//! fn bar_function(x: i32) -> i32;
+//! }
+//!
+//! pub fn call() {
+//! unsafe {
+//! foo_function();
+//! bar_function(42);
+//! }
+//! }
+//!
+//! fn main() {
+//! call();
+//! }
+//! ```
+//!
+//! See [the Rustonomicon](https://doc.rust-lang.org/nomicon/ffi.html) for more details.
+//!
+//! # External configuration via environment variables
+//!
+//! To control the programs and flags used for building, the builder can set a
+//! number of different environment variables.
+//!
+//! * `CFLAGS` - a series of space separated flags passed to compilers. Note that
+//! individual flags cannot currently contain spaces, so doing
+//! something like: `-L=foo\ bar` is not possible.
+//! * `CC` - the actual C compiler used. Note that this is used as an exact
+//! executable name, so (for example) no extra flags can be passed inside
+//! this variable, and the builder must ensure that there aren't any
+//! trailing spaces. This compiler must understand the `-c` flag. For
+//! certain `TARGET`s, it also is assumed to know about other flags (most
+//! common is `-fPIC`).
+//! * `AR` - the `ar` (archiver) executable to use to build the static library.
+//! * `CRATE_CC_NO_DEFAULTS` - the default compiler flags may cause conflicts in
+//! some cross compiling scenarios. Setting this variable
+//! will disable the generation of default compiler
+//! flags.
+//! * `CC_ENABLE_DEBUG_OUTPUT` - if set, compiler command invocations and exit codes will
+//! be logged to stdout. This is useful for debugging build script issues, but can be
+//! overly verbose for normal use.
+//! * `CC_SHELL_ESCAPED_FLAGS` - if set, `*FLAGS` will be parsed as if they were shell
+//! arguments (similar to `make` and `cmake`) rather than splitting them on each space.
+//! For example, with `CFLAGS='a "b c"'`, the compiler will be invoked with 2 arguments -
+//! `a` and `b c` - rather than 3: `a`, `"b` and `c"`.
+//! * `CXX...` - see [C++ Support](#c-support).
+//! * `CC_FORCE_DISABLE` - If set, `cc` will never run any [`Command`]s, and methods that
+//! would return an [`Error`]. This is intended for use by third-party build systems
+//! which want to be absolutely sure that they are in control of building all
+//! dependencies. Note that operations that return [`Tool`]s such as
+//! [`Build::get_compiler`] may produce less accurate results as in some cases `cc` runs
+//! commands in order to locate compilers. Additionally, this does nothing to prevent
+//! users from running [`Tool::to_command`] and executing the [`Command`] themselves.//!
+//!
+//! Furthermore, projects using this crate may specify custom environment variables
+//! to be inspected, for example via the `Build::try_flags_from_environment`
+//! function. Consult the project’s own documentation or its use of the `cc` crate
+//! for any additional variables it may use.
+//!
+//! Each of these variables can also be supplied with certain prefixes and suffixes,
+//! in the following prioritized order:
+//!
+//! 1. `<var>_<target>` - for example, `CC_x86_64-unknown-linux-gnu`
+//! 2. `<var>_<target_with_underscores>` - for example, `CC_x86_64_unknown_linux_gnu`
+//! 3. `<build-kind>_<var>` - for example, `HOST_CC` or `TARGET_CFLAGS`
+//! 4. `<var>` - a plain `CC`, `AR` as above.
+//!
+//! If none of these variables exist, cc-rs uses built-in defaults.
+//!
+//! In addition to the above optional environment variables, `cc-rs` has some
+//! functions with hard requirements on some variables supplied by [cargo's
+//! build-script driver][cargo] that it has the `TARGET`, `OUT_DIR`, `OPT_LEVEL`,
+//! and `HOST` variables.
+//!
+//! [cargo]: https://doc.rust-lang.org/cargo/reference/build-scripts.html#inputs-to-the-build-script
+//!
+//! # Optional features
+//!
+//! ## Parallel
+//!
+//! Currently cc-rs supports parallel compilation (think `make -jN`) but this
+//! feature is turned off by default. To enable cc-rs to compile C/C++ in parallel,
+//! you can change your dependency to:
+//!
+//! ```toml
+//! [build-dependencies]
+//! cc = { version = "1.0", features = ["parallel"] }
+//! ```
+//!
+//! By default cc-rs will limit parallelism to `$NUM_JOBS`, or if not present it
+//! will limit it to the number of cpus on the machine. If you are using cargo,
+//! use `-jN` option of `build`, `test` and `run` commands as `$NUM_JOBS`
+//! is supplied by cargo.
+//!
+//! # Compile-time Requirements
+//!
+//! To work properly this crate needs access to a C compiler when the build script
+//! is being run. This crate does not ship a C compiler with it. The compiler
+//! required varies per platform, but there are three broad categories:
+//!
+//! * Unix platforms require `cc` to be the C compiler. This can be found by
+//! installing cc/clang on Linux distributions and Xcode on macOS, for example.
+//! * Windows platforms targeting MSVC (e.g. your target name ends in `-msvc`)
+//! require Visual Studio to be installed. `cc-rs` attempts to locate it, and
+//! if it fails, `cl.exe` is expected to be available in `PATH`. This can be
+//! set up by running the appropriate developer tools shell.
+//! * Windows platforms targeting MinGW (e.g. your target name ends in `-gnu`)
+//! require `cc` to be available in `PATH`. We recommend the
+//! [MinGW-w64](https://www.mingw-w64.org/) distribution.
+//! You may also acquire it via
+//! [MSYS2](https://www.msys2.org/), as explained [here][msys2-help]. Make sure
+//! to install the appropriate architecture corresponding to your installation of
+//! rustc. GCC from older [MinGW](http://www.mingw.org/) project is compatible
+//! only with 32-bit rust compiler.
+//!
+//! [msys2-help]: https://github.com/rust-lang/rust/blob/master/INSTALL.md#building-on-windows
+//!
+//! # C++ support
+//!
+//! `cc-rs` supports C++ libraries compilation by using the `cpp` method on
+//! `Build`:
+//!
+//! ```rust,no_run
+//! cc::Build::new()
+//! .cpp(true) // Switch to C++ library compilation.
+//! .file("foo.cpp")
+//! .compile("foo");
+//! ```
+//!
+//! For C++ libraries, the `CXX` and `CXXFLAGS` environment variables are used instead of `CC` and `CFLAGS`.
+//!
+//! The C++ standard library may be linked to the crate target. By default it's `libc++` for macOS, FreeBSD, and OpenBSD, `libc++_shared` for Android, nothing for MSVC, and `libstdc++` for anything else. It can be changed in one of two ways:
+//!
+//! 1. by using the `cpp_link_stdlib` method on `Build`:
+//! ```rust,no_run
+//! cc::Build::new()
+//! .cpp(true)
+//! .file("foo.cpp")
+//! .cpp_link_stdlib("stdc++") // use libstdc++
+//! .compile("foo");
+//! ```
+//! 2. by setting the `CXXSTDLIB` environment variable.
+//!
+//! In particular, for Android you may want to [use `c++_static` if you have at most one shared library](https://developer.android.com/ndk/guides/cpp-support).
+//!
+//! Remember that C++ does name mangling so `extern "C"` might be required to enable Rust linker to find your functions.
+//!
+//! # CUDA C++ support
+//!
+//! `cc-rs` also supports compiling CUDA C++ libraries by using the `cuda` method
+//! on `Build`:
+//!
+//! ```rust,no_run
+//! cc::Build::new()
+//! // Switch to CUDA C++ library compilation using NVCC.
+//! .cuda(true)
+//! .cudart("static")
+//! // Generate code for Maxwell (GTX 970, 980, 980 Ti, Titan X).
+//! .flag("-gencode").flag("arch=compute_52,code=sm_52")
+//! // Generate code for Maxwell (Jetson TX1).
+//! .flag("-gencode").flag("arch=compute_53,code=sm_53")
+//! // Generate code for Pascal (GTX 1070, 1080, 1080 Ti, Titan Xp).
+//! .flag("-gencode").flag("arch=compute_61,code=sm_61")
+//! // Generate code for Pascal (Tesla P100).
+//! .flag("-gencode").flag("arch=compute_60,code=sm_60")
+//! // Generate code for Pascal (Jetson TX2).
+//! .flag("-gencode").flag("arch=compute_62,code=sm_62")
+//! // Generate code in parallel
+//! .flag("-t0")
+//! .file("bar.cu")
+//! .compile("bar");
+//! ```
+
+#![doc(html_root_url = "https://docs.rs/cc/1.0")]
+#![deny(warnings)]
+#![deny(missing_docs)]
+#![deny(clippy::disallowed_methods)]
+#![warn(clippy::doc_markdown)]
+
+use std::borrow::Cow;
+use std::collections::HashMap;
+use std::env;
+use std::ffi::{OsStr, OsString};
+use std::fmt::{self, Display};
+use std::fs;
+use std::io::{self, Write};
+use std::path::{Component, Path, PathBuf};
+#[cfg(feature = "parallel")]
+use std::process::Child;
+use std::process::{Command, Stdio};
+use std::sync::{
+ atomic::{AtomicU8, Ordering::Relaxed},
+ Arc, RwLock,
+};
+
+use shlex::Shlex;
+
+#[cfg(feature = "parallel")]
+mod parallel;
+mod target;
+mod windows;
+use self::target::TargetInfo;
+// Regardless of whether this should be in this crate's public API,
+// it has been since 2015, so don't break it.
+pub use windows::find_tools as windows_registry;
+
+mod command_helpers;
+use command_helpers::*;
+
+mod tool;
+pub use tool::Tool;
+use tool::{CompilerFamilyLookupCache, ToolFamily};
+
+mod tempfile;
+
+mod utilities;
+use utilities::*;
+
+mod flags;
+use flags::*;
+
+#[derive(Debug, Eq, PartialEq, Hash)]
+struct CompilerFlag {
+ compiler: Box<Path>,
+ flag: Box<OsStr>,
+}
+
+type Env = Option<Arc<OsStr>>;
+
+#[derive(Debug, Default)]
+struct BuildCache {
+ env_cache: RwLock<HashMap<Box<str>, Env>>,
+ apple_sdk_root_cache: RwLock<HashMap<Box<str>, Arc<OsStr>>>,
+ apple_versions_cache: RwLock<HashMap<Box<str>, Arc<str>>>,
+ cached_compiler_family: RwLock<CompilerFamilyLookupCache>,
+ known_flag_support_status_cache: RwLock<HashMap<CompilerFlag, bool>>,
+ target_info_parser: target::TargetInfoParser,
+}
+
+/// A builder for compilation of a native library.
+///
+/// A `Build` is the main type of the `cc` crate and is used to control all the
+/// various configuration options and such of a compile. You'll find more
+/// documentation on each method itself.
+#[derive(Clone, Debug)]
+pub struct Build {
+ include_directories: Vec<Arc<Path>>,
+ definitions: Vec<(Arc<str>, Option<Arc<str>>)>,
+ objects: Vec<Arc<Path>>,
+ flags: Vec<Arc<OsStr>>,
+ flags_supported: Vec<Arc<OsStr>>,
+ ar_flags: Vec<Arc<OsStr>>,
+ asm_flags: Vec<Arc<OsStr>>,
+ no_default_flags: bool,
+ files: Vec<Arc<Path>>,
+ cpp: bool,
+ cpp_link_stdlib: Option<Option<Arc<str>>>,
+ cpp_set_stdlib: Option<Arc<str>>,
+ cuda: bool,
+ cudart: Option<Arc<str>>,
+ ccbin: bool,
+ std: Option<Arc<str>>,
+ target: Option<Arc<str>>,
+ /// The host compiler.
+ ///
+ /// Try to not access this directly, and instead prefer `cfg!(...)`.
+ host: Option<Arc<str>>,
+ out_dir: Option<Arc<Path>>,
+ opt_level: Option<Arc<str>>,
+ debug: Option<bool>,
+ force_frame_pointer: Option<bool>,
+ env: Vec<(Arc<OsStr>, Arc<OsStr>)>,
+ compiler: Option<Arc<Path>>,
+ archiver: Option<Arc<Path>>,
+ ranlib: Option<Arc<Path>>,
+ cargo_output: CargoOutput,
+ link_lib_modifiers: Vec<Arc<OsStr>>,
+ pic: Option<bool>,
+ use_plt: Option<bool>,
+ static_crt: Option<bool>,
+ shared_flag: Option<bool>,
+ static_flag: Option<bool>,
+ warnings_into_errors: bool,
+ warnings: Option<bool>,
+ extra_warnings: Option<bool>,
+ emit_rerun_if_env_changed: bool,
+ shell_escaped_flags: Option<bool>,
+ build_cache: Arc<BuildCache>,
+ inherit_rustflags: bool,
+}
+
+/// Represents the types of errors that may occur while using cc-rs.
+#[derive(Clone, Debug)]
+enum ErrorKind {
+ /// Error occurred while performing I/O.
+ IOError,
+ /// Environment variable not found, with the var in question as extra info.
+ EnvVarNotFound,
+ /// Error occurred while using external tools (ie: invocation of compiler).
+ ToolExecError,
+ /// Error occurred due to missing external tools.
+ ToolNotFound,
+ /// One of the function arguments failed validation.
+ InvalidArgument,
+ /// No known macro is defined for the compiler when discovering tool family.
+ ToolFamilyMacroNotFound,
+ /// Invalid target.
+ InvalidTarget,
+ /// Unknown target.
+ UnknownTarget,
+ /// Invalid rustc flag.
+ InvalidFlag,
+ #[cfg(feature = "parallel")]
+ /// jobserver helpthread failure
+ JobserverHelpThreadError,
+ /// `cc` has been disabled by an environment variable.
+ Disabled,
+}
+
+/// Represents an internal error that occurred, with an explanation.
+#[derive(Clone, Debug)]
+pub struct Error {
+ /// Describes the kind of error that occurred.
+ kind: ErrorKind,
+ /// More explanation of error that occurred.
+ message: Cow<'static, str>,
+}
+
+impl Error {
+ fn new(kind: ErrorKind, message: impl Into<Cow<'static, str>>) -> Error {
+ Error {
+ kind,
+ message: message.into(),
+ }
+ }
+}
+
+impl From<io::Error> for Error {
+ fn from(e: io::Error) -> Error {
+ Error::new(ErrorKind::IOError, format!("{}", e))
+ }
+}
+
+impl Display for Error {
+ fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
+ write!(f, "{:?}: {}", self.kind, self.message)
+ }
+}
+
+impl std::error::Error for Error {}
+
+/// Represents an object.
+///
+/// This is a source file -> object file pair.
+#[derive(Clone, Debug)]
+struct Object {
+ src: PathBuf,
+ dst: PathBuf,
+}
+
+impl Object {
+ /// Create a new source file -> object file pair.
+ fn new(src: PathBuf, dst: PathBuf) -> Object {
+ Object { src, dst }
+ }
+}
+
+/// Configure the builder.
+impl Build {
+ /// Construct a new instance of a blank set of configuration.
+ ///
+ /// This builder is finished with the [`compile`] function.
+ ///
+ /// [`compile`]: struct.Build.html#method.compile
+ pub fn new() -> Build {
+ Build {
+ include_directories: Vec::new(),
+ definitions: Vec::new(),
+ objects: Vec::new(),
+ flags: Vec::new(),
+ flags_supported: Vec::new(),
+ ar_flags: Vec::new(),
+ asm_flags: Vec::new(),
+ no_default_flags: false,
+ files: Vec::new(),
+ shared_flag: None,
+ static_flag: None,
+ cpp: false,
+ cpp_link_stdlib: None,
+ cpp_set_stdlib: None,
+ cuda: false,
+ cudart: None,
+ ccbin: true,
+ std: None,
+ target: None,
+ host: None,
+ out_dir: None,
+ opt_level: None,
+ debug: None,
+ force_frame_pointer: None,
+ env: Vec::new(),
+ compiler: None,
+ archiver: None,
+ ranlib: None,
+ cargo_output: CargoOutput::new(),
+ link_lib_modifiers: Vec::new(),
+ pic: None,
+ use_plt: None,
+ static_crt: None,
+ warnings: None,
+ extra_warnings: None,
+ warnings_into_errors: false,
+ emit_rerun_if_env_changed: true,
+ shell_escaped_flags: None,
+ build_cache: Arc::default(),
+ inherit_rustflags: true,
+ }
+ }
+
+ /// Add a directory to the `-I` or include path for headers
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// use std::path::Path;
+ ///
+ /// let library_path = Path::new("/path/to/library");
+ ///
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .include(library_path)
+ /// .include("src")
+ /// .compile("foo");
+ /// ```
+ pub fn include<P: AsRef<Path>>(&mut self, dir: P) -> &mut Build {
+ self.include_directories.push(dir.as_ref().into());
+ self
+ }
+
+ /// Add multiple directories to the `-I` include path.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// # use std::path::Path;
+ /// # let condition = true;
+ /// #
+ /// let mut extra_dir = None;
+ /// if condition {
+ /// extra_dir = Some(Path::new("/path/to"));
+ /// }
+ ///
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .includes(extra_dir)
+ /// .compile("foo");
+ /// ```
+ pub fn includes<P>(&mut self, dirs: P) -> &mut Build
+ where
+ P: IntoIterator,
+ P::Item: AsRef<Path>,
+ {
+ for dir in dirs {
+ self.include(dir);
+ }
+ self
+ }
+
+ /// Specify a `-D` variable with an optional value.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .define("FOO", "BAR")
+ /// .define("BAZ", None)
+ /// .compile("foo");
+ /// ```
+ pub fn define<'a, V: Into<Option<&'a str>>>(&mut self, var: &str, val: V) -> &mut Build {
+ self.definitions
+ .push((var.into(), val.into().map(Into::into)));
+ self
+ }
+
+ /// Add an arbitrary object file to link in
+ pub fn object<P: AsRef<Path>>(&mut self, obj: P) -> &mut Build {
+ self.objects.push(obj.as_ref().into());
+ self
+ }
+
+ /// Add arbitrary object files to link in
+ pub fn objects<P>(&mut self, objs: P) -> &mut Build
+ where
+ P: IntoIterator,
+ P::Item: AsRef<Path>,
+ {
+ for obj in objs {
+ self.object(obj);
+ }
+ self
+ }
+
+ /// Add an arbitrary flag to the invocation of the compiler
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .flag("-ffunction-sections")
+ /// .compile("foo");
+ /// ```
+ pub fn flag(&mut self, flag: impl AsRef<OsStr>) -> &mut Build {
+ self.flags.push(flag.as_ref().into());
+ self
+ }
+
+ /// Add multiple flags to the invocation of the compiler.
+ /// This is equivalent to calling [`flag`](Self::flag) for each item in the iterator.
+ ///
+ /// # Example
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .flags(["-Wall", "-Wextra"])
+ /// .compile("foo");
+ /// ```
+ pub fn flags<Iter>(&mut self, flags: Iter) -> &mut Build
+ where
+ Iter: IntoIterator,
+ Iter::Item: AsRef<OsStr>,
+ {
+ for flag in flags {
+ self.flag(flag);
+ }
+ self
+ }
+
+ /// Removes a compiler flag that was added by [`Build::flag`].
+ ///
+ /// Will not remove flags added by other means (default flags,
+ /// flags from env, and so on).
+ ///
+ /// # Example
+ /// ```
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .flag("unwanted_flag")
+ /// .remove_flag("unwanted_flag");
+ /// ```
+ pub fn remove_flag(&mut self, flag: &str) -> &mut Build {
+ self.flags.retain(|other_flag| &**other_flag != flag);
+ self
+ }
+
+ /// Add a flag to the invocation of the ar
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .file("src/bar.c")
+ /// .ar_flag("/NODEFAULTLIB:libc.dll")
+ /// .compile("foo");
+ /// ```
+ pub fn ar_flag(&mut self, flag: impl AsRef<OsStr>) -> &mut Build {
+ self.ar_flags.push(flag.as_ref().into());
+ self
+ }
+
+ /// Add a flag that will only be used with assembly files.
+ ///
+ /// The flag will be applied to input files with either a `.s` or
+ /// `.asm` extension (case insensitive).
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .asm_flag("-Wa,-defsym,abc=1")
+ /// .file("src/foo.S") // The asm flag will be applied here
+ /// .file("src/bar.c") // The asm flag will not be applied here
+ /// .compile("foo");
+ /// ```
+ pub fn asm_flag(&mut self, flag: impl AsRef<OsStr>) -> &mut Build {
+ self.asm_flags.push(flag.as_ref().into());
+ self
+ }
+
+ /// Add an arbitrary flag to the invocation of the compiler if it supports it
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .flag_if_supported("-Wlogical-op") // only supported by GCC
+ /// .flag_if_supported("-Wunreachable-code") // only supported by clang
+ /// .compile("foo");
+ /// ```
+ pub fn flag_if_supported(&mut self, flag: impl AsRef<OsStr>) -> &mut Build {
+ self.flags_supported.push(flag.as_ref().into());
+ self
+ }
+
+ /// Add flags from the specified environment variable.
+ ///
+ /// Normally the `cc` crate will consult with the standard set of environment
+ /// variables (such as `CFLAGS` and `CXXFLAGS`) to construct the compiler invocation. Use of
+ /// this method provides additional levers for the end user to use when configuring the build
+ /// process.
+ ///
+ /// Just like the standard variables, this method will search for an environment variable with
+ /// appropriate target prefixes, when appropriate.
+ ///
+ /// # Examples
+ ///
+ /// This method is particularly beneficial in introducing the ability to specify crate-specific
+ /// flags.
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .try_flags_from_environment(concat!(env!("CARGO_PKG_NAME"), "_CFLAGS"))
+ /// .expect("the environment variable must be specified and UTF-8")
+ /// .compile("foo");
+ /// ```
+ ///
+ pub fn try_flags_from_environment(&mut self, environ_key: &str) -> Result<&mut Build, Error> {
+ let flags = self.envflags(environ_key)?.ok_or_else(|| {
+ Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("could not find environment variable {environ_key}"),
+ )
+ })?;
+ self.flags.extend(
+ flags
+ .into_iter()
+ .map(|flag| Arc::from(OsString::from(flag).as_os_str())),
+ );
+ Ok(self)
+ }
+
+ /// Set the `-shared` flag.
+ ///
+ /// When enabled, the compiler will produce a shared object which can
+ /// then be linked with other objects to form an executable.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .shared_flag(true)
+ /// .compile("libfoo.so");
+ /// ```
+ pub fn shared_flag(&mut self, shared_flag: bool) -> &mut Build {
+ self.shared_flag = Some(shared_flag);
+ self
+ }
+
+ /// Set the `-static` flag.
+ ///
+ /// When enabled on systems that support dynamic linking, this prevents
+ /// linking with the shared libraries.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .shared_flag(true)
+ /// .static_flag(true)
+ /// .compile("foo");
+ /// ```
+ pub fn static_flag(&mut self, static_flag: bool) -> &mut Build {
+ self.static_flag = Some(static_flag);
+ self
+ }
+
+ /// Disables the generation of default compiler flags. The default compiler
+ /// flags may cause conflicts in some cross compiling scenarios.
+ ///
+ /// Setting the `CRATE_CC_NO_DEFAULTS` environment variable has the same
+ /// effect as setting this to `true`. The presence of the environment
+ /// variable and the value of `no_default_flags` will be OR'd together.
+ pub fn no_default_flags(&mut self, no_default_flags: bool) -> &mut Build {
+ self.no_default_flags = no_default_flags;
+ self
+ }
+
+ /// Add a file which will be compiled
+ pub fn file<P: AsRef<Path>>(&mut self, p: P) -> &mut Build {
+ self.files.push(p.as_ref().into());
+ self
+ }
+
+ /// Add files which will be compiled
+ pub fn files<P>(&mut self, p: P) -> &mut Build
+ where
+ P: IntoIterator,
+ P::Item: AsRef<Path>,
+ {
+ for file in p.into_iter() {
+ self.file(file);
+ }
+ self
+ }
+
+ /// Get the files which will be compiled
+ pub fn get_files(&self) -> impl Iterator<Item = &Path> {
+ self.files.iter().map(AsRef::as_ref)
+ }
+
+ /// Set C++ support.
+ ///
+ /// The other `cpp_*` options will only become active if this is set to
+ /// `true`.
+ ///
+ /// The name of the C++ standard library to link is decided by:
+ /// 1. If [`cpp_link_stdlib`](Build::cpp_link_stdlib) is set, use its value.
+ /// 2. Else if the `CXXSTDLIB` environment variable is set, use its value.
+ /// 3. Else the default is `c++` for OS X and BSDs, `c++_shared` for Android,
+ /// `None` for MSVC and `stdc++` for anything else.
+ pub fn cpp(&mut self, cpp: bool) -> &mut Build {
+ self.cpp = cpp;
+ self
+ }
+
+ /// Set CUDA C++ support.
+ ///
+ /// Enabling CUDA will invoke the CUDA compiler, NVCC. While NVCC accepts
+ /// the most common compiler flags, e.g. `-std=c++17`, some project-specific
+ /// flags might have to be prefixed with "-Xcompiler" flag, for example as
+ /// `.flag("-Xcompiler").flag("-fpermissive")`. See the documentation for
+ /// `nvcc`, the CUDA compiler driver, at <https://docs.nvidia.com/cuda/cuda-compiler-driver-nvcc/>
+ /// for more information.
+ ///
+ /// If enabled, this also implicitly enables C++ support.
+ pub fn cuda(&mut self, cuda: bool) -> &mut Build {
+ self.cuda = cuda;
+ if cuda {
+ self.cpp = true;
+ self.cudart = Some("static".into());
+ }
+ self
+ }
+
+ /// Link CUDA run-time.
+ ///
+ /// This option mimics the `--cudart` NVCC command-line option. Just like
+ /// the original it accepts `{none|shared|static}`, with default being
+ /// `static`. The method has to be invoked after `.cuda(true)`, or not
+ /// at all, if the default is right for the project.
+ pub fn cudart(&mut self, cudart: &str) -> &mut Build {
+ if self.cuda {
+ self.cudart = Some(cudart.into());
+ }
+ self
+ }
+
+ /// Set CUDA host compiler.
+ ///
+ /// By default, a `-ccbin` flag will be passed to NVCC to specify the
+ /// underlying host compiler. The value of `-ccbin` is the same as the
+ /// chosen C++ compiler. This is not always desired, because NVCC might
+ /// not support that compiler. In this case, you can remove the `-ccbin`
+ /// flag so that NVCC will choose the host compiler by itself.
+ pub fn ccbin(&mut self, ccbin: bool) -> &mut Build {
+ self.ccbin = ccbin;
+ self
+ }
+
+ /// Specify the C or C++ language standard version.
+ ///
+ /// These values are common to modern versions of GCC, Clang and MSVC:
+ /// - `c11` for ISO/IEC 9899:2011
+ /// - `c17` for ISO/IEC 9899:2018
+ /// - `c++14` for ISO/IEC 14882:2014
+ /// - `c++17` for ISO/IEC 14882:2017
+ /// - `c++20` for ISO/IEC 14882:2020
+ ///
+ /// Other values have less broad support, e.g. MSVC does not support `c++11`
+ /// (`c++14` is the minimum), `c89` (omit the flag instead) or `c99`.
+ ///
+ /// For compiling C++ code, you should also set `.cpp(true)`.
+ ///
+ /// The default is that no standard flag is passed to the compiler, so the
+ /// language version will be the compiler's default.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/modern.cpp")
+ /// .cpp(true)
+ /// .std("c++17")
+ /// .compile("modern");
+ /// ```
+ pub fn std(&mut self, std: &str) -> &mut Build {
+ self.std = Some(std.into());
+ self
+ }
+
+ /// Set warnings into errors flag.
+ ///
+ /// Disabled by default.
+ ///
+ /// Warning: turning warnings into errors only make sense
+ /// if you are a developer of the crate using cc-rs.
+ /// Some warnings only appear on some architecture or
+ /// specific version of the compiler. Any user of this crate,
+ /// or any other crate depending on it, could fail during
+ /// compile time.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .warnings_into_errors(true)
+ /// .compile("libfoo.a");
+ /// ```
+ pub fn warnings_into_errors(&mut self, warnings_into_errors: bool) -> &mut Build {
+ self.warnings_into_errors = warnings_into_errors;
+ self
+ }
+
+ /// Set warnings flags.
+ ///
+ /// Adds some flags:
+ /// - "-Wall" for MSVC.
+ /// - "-Wall", "-Wextra" for GNU and Clang.
+ ///
+ /// Enabled by default.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .warnings(false)
+ /// .compile("libfoo.a");
+ /// ```
+ pub fn warnings(&mut self, warnings: bool) -> &mut Build {
+ self.warnings = Some(warnings);
+ self.extra_warnings = Some(warnings);
+ self
+ }
+
+ /// Set extra warnings flags.
+ ///
+ /// Adds some flags:
+ /// - nothing for MSVC.
+ /// - "-Wextra" for GNU and Clang.
+ ///
+ /// Enabled by default.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// // Disables -Wextra, -Wall remains enabled:
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .extra_warnings(false)
+ /// .compile("libfoo.a");
+ /// ```
+ pub fn extra_warnings(&mut self, warnings: bool) -> &mut Build {
+ self.extra_warnings = Some(warnings);
+ self
+ }
+
+ /// Set the standard library to link against when compiling with C++
+ /// support.
+ ///
+ /// If the `CXXSTDLIB` environment variable is set, its value will
+ /// override the default value, but not the value explicitly set by calling
+ /// this function.
+ ///
+ /// A value of `None` indicates that no automatic linking should happen,
+ /// otherwise cargo will link against the specified library.
+ ///
+ /// The given library name must not contain the `lib` prefix.
+ ///
+ /// Common values:
+ /// - `stdc++` for GNU
+ /// - `c++` for Clang
+ /// - `c++_shared` or `c++_static` for Android
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .shared_flag(true)
+ /// .cpp_link_stdlib("stdc++")
+ /// .compile("libfoo.so");
+ /// ```
+ pub fn cpp_link_stdlib<'a, V: Into<Option<&'a str>>>(
+ &mut self,
+ cpp_link_stdlib: V,
+ ) -> &mut Build {
+ self.cpp_link_stdlib = Some(cpp_link_stdlib.into().map(Arc::from));
+ self
+ }
+
+ /// Force the C++ compiler to use the specified standard library.
+ ///
+ /// Setting this option will automatically set `cpp_link_stdlib` to the same
+ /// value.
+ ///
+ /// The default value of this option is always `None`.
+ ///
+ /// This option has no effect when compiling for a Visual Studio based
+ /// target.
+ ///
+ /// This option sets the `-stdlib` flag, which is only supported by some
+ /// compilers (clang, icc) but not by others (gcc). The library will not
+ /// detect which compiler is used, as such it is the responsibility of the
+ /// caller to ensure that this option is only used in conjunction with a
+ /// compiler which supports the `-stdlib` flag.
+ ///
+ /// A value of `None` indicates that no specific C++ standard library should
+ /// be used, otherwise `-stdlib` is added to the compile invocation.
+ ///
+ /// The given library name must not contain the `lib` prefix.
+ ///
+ /// Common values:
+ /// - `stdc++` for GNU
+ /// - `c++` for Clang
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .cpp_set_stdlib("c++")
+ /// .compile("libfoo.a");
+ /// ```
+ pub fn cpp_set_stdlib<'a, V: Into<Option<&'a str>>>(
+ &mut self,
+ cpp_set_stdlib: V,
+ ) -> &mut Build {
+ let cpp_set_stdlib = cpp_set_stdlib.into().map(Arc::from);
+ self.cpp_set_stdlib.clone_from(&cpp_set_stdlib);
+ self.cpp_link_stdlib = Some(cpp_set_stdlib);
+ self
+ }
+
+ /// Configures the `rustc` target this configuration will be compiling
+ /// for.
+ ///
+ /// This will fail if using a target not in a pre-compiled list taken from
+ /// `rustc +nightly --print target-list`. The list will be updated
+ /// periodically.
+ ///
+ /// You should avoid setting this in build scripts, target information
+ /// will instead be retrieved from the environment variables `TARGET` and
+ /// `CARGO_CFG_TARGET_*` that Cargo sets.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .target("aarch64-linux-android")
+ /// .compile("foo");
+ /// ```
+ pub fn target(&mut self, target: &str) -> &mut Build {
+ self.target = Some(target.into());
+ self
+ }
+
+ /// Configures the host assumed by this configuration.
+ ///
+ /// This option is automatically scraped from the `HOST` environment
+ /// variable by build scripts, so it's not required to call this function.
+ ///
+ /// # Example
+ ///
+ /// ```no_run
+ /// cc::Build::new()
+ /// .file("src/foo.c")
+ /// .host("arm-linux-gnueabihf")
+ /// .compile("foo");
+ /// ```
+ pub fn host(&mut self, host: &str) -> &mut Build {
+ self.host = Some(host.into());
+ self
+ }
+
+ /// Configures the optimization level of the generated object files.
+ ///
+ /// This option is automatically scraped from the `OPT_LEVEL` environment
+ /// variable by build scripts, so it's not required to call this function.
+ pub fn opt_level(&mut self, opt_level: u32) -> &mut Build {
+ self.opt_level = Some(opt_level.to_string().into());
+ self
+ }
+
+ /// Configures the optimization level of the generated object files.
+ ///
+ /// This option is automatically scraped from the `OPT_LEVEL` environment
+ /// variable by build scripts, so it's not required to call this function.
+ pub fn opt_level_str(&mut self, opt_level: &str) -> &mut Build {
+ self.opt_level = Some(opt_level.into());
+ self
+ }
+
+ /// Configures whether the compiler will emit debug information when
+ /// generating object files.
+ ///
+ /// This option is automatically scraped from the `DEBUG` environment
+ /// variable by build scripts, so it's not required to call this function.
+ pub fn debug(&mut self, debug: bool) -> &mut Build {
+ self.debug = Some(debug);
+ self
+ }
+
+ /// Configures whether the compiler will emit instructions to store
+ /// frame pointers during codegen.
+ ///
+ /// This option is automatically enabled when debug information is emitted.
+ /// Otherwise the target platform compiler's default will be used.
+ /// You can use this option to force a specific setting.
+ pub fn force_frame_pointer(&mut self, force: bool) -> &mut Build {
+ self.force_frame_pointer = Some(force);
+ self
+ }
+
+ /// Configures the output directory where all object files and static
+ /// libraries will be located.
+ ///
+ /// This option is automatically scraped from the `OUT_DIR` environment
+ /// variable by build scripts, so it's not required to call this function.
+ pub fn out_dir<P: AsRef<Path>>(&mut self, out_dir: P) -> &mut Build {
+ self.out_dir = Some(out_dir.as_ref().into());
+ self
+ }
+
+ /// Configures the compiler to be used to produce output.
+ ///
+ /// This option is automatically determined from the target platform or a
+ /// number of environment variables, so it's not required to call this
+ /// function.
+ pub fn compiler<P: AsRef<Path>>(&mut self, compiler: P) -> &mut Build {
+ self.compiler = Some(compiler.as_ref().into());
+ self
+ }
+
+ /// Configures the tool used to assemble archives.
+ ///
+ /// This option is automatically determined from the target platform or a
+ /// number of environment variables, so it's not required to call this
+ /// function.
+ pub fn archiver<P: AsRef<Path>>(&mut self, archiver: P) -> &mut Build {
+ self.archiver = Some(archiver.as_ref().into());
+ self
+ }
+
+ /// Configures the tool used to index archives.
+ ///
+ /// This option is automatically determined from the target platform or a
+ /// number of environment variables, so it's not required to call this
+ /// function.
+ pub fn ranlib<P: AsRef<Path>>(&mut self, ranlib: P) -> &mut Build {
+ self.ranlib = Some(ranlib.as_ref().into());
+ self
+ }
+
+ /// Define whether metadata should be emitted for cargo allowing it to
+ /// automatically link the binary. Defaults to `true`.
+ ///
+ /// The emitted metadata is:
+ ///
+ /// - `rustc-link-lib=static=`*compiled lib*
+ /// - `rustc-link-search=native=`*target folder*
+ /// - When target is MSVC, the ATL-MFC libs are added via `rustc-link-search=native=`
+ /// - When C++ is enabled, the C++ stdlib is added via `rustc-link-lib`
+ /// - If `emit_rerun_if_env_changed` is not `false`, `rerun-if-env-changed=`*env*
+ ///
+ pub fn cargo_metadata(&mut self, cargo_metadata: bool) -> &mut Build {
+ self.cargo_output.metadata = cargo_metadata;
+ self
+ }
+
+ /// Define whether compile warnings should be emitted for cargo. Defaults to
+ /// `true`.
+ ///
+ /// If disabled, compiler messages will not be printed.
+ /// Issues unrelated to the compilation will always produce cargo warnings regardless of this setting.
+ pub fn cargo_warnings(&mut self, cargo_warnings: bool) -> &mut Build {
+ self.cargo_output.warnings = cargo_warnings;
+ self
+ }
+
+ /// Define whether debug information should be emitted for cargo. Defaults to whether
+ /// or not the environment variable `CC_ENABLE_DEBUG_OUTPUT` is set.
+ ///
+ /// If enabled, the compiler will emit debug information when generating object files,
+ /// such as the command invoked and the exit status.
+ pub fn cargo_debug(&mut self, cargo_debug: bool) -> &mut Build {
+ self.cargo_output.debug = cargo_debug;
+ self
+ }
+
+ /// Define whether compiler output (to stdout) should be emitted. Defaults to `true`
+ /// (forward compiler stdout to this process' stdout)
+ ///
+ /// Some compilers emit errors to stdout, so if you *really* need stdout to be clean
+ /// you should also set this to `false`.
+ pub fn cargo_output(&mut self, cargo_output: bool) -> &mut Build {
+ self.cargo_output.output = if cargo_output {
+ OutputKind::Forward
+ } else {
+ OutputKind::Discard
+ };
+ self
+ }
+
+ /// Adds a native library modifier that will be added to the
+ /// `rustc-link-lib=static:MODIFIERS=LIBRARY_NAME` metadata line
+ /// emitted for cargo if `cargo_metadata` is enabled.
+ /// See <https://doc.rust-lang.org/rustc/command-line-arguments.html#-l-link-the-generated-crate-to-a-native-library>
+ /// for the list of modifiers accepted by rustc.
+ pub fn link_lib_modifier(&mut self, link_lib_modifier: impl AsRef<OsStr>) -> &mut Build {
+ self.link_lib_modifiers
+ .push(link_lib_modifier.as_ref().into());
+ self
+ }
+
+ /// Configures whether the compiler will emit position independent code.
+ ///
+ /// This option defaults to `false` for `windows-gnu` and bare metal targets and
+ /// to `true` for all other targets.
+ pub fn pic(&mut self, pic: bool) -> &mut Build {
+ self.pic = Some(pic);
+ self
+ }
+
+ /// Configures whether the Procedure Linkage Table is used for indirect
+ /// calls into shared libraries.
+ ///
+ /// The PLT is used to provide features like lazy binding, but introduces
+ /// a small performance loss due to extra pointer indirection. Setting
+ /// `use_plt` to `false` can provide a small performance increase.
+ ///
+ /// Note that skipping the PLT requires a recent version of GCC/Clang.
+ ///
+ /// This only applies to ELF targets. It has no effect on other platforms.
+ pub fn use_plt(&mut self, use_plt: bool) -> &mut Build {
+ self.use_plt = Some(use_plt);
+ self
+ }
+
+ /// Define whether metadata should be emitted for cargo to detect environment
+ /// changes that should trigger a rebuild.
+ ///
+ /// NOTE that cc does not emit metadata to detect changes for `PATH`, since it could
+ /// be changed every comilation yet does not affect the result of compilation
+ /// (i.e. rust-analyzer adds temporary directory to `PATH`).
+ ///
+ /// cc in general, has no way detecting changes to compiler, as there are so many ways to
+ /// change it and sidestep the detection, for example the compiler might be wrapped in a script
+ /// so detecting change of the file, or using checksum won't work.
+ ///
+ /// We recommend users to decide for themselves, if they want rebuild if the compiler has been upgraded
+ /// or changed, and how to detect that.
+ ///
+ /// This has no effect if the `cargo_metadata` option is `false`.
+ ///
+ /// This option defaults to `true`.
+ pub fn emit_rerun_if_env_changed(&mut self, emit_rerun_if_env_changed: bool) -> &mut Build {
+ self.emit_rerun_if_env_changed = emit_rerun_if_env_changed;
+ self
+ }
+
+ /// Configures whether the /MT flag or the /MD flag will be passed to msvc build tools.
+ ///
+ /// This option defaults to `false`, and affect only msvc targets.
+ pub fn static_crt(&mut self, static_crt: bool) -> &mut Build {
+ self.static_crt = Some(static_crt);
+ self
+ }
+
+ /// Configure whether *FLAGS variables are parsed using `shlex`, similarly to `make` and
+ /// `cmake`.
+ ///
+ /// This option defaults to `false`.
+ pub fn shell_escaped_flags(&mut self, shell_escaped_flags: bool) -> &mut Build {
+ self.shell_escaped_flags = Some(shell_escaped_flags);
+ self
+ }
+
+ /// Configure whether cc should automatically inherit compatible flags passed to rustc
+ /// from `CARGO_ENCODED_RUSTFLAGS`.
+ ///
+ /// This option defaults to `true`.
+ pub fn inherit_rustflags(&mut self, inherit_rustflags: bool) -> &mut Build {
+ self.inherit_rustflags = inherit_rustflags;
+ self
+ }
+
+ #[doc(hidden)]
+ pub fn __set_env<A, B>(&mut self, a: A, b: B) -> &mut Build
+ where
+ A: AsRef<OsStr>,
+ B: AsRef<OsStr>,
+ {
+ self.env.push((a.as_ref().into(), b.as_ref().into()));
+ self
+ }
+}
+
+/// Invoke or fetch the compiler or archiver.
+impl Build {
+ /// Run the compiler to test if it accepts the given flag.
+ ///
+ /// For a convenience method for setting flags conditionally,
+ /// see `flag_if_supported()`.
+ ///
+ /// It may return error if it's unable to run the compiler with a test file
+ /// (e.g. the compiler is missing or a write to the `out_dir` failed).
+ ///
+ /// Note: Once computed, the result of this call is stored in the
+ /// `known_flag_support` field. If `is_flag_supported(flag)`
+ /// is called again, the result will be read from the hash table.
+ pub fn is_flag_supported(&self, flag: impl AsRef<OsStr>) -> Result<bool, Error> {
+ self.is_flag_supported_inner(
+ flag.as_ref(),
+ &self.get_base_compiler()?,
+ &self.get_target()?,
+ )
+ }
+
+ fn ensure_check_file(&self) -> Result<PathBuf, Error> {
+ let out_dir = self.get_out_dir()?;
+ let src = if self.cuda {
+ assert!(self.cpp);
+ out_dir.join("flag_check.cu")
+ } else if self.cpp {
+ out_dir.join("flag_check.cpp")
+ } else {
+ out_dir.join("flag_check.c")
+ };
+
+ if !src.exists() {
+ let mut f = fs::File::create(&src)?;
+ write!(f, "int main(void) {{ return 0; }}")?;
+ }
+
+ Ok(src)
+ }
+
+ fn is_flag_supported_inner(
+ &self,
+ flag: &OsStr,
+ tool: &Tool,
+ target: &TargetInfo<'_>,
+ ) -> Result<bool, Error> {
+ let compiler_flag = CompilerFlag {
+ compiler: tool.path().into(),
+ flag: flag.into(),
+ };
+
+ if let Some(is_supported) = self
+ .build_cache
+ .known_flag_support_status_cache
+ .read()
+ .unwrap()
+ .get(&compiler_flag)
+ .cloned()
+ {
+ return Ok(is_supported);
+ }
+
+ let out_dir = self.get_out_dir()?;
+ let src = self.ensure_check_file()?;
+ let obj = out_dir.join("flag_check");
+
+ let mut compiler = {
+ let mut cfg = Build::new();
+ cfg.flag(flag)
+ .compiler(tool.path())
+ .cargo_metadata(self.cargo_output.metadata)
+ .opt_level(0)
+ .debug(false)
+ .cpp(self.cpp)
+ .cuda(self.cuda)
+ .inherit_rustflags(false)
+ .emit_rerun_if_env_changed(self.emit_rerun_if_env_changed);
+ if let Some(target) = &self.target {
+ cfg.target(target);
+ }
+ if let Some(host) = &self.host {
+ cfg.host(host);
+ }
+ cfg.try_get_compiler()?
+ };
+
+ // Clang uses stderr for verbose output, which yields a false positive
+ // result if the CFLAGS/CXXFLAGS include -v to aid in debugging.
+ if compiler.family.verbose_stderr() {
+ compiler.remove_arg("-v".into());
+ }
+ if compiler.is_like_clang() {
+ // Avoid reporting that the arg is unsupported just because the
+ // compiler complains that it wasn't used.
+ compiler.push_cc_arg("-Wno-unused-command-line-argument".into());
+ }
+
+ let mut cmd = compiler.to_command();
+ let is_arm = matches!(target.arch, "aarch64" | "arm");
+ command_add_output_file(
+ &mut cmd,
+ &obj,
+ CmdAddOutputFileArgs {
+ cuda: self.cuda,
+ is_assembler_msvc: false,
+ msvc: compiler.is_like_msvc(),
+ clang: compiler.is_like_clang(),
+ gnu: compiler.is_like_gnu(),
+ is_asm: false,
+ is_arm,
+ },
+ );
+
+ // Checking for compiler flags does not require linking (and we _must_
+ // avoid making it do so, since it breaks cross-compilation when the C
+ // compiler isn't configured to be able to link).
+ // https://github.com/rust-lang/cc-rs/issues/1423
+ cmd.arg("-c");
+
+ if compiler.supports_path_delimiter() {
+ cmd.arg("--");
+ }
+
+ cmd.arg(&src);
+
+ if compiler.is_like_msvc() {
+ // On MSVC we need to make sure the LIB directory is included
+ // so the CRT can be found.
+ for (key, value) in &tool.env {
+ if key == "LIB" {
+ cmd.env("LIB", value);
+ break;
+ }
+ }
+ }
+
+ let output = cmd.current_dir(out_dir).output()?;
+ let is_supported = output.status.success() && output.stderr.is_empty();
+
+ self.build_cache
+ .known_flag_support_status_cache
+ .write()
+ .unwrap()
+ .insert(compiler_flag, is_supported);
+
+ Ok(is_supported)
+ }
+
+ /// Run the compiler, generating the file `output`
+ ///
+ /// This will return a result instead of panicking; see [`Self::compile()`] for
+ /// the complete description.
+ pub fn try_compile(&self, output: &str) -> Result<(), Error> {
+ let mut output_components = Path::new(output).components();
+ match (output_components.next(), output_components.next()) {
+ (Some(Component::Normal(_)), None) => {}
+ _ => {
+ return Err(Error::new(
+ ErrorKind::InvalidArgument,
+ "argument of `compile` must be a single normal path component",
+ ));
+ }
+ }
+
+ let (lib_name, gnu_lib_name) = if output.starts_with("lib") && output.ends_with(".a") {
+ (&output[3..output.len() - 2], output.to_owned())
+ } else {
+ let mut gnu = String::with_capacity(5 + output.len());
+ gnu.push_str("lib");
+ gnu.push_str(output);
+ gnu.push_str(".a");
+ (output, gnu)
+ };
+ let dst = self.get_out_dir()?;
+
+ let objects = objects_from_files(&self.files, &dst)?;
+
+ self.compile_objects(&objects)?;
+ self.assemble(lib_name, &dst.join(gnu_lib_name), &objects)?;
+
+ let target = self.get_target()?;
+ if target.env == "msvc" {
+ let compiler = self.get_base_compiler()?;
+ let atlmfc_lib = compiler
+ .env()
+ .iter()
+ .find(|&(var, _)| var.as_os_str() == OsStr::new("LIB"))
+ .and_then(|(_, lib_paths)| {
+ env::split_paths(lib_paths).find(|path| {
+ let sub = Path::new("atlmfc/lib");
+ path.ends_with(sub) || path.parent().map_or(false, |p| p.ends_with(sub))
+ })
+ });
+
+ if let Some(atlmfc_lib) = atlmfc_lib {
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-link-search=native={}",
+ atlmfc_lib.display()
+ ));
+ }
+ }
+
+ if self.link_lib_modifiers.is_empty() {
+ self.cargo_output
+ .print_metadata(&format_args!("cargo:rustc-link-lib=static={}", lib_name));
+ } else {
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-link-lib=static:{}={}",
+ JoinOsStrs {
+ slice: &self.link_lib_modifiers,
+ delimiter: ','
+ },
+ lib_name
+ ));
+ }
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-link-search=native={}",
+ dst.display()
+ ));
+
+ // Add specific C++ libraries, if enabled.
+ if self.cpp {
+ if let Some(stdlib) = self.get_cpp_link_stdlib()? {
+ self.cargo_output
+ .print_metadata(&format_args!("cargo:rustc-link-lib={}", stdlib.display()));
+ }
+ // Link c++ lib from WASI sysroot
+ if target.arch == "wasm32" {
+ if target.os == "wasi" {
+ if let Ok(wasi_sysroot) = self.wasi_sysroot() {
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-flags=-L {}/lib/{} -lstatic=c++ -lstatic=c++abi",
+ Path::new(&wasi_sysroot).display(),
+ self.get_raw_target()?
+ ));
+ }
+ } else if target.os == "linux" {
+ let musl_sysroot = self.wasm_musl_sysroot().unwrap();
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-flags=-L {}/lib -lstatic=c++ -lstatic=c++abi",
+ Path::new(&musl_sysroot).display(),
+ ));
+ }
+ }
+ }
+
+ let cudart = match &self.cudart {
+ Some(opt) => opt, // {none|shared|static}
+ None => "none",
+ };
+ if cudart != "none" {
+ if let Some(nvcc) = self.which(&self.get_compiler().path, None) {
+ // Try to figure out the -L search path. If it fails,
+ // it's on user to specify one by passing it through
+ // RUSTFLAGS environment variable.
+ let mut libtst = false;
+ let mut libdir = nvcc;
+ libdir.pop(); // remove 'nvcc'
+ libdir.push("..");
+ if cfg!(target_os = "linux") {
+ libdir.push("targets");
+ libdir.push(format!("{}-linux", target.arch));
+ libdir.push("lib");
+ libtst = true;
+ } else if cfg!(target_env = "msvc") {
+ libdir.push("lib");
+ match target.arch {
+ "x86_64" => {
+ libdir.push("x64");
+ libtst = true;
+ }
+ "x86" => {
+ libdir.push("Win32");
+ libtst = true;
+ }
+ _ => libtst = false,
+ }
+ }
+ if libtst && libdir.is_dir() {
+ self.cargo_output.print_metadata(&format_args!(
+ "cargo:rustc-link-search=native={}",
+ libdir.to_str().unwrap()
+ ));
+ }
+
+ // And now the -l flag.
+ let lib = match cudart {
+ "shared" => "cudart",
+ "static" => "cudart_static",
+ bad => panic!("unsupported cudart option: {}", bad),
+ };
+ self.cargo_output
+ .print_metadata(&format_args!("cargo:rustc-link-lib={}", lib));
+ }
+ }
+
+ Ok(())
+ }
+
+ /// Run the compiler, generating the file `output`
+ ///
+ /// # Library name
+ ///
+ /// The `output` string argument determines the file name for the compiled
+ /// library. The Rust compiler will create an assembly named "lib"+output+".a".
+ /// MSVC will create a file named output+".lib".
+ ///
+ /// The choice of `output` is close to arbitrary, but:
+ ///
+ /// - must be nonempty,
+ /// - must not contain a path separator (`/`),
+ /// - must be unique across all `compile` invocations made by the same build
+ /// script.
+ ///
+ /// If your build script compiles a single source file, the base name of
+ /// that source file would usually be reasonable:
+ ///
+ /// ```no_run
+ /// cc::Build::new().file("blobstore.c").compile("blobstore");
+ /// ```
+ ///
+ /// Compiling multiple source files, some people use their crate's name, or
+ /// their crate's name + "-cc".
+ ///
+ /// Otherwise, please use your imagination.
+ ///
+ /// For backwards compatibility, if `output` starts with "lib" *and* ends
+ /// with ".a", a second "lib" prefix and ".a" suffix do not get added on,
+ /// but this usage is deprecated; please omit `lib` and `.a` in the argument
+ /// that you pass.
+ ///
+ /// # Panics
+ ///
+ /// Panics if `output` is not formatted correctly or if one of the underlying
+ /// compiler commands fails. It can also panic if it fails reading file names
+ /// or creating directories.
+ pub fn compile(&self, output: &str) {
+ if let Err(e) = self.try_compile(output) {
+ fail(&e.message);
+ }
+ }
+
+ /// Run the compiler, generating intermediate files, but without linking
+ /// them into an archive file.
+ ///
+ /// This will return a list of compiled object files, in the same order
+ /// as they were passed in as `file`/`files` methods.
+ pub fn compile_intermediates(&self) -> Vec<PathBuf> {
+ match self.try_compile_intermediates() {
+ Ok(v) => v,
+ Err(e) => fail(&e.message),
+ }
+ }
+
+ /// Run the compiler, generating intermediate files, but without linking
+ /// them into an archive file.
+ ///
+ /// This will return a result instead of panicking; see `compile_intermediates()` for the complete description.
+ pub fn try_compile_intermediates(&self) -> Result<Vec<PathBuf>, Error> {
+ let dst = self.get_out_dir()?;
+ let objects = objects_from_files(&self.files, &dst)?;
+
+ self.compile_objects(&objects)?;
+
+ Ok(objects.into_iter().map(|v| v.dst).collect())
+ }
+
+ #[cfg(feature = "parallel")]
+ fn compile_objects(&self, objs: &[Object]) -> Result<(), Error> {
+ use std::cell::Cell;
+
+ use parallel::async_executor::{block_on, YieldOnce};
+
+ check_disabled()?;
+
+ if objs.len() <= 1 {
+ for obj in objs {
+ let mut cmd = self.create_compile_object_cmd(obj)?;
+ run(&mut cmd, &self.cargo_output)?;
+ }
+
+ return Ok(());
+ }
+
+ // Limit our parallelism globally with a jobserver.
+ let mut tokens = parallel::job_token::ActiveJobTokenServer::new();
+
+ // When compiling objects in parallel we do a few dirty tricks to speed
+ // things up:
+ //
+ // * First is that we use the `jobserver` crate to limit the parallelism
+ // of this build script. The `jobserver` crate will use a jobserver
+ // configured by Cargo for build scripts to ensure that parallelism is
+ // coordinated across C compilations and Rust compilations. Before we
+ // compile anything we make sure to wait until we acquire a token.
+ //
+ // Note that this jobserver is cached globally so we only used one per
+ // process and only worry about creating it once.
+ //
+ // * Next we use spawn the process to actually compile objects in
+ // parallel after we've acquired a token to perform some work
+ //
+ // With all that in mind we compile all objects in a loop here, after we
+ // acquire the appropriate tokens, Once all objects have been compiled
+ // we wait on all the processes and propagate the results of compilation.
+
+ let pendings =
+ Cell::new(Vec::<(Command, KillOnDrop, parallel::job_token::JobToken)>::new());
+ let is_disconnected = Cell::new(false);
+ let has_made_progress = Cell::new(false);
+
+ let wait_future = async {
+ let mut error = None;
+ // Buffer the stdout
+ let mut stdout = io::BufWriter::with_capacity(128, io::stdout());
+
+ loop {
+ // If the other end of the pipe is already disconnected, then we're not gonna get any new jobs,
+ // so it doesn't make sense to reuse the tokens; in fact,
+ // releasing them as soon as possible (once we know that the other end is disconnected) is beneficial.
+ // Imagine that the last file built takes an hour to finish; in this scenario,
+ // by not releasing the tokens before that last file is done we would effectively block other processes from
+ // starting sooner - even though we only need one token for that last file, not N others that were acquired.
+
+ let mut pendings_is_empty = false;
+
+ cell_update(&pendings, |mut pendings| {
+ // Try waiting on them.
+ pendings.retain_mut(|(cmd, child, _token)| {
+ match try_wait_on_child(cmd, &mut child.0, &mut stdout, &mut child.1) {
+ Ok(Some(())) => {
+ // Task done, remove the entry
+ has_made_progress.set(true);
+ false
+ }
+ Ok(None) => true, // Task still not finished, keep the entry
+ Err(err) => {
+ // Task fail, remove the entry.
+ // Since we can only return one error, log the error to make
+ // sure users always see all the compilation failures.
+ has_made_progress.set(true);
+
+ if self.cargo_output.warnings {
+ let _ = writeln!(stdout, "cargo:warning={}", err);
+ }
+ error = Some(err);
+
+ false
+ }
+ }
+ });
+ pendings_is_empty = pendings.is_empty();
+ pendings
+ });
+
+ if pendings_is_empty && is_disconnected.get() {
+ break if let Some(err) = error {
+ Err(err)
+ } else {
+ Ok(())
+ };
+ }
+
+ YieldOnce::default().await;
+ }
+ };
+ let spawn_future = async {
+ for obj in objs {
+ let mut cmd = self.create_compile_object_cmd(obj)?;
+ let token = tokens.acquire().await?;
+ let mut child = spawn(&mut cmd, &self.cargo_output)?;
+ let mut stderr_forwarder = StderrForwarder::new(&mut child);
+ stderr_forwarder.set_non_blocking()?;
+
+ cell_update(&pendings, |mut pendings| {
+ pendings.push((cmd, KillOnDrop(child, stderr_forwarder), token));
+ pendings
+ });
+
+ has_made_progress.set(true);
+ }
+ is_disconnected.set(true);
+
+ Ok::<_, Error>(())
+ };
+
+ return block_on(wait_future, spawn_future, &has_made_progress);
+
+ struct KillOnDrop(Child, StderrForwarder);
+
+ impl Drop for KillOnDrop {
+ fn drop(&mut self) {
+ let child = &mut self.0;
+
+ child.kill().ok();
+ }
+ }
+
+ fn cell_update<T, F>(cell: &Cell<T>, f: F)
+ where
+ T: Default,
+ F: FnOnce(T) -> T,
+ {
+ let old = cell.take();
+ let new = f(old);
+ cell.set(new);
+ }
+ }
+
+ #[cfg(not(feature = "parallel"))]
+ fn compile_objects(&self, objs: &[Object]) -> Result<(), Error> {
+ check_disabled()?;
+
+ for obj in objs {
+ let mut cmd = self.create_compile_object_cmd(obj)?;
+ run(&mut cmd, &self.cargo_output)?;
+ }
+
+ Ok(())
+ }
+
+ fn create_compile_object_cmd(&self, obj: &Object) -> Result<Command, Error> {
+ let asm_ext = AsmFileExt::from_path(&obj.src);
+ let is_asm = asm_ext.is_some();
+ let target = self.get_target()?;
+ let msvc = target.env == "msvc";
+ let compiler = self.try_get_compiler()?;
+
+ let is_assembler_msvc = msvc && asm_ext == Some(AsmFileExt::DotAsm);
+ let mut cmd = if is_assembler_msvc {
+ self.msvc_macro_assembler()?
+ } else {
+ let mut cmd = compiler.to_command();
+ for (a, b) in self.env.iter() {
+ cmd.env(a, b);
+ }
+ cmd
+ };
+ let is_arm = matches!(target.arch, "aarch64" | "arm");
+ command_add_output_file(
+ &mut cmd,
+ &obj.dst,
+ CmdAddOutputFileArgs {
+ cuda: self.cuda,
+ is_assembler_msvc,
+ msvc: compiler.is_like_msvc(),
+ clang: compiler.is_like_clang(),
+ gnu: compiler.is_like_gnu(),
+ is_asm,
+ is_arm,
+ },
+ );
+ // armasm and armasm64 don't requrie -c option
+ if !is_assembler_msvc || !is_arm {
+ cmd.arg("-c");
+ }
+ if self.cuda && self.cuda_file_count() > 1 {
+ cmd.arg("--device-c");
+ }
+ if is_asm {
+ cmd.args(self.asm_flags.iter().map(std::ops::Deref::deref));
+ }
+
+ if compiler.supports_path_delimiter() && !is_assembler_msvc {
+ // #513: For `clang-cl`, separate flags/options from the input file.
+ // When cross-compiling macOS -> Windows, this avoids interpreting
+ // common `/Users/...` paths as the `/U` flag and triggering
+ // `-Wslash-u-filename` warning.
+ cmd.arg("--");
+ }
+ cmd.arg(&obj.src);
+
+ if cfg!(target_os = "macos") {
+ self.fix_env_for_apple_os(&mut cmd)?;
+ }
+
+ Ok(cmd)
+ }
+
+ /// This will return a result instead of panicking; see [`Self::expand()`] for
+ /// the complete description.
+ pub fn try_expand(&self) -> Result<Vec<u8>, Error> {
+ let compiler = self.try_get_compiler()?;
+ let mut cmd = compiler.to_command();
+ for (a, b) in self.env.iter() {
+ cmd.env(a, b);
+ }
+ cmd.arg("-E");
+
+ assert!(
+ self.files.len() <= 1,
+ "Expand may only be called for a single file"
+ );
+
+ let is_asm = self
+ .files
+ .iter()
+ .map(std::ops::Deref::deref)
+ .find_map(AsmFileExt::from_path)
+ .is_some();
+
+ if compiler.family == (ToolFamily::Msvc { clang_cl: true }) && !is_asm {
+ // #513: For `clang-cl`, separate flags/options from the input file.
+ // When cross-compiling macOS -> Windows, this avoids interpreting
+ // common `/Users/...` paths as the `/U` flag and triggering
+ // `-Wslash-u-filename` warning.
+ cmd.arg("--");
+ }
+
+ cmd.args(self.files.iter().map(std::ops::Deref::deref));
+
+ run_output(&mut cmd, &self.cargo_output)
+ }
+
+ /// Run the compiler, returning the macro-expanded version of the input files.
+ ///
+ /// This is only relevant for C and C++ files.
+ ///
+ /// # Panics
+ /// Panics if more than one file is present in the config, or if compiler
+ /// path has an invalid file name.
+ ///
+ /// # Example
+ /// ```no_run
+ /// let out = cc::Build::new().file("src/foo.c").expand();
+ /// ```
+ pub fn expand(&self) -> Vec<u8> {
+ match self.try_expand() {
+ Err(e) => fail(&e.message),
+ Ok(v) => v,
+ }
+ }
+
+ /// Get the compiler that's in use for this configuration.
+ ///
+ /// This function will return a `Tool` which represents the culmination
+ /// of this configuration at a snapshot in time. The returned compiler can
+ /// be inspected (e.g. the path, arguments, environment) to forward along to
+ /// other tools, or the `to_command` method can be used to invoke the
+ /// compiler itself.
+ ///
+ /// This method will take into account all configuration such as debug
+ /// information, optimization level, include directories, defines, etc.
+ /// Additionally, the compiler binary in use follows the standard
+ /// conventions for this path, e.g. looking at the explicitly set compiler,
+ /// environment variables (a number of which are inspected here), and then
+ /// falling back to the default configuration.
+ ///
+ /// # Panics
+ ///
+ /// Panics if an error occurred while determining the architecture.
+ pub fn get_compiler(&self) -> Tool {
+ match self.try_get_compiler() {
+ Ok(tool) => tool,
+ Err(e) => fail(&e.message),
+ }
+ }
+
+ /// Get the compiler that's in use for this configuration.
+ ///
+ /// This will return a result instead of panicking; see
+ /// [`get_compiler()`](Self::get_compiler) for the complete description.
+ pub fn try_get_compiler(&self) -> Result<Tool, Error> {
+ let opt_level = self.get_opt_level()?;
+ let target = self.get_target()?;
+
+ let mut cmd = self.get_base_compiler()?;
+
+ // The flags below are added in roughly the following order:
+ // 1. Default flags
+ // - Controlled by `cc-rs`.
+ // 2. `rustc`-inherited flags
+ // - Controlled by `rustc`.
+ // 3. Builder flags
+ // - Controlled by the developer using `cc-rs` in e.g. their `build.rs`.
+ // 4. Environment flags
+ // - Controlled by the end user.
+ //
+ // This is important to allow later flags to override previous ones.
+
+ // Copied from <https://github.com/rust-lang/rust/blob/5db81020006d2920fc9c62ffc0f4322f90bffa04/compiler/rustc_codegen_ssa/src/back/linker.rs#L27-L38>
+ //
+ // Disables non-English messages from localized linkers.
+ // Such messages may cause issues with text encoding on Windows
+ // and prevent inspection of msvc output in case of errors, which we occasionally do.
+ // This should be acceptable because other messages from rustc are in English anyway,
+ // and may also be desirable to improve searchability of the compiler diagnostics.
+ if matches!(cmd.family, ToolFamily::Msvc { clang_cl: false }) {
+ cmd.env.push(("VSLANG".into(), "1033".into()));
+ } else {
+ cmd.env.push(("LC_ALL".into(), "C".into()));
+ }
+
+ // Disable default flag generation via `no_default_flags` or environment variable
+ let no_defaults = self.no_default_flags || self.getenv_boolean("CRATE_CC_NO_DEFAULTS");
+ if !no_defaults {
+ self.add_default_flags(&mut cmd, &target, &opt_level)?;
+ }
+
+ // Specify various flags that are not considered part of the default flags above.
+ // FIXME(madsmtm): Should these be considered part of the defaults? If no, why not?
+ if let Some(ref std) = self.std {
+ let separator = match cmd.family {
+ ToolFamily::Msvc { .. } => ':',
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => '=',
+ };
+ cmd.push_cc_arg(format!("-std{}{}", separator, std).into());
+ }
+ for directory in self.include_directories.iter() {
+ cmd.args.push("-I".into());
+ cmd.args.push(directory.as_os_str().into());
+ }
+ if self.warnings_into_errors {
+ let warnings_to_errors_flag = cmd.family.warnings_to_errors_flag().into();
+ cmd.push_cc_arg(warnings_to_errors_flag);
+ }
+
+ // If warnings and/or extra_warnings haven't been explicitly set,
+ // then we set them only if the environment doesn't already have
+ // CFLAGS/CXXFLAGS, since those variables presumably already contain
+ // the desired set of warnings flags.
+ let envflags = self.envflags(if self.cpp { "CXXFLAGS" } else { "CFLAGS" })?;
+ if self.warnings.unwrap_or(envflags.is_none()) {
+ let wflags = cmd.family.warnings_flags().into();
+ cmd.push_cc_arg(wflags);
+ }
+ if self.extra_warnings.unwrap_or(envflags.is_none()) {
+ if let Some(wflags) = cmd.family.extra_warnings_flags() {
+ cmd.push_cc_arg(wflags.into());
+ }
+ }
+
+ // Add cc flags inherited from matching rustc flags.
+ if self.inherit_rustflags {
+ self.add_inherited_rustflags(&mut cmd, &target)?;
+ }
+
+ // Set flags configured in the builder (do this second-to-last, to allow these to override
+ // everything above).
+ for flag in self.flags.iter() {
+ cmd.args.push((**flag).into());
+ }
+ for flag in self.flags_supported.iter() {
+ if self
+ .is_flag_supported_inner(flag, &cmd, &target)
+ .unwrap_or(false)
+ {
+ cmd.push_cc_arg((**flag).into());
+ }
+ }
+ for (key, value) in self.definitions.iter() {
+ if let Some(ref value) = *value {
+ cmd.args.push(format!("-D{}={}", key, value).into());
+ } else {
+ cmd.args.push(format!("-D{}", key).into());
+ }
+ }
+
+ // Set flags from the environment (do this last, to allow these to override everything else).
+ if let Some(flags) = &envflags {
+ for arg in flags {
+ cmd.push_cc_arg(arg.into());
+ }
+ }
+
+ Ok(cmd)
+ }
+
+ fn add_default_flags(
+ &self,
+ cmd: &mut Tool,
+ target: &TargetInfo<'_>,
+ opt_level: &str,
+ ) -> Result<(), Error> {
+ let raw_target = self.get_raw_target()?;
+ // Non-target flags
+ // If the flag is not conditioned on target variable, it belongs here :)
+ match cmd.family {
+ ToolFamily::Msvc { .. } => {
+ cmd.push_cc_arg("-nologo".into());
+
+ let crt_flag = match self.static_crt {
+ Some(true) => "-MT",
+ Some(false) => "-MD",
+ None => {
+ let features = self.getenv("CARGO_CFG_TARGET_FEATURE");
+ let features = features.as_deref().unwrap_or_default();
+ if features.to_string_lossy().contains("crt-static") {
+ "-MT"
+ } else {
+ "-MD"
+ }
+ }
+ };
+ cmd.push_cc_arg(crt_flag.into());
+
+ match opt_level {
+ // Msvc uses /O1 to enable all optimizations that minimize code size.
+ "z" | "s" | "1" => cmd.push_opt_unless_duplicate("-O1".into()),
+ // -O3 is a valid value for gcc and clang compilers, but not msvc. Cap to /O2.
+ "2" | "3" => cmd.push_opt_unless_duplicate("-O2".into()),
+ _ => {}
+ }
+ }
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => {
+ // arm-linux-androideabi-gcc 4.8 shipped with Android NDK does
+ // not support '-Oz'
+ if opt_level == "z" && !cmd.is_like_clang() {
+ cmd.push_opt_unless_duplicate("-Os".into());
+ } else {
+ cmd.push_opt_unless_duplicate(format!("-O{}", opt_level).into());
+ }
+
+ if cmd.is_like_clang() && target.os == "android" {
+ // For compatibility with code that doesn't use pre-defined `__ANDROID__` macro.
+ // If compiler used via ndk-build or cmake (officially supported build methods)
+ // this macros is defined.
+ // See https://android.googlesource.com/platform/ndk/+/refs/heads/ndk-release-r21/build/cmake/android.toolchain.cmake#456
+ // https://android.googlesource.com/platform/ndk/+/refs/heads/ndk-release-r21/build/core/build-binary.mk#141
+ cmd.push_opt_unless_duplicate("-DANDROID".into());
+ }
+
+ if target.os != "ios"
+ && target.os != "watchos"
+ && target.os != "tvos"
+ && target.os != "visionos"
+ {
+ cmd.push_cc_arg("-ffunction-sections".into());
+ cmd.push_cc_arg("-fdata-sections".into());
+ }
+ // Disable generation of PIC on bare-metal for now: rust-lld doesn't support this yet
+ //
+ // `rustc` also defaults to disable PIC on WASM:
+ // <https://github.com/rust-lang/rust/blob/1.82.0/compiler/rustc_target/src/spec/base/wasm.rs#L101-L108>
+ if self.pic.unwrap_or(
+ target.os != "windows"
+ && target.os != "none"
+ && target.os != "uefi"
+ && target.arch != "wasm32"
+ && target.arch != "wasm64",
+ ) {
+ cmd.push_cc_arg("-fPIC".into());
+ // PLT only applies if code is compiled with PIC support,
+ // and only for ELF targets.
+ if (target.os == "linux" || target.os == "android")
+ && !self.use_plt.unwrap_or(true)
+ {
+ cmd.push_cc_arg("-fno-plt".into());
+ }
+ }
+ if target.arch == "wasm32" || target.arch == "wasm64" {
+ // WASI does not support exceptions yet.
+ // https://github.com/WebAssembly/exception-handling
+ //
+ // `rustc` also defaults to (currently) disable exceptions
+ // on all WASM targets:
+ // <https://github.com/rust-lang/rust/blob/1.82.0/compiler/rustc_target/src/spec/base/wasm.rs#L72-L77>
+ cmd.push_cc_arg("-fno-exceptions".into());
+ }
+
+ if target.os == "wasi" {
+ // Link clang sysroot
+ if let Ok(wasi_sysroot) = self.wasi_sysroot() {
+ cmd.push_cc_arg(
+ format!("--sysroot={}", Path::new(&wasi_sysroot).display()).into(),
+ );
+ }
+
+ // FIXME(madsmtm): Read from `target_features` instead?
+ if raw_target.contains("threads") {
+ cmd.push_cc_arg("-pthread".into());
+ }
+ }
+
+ if target.os == "nto" {
+ // Select the target with `-V`, see qcc documentation:
+ // QNX 7.1: https://www.qnx.com/developers/docs/7.1/index.html#com.qnx.doc.neutrino.utilities/topic/q/qcc.html
+ // QNX 8.0: https://www.qnx.com/developers/docs/8.0/com.qnx.doc.neutrino.utilities/topic/q/qcc.html
+ // This assumes qcc/q++ as compiler, which is currently the only supported compiler for QNX.
+ // See for details: https://github.com/rust-lang/cc-rs/pull/1319
+ let arg = match target.full_arch {
+ "x86" | "i586" => "-Vgcc_ntox86_cxx",
+ "aarch64" => "-Vgcc_ntoaarch64le_cxx",
+ "x86_64" => "-Vgcc_ntox86_64_cxx",
+ _ => {
+ return Err(Error::new(
+ ErrorKind::InvalidTarget,
+ format!("Unknown architecture for Neutrino QNX: {}", target.arch),
+ ))
+ }
+ };
+ cmd.push_cc_arg(arg.into());
+ }
+ }
+ }
+
+ if self.get_debug() {
+ if self.cuda {
+ // NVCC debug flag
+ cmd.args.push("-G".into());
+ }
+ let family = cmd.family;
+ family.add_debug_flags(cmd, self.get_dwarf_version());
+ }
+
+ if self.get_force_frame_pointer() {
+ let family = cmd.family;
+ family.add_force_frame_pointer(cmd);
+ }
+
+ if !cmd.is_like_msvc() {
+ if target.arch == "x86" {
+ cmd.args.push("-m32".into());
+ } else if target.abi == "x32" {
+ cmd.args.push("-mx32".into());
+ } else if target.os == "aix" {
+ if cmd.family == ToolFamily::Gnu {
+ cmd.args.push("-maix64".into());
+ } else {
+ cmd.args.push("-m64".into());
+ }
+ } else if target.arch == "x86_64" || target.arch == "powerpc64" {
+ cmd.args.push("-m64".into());
+ }
+ }
+
+ // Target flags
+ match cmd.family {
+ ToolFamily::Clang { .. } => {
+ if !(cmd.has_internal_target_arg
+ || (target.os == "android"
+ && android_clang_compiler_uses_target_arg_internally(&cmd.path)))
+ {
+ if target.os == "freebsd" {
+ // FreeBSD only supports C++11 and above when compiling against libc++
+ // (available from FreeBSD 10 onwards). Under FreeBSD, clang uses libc++ by
+ // default on FreeBSD 10 and newer unless `--target` is manually passed to
+ // the compiler, in which case its default behavior differs:
+ // * If --target=xxx-unknown-freebsdX(.Y) is specified and X is greater than
+ // or equal to 10, clang++ uses libc++
+ // * If --target=xxx-unknown-freebsd is specified (without a version),
+ // clang++ cannot assume libc++ is available and reverts to a default of
+ // libstdc++ (this behavior was changed in llvm 14).
+ //
+ // This breaks C++11 (or greater) builds if targeting FreeBSD with the
+ // generic xxx-unknown-freebsd target on clang 13 or below *without*
+ // explicitly specifying that libc++ should be used.
+ // When cross-compiling, we can't infer from the rust/cargo target name
+ // which major version of FreeBSD we are targeting, so we need to make sure
+ // that libc++ is used (unless the user has explicitly specified otherwise).
+ // There's no compelling reason to use a different approach when compiling
+ // natively.
+ if self.cpp && self.cpp_set_stdlib.is_none() {
+ cmd.push_cc_arg("-stdlib=libc++".into());
+ }
+ } else if target.arch == "wasm32" && target.os == "linux" {
+ for x in &[
+ "atomics",
+ "bulk-memory",
+ "mutable-globals",
+ "sign-ext",
+ "exception-handling",
+ ] {
+ cmd.push_cc_arg(format!("-m{x}").into());
+ }
+ for x in &["wasm-exceptions", "declspec"] {
+ cmd.push_cc_arg(format!("-f{x}").into());
+ }
+ let musl_sysroot = self.wasm_musl_sysroot().unwrap();
+ cmd.push_cc_arg(
+ format!("--sysroot={}", Path::new(&musl_sysroot).display()).into(),
+ );
+ cmd.push_cc_arg("-pthread".into());
+ }
+ // Pass `--target` with the LLVM target to configure Clang for cross-compiling.
+ //
+ // This is **required** for cross-compilation, as it's the only flag that
+ // consistently forces Clang to change the "toolchain" that is responsible for
+ // parsing target-specific flags:
+ // https://github.com/rust-lang/cc-rs/issues/1388
+ // https://github.com/llvm/llvm-project/blob/llvmorg-19.1.7/clang/lib/Driver/Driver.cpp#L1359-L1360
+ // https://github.com/llvm/llvm-project/blob/llvmorg-19.1.7/clang/lib/Driver/Driver.cpp#L6347-L6532
+ //
+ // This can be confusing, because on e.g. host macOS, you can usually get by
+ // with `-arch` and `-mtargetos=`. But that only works because the _default_
+ // toolchain is `Darwin`, which enables parsing of darwin-specific options.
+ //
+ // NOTE: In the past, we passed the deployment version in here on all Apple
+ // targets, but versioned targets were found to have poor compatibility with
+ // older versions of Clang, especially when it comes to configuration files:
+ // https://github.com/rust-lang/cc-rs/issues/1278
+ //
+ // So instead, we pass the deployment target with `-m*-version-min=`, and only
+ // pass it here on visionOS and Mac Catalyst where that option does not exist:
+ // https://github.com/rust-lang/cc-rs/issues/1383
+ let version = if target.os == "visionos" || target.abi == "macabi" {
+ Some(self.apple_deployment_target(target))
+ } else {
+ None
+ };
+
+ let clang_target =
+ target.llvm_target(&self.get_raw_target()?, version.as_deref());
+ cmd.push_cc_arg(format!("--target={clang_target}").into());
+ }
+ }
+ ToolFamily::Msvc { clang_cl } => {
+ // This is an undocumented flag from MSVC but helps with making
+ // builds more reproducible by avoiding putting timestamps into
+ // files.
+ cmd.push_cc_arg("-Brepro".into());
+
+ if clang_cl {
+ if target.arch == "x86_64" {
+ cmd.push_cc_arg("-m64".into());
+ } else if target.arch == "x86" {
+ cmd.push_cc_arg("-m32".into());
+ // See
+ // <https://learn.microsoft.com/en-us/cpp/build/reference/arch-x86?view=msvc-170>.
+ //
+ // NOTE: Rust officially supported Windows targets all require SSE2 as part
+ // of baseline target features.
+ //
+ // NOTE: The same applies for STL. See: -
+ // <https://github.com/microsoft/STL/issues/3922>, and -
+ // <https://github.com/microsoft/STL/pull/4741>.
+ cmd.push_cc_arg("-arch:SSE2".into());
+ } else {
+ cmd.push_cc_arg(
+ format!(
+ "--target={}",
+ target.llvm_target(&self.get_raw_target()?, None)
+ )
+ .into(),
+ );
+ }
+ } else if target.full_arch == "i586" {
+ cmd.push_cc_arg("-arch:IA32".into());
+ } else if target.full_arch == "arm64ec" {
+ cmd.push_cc_arg("-arm64EC".into());
+ }
+ // There is a check in corecrt.h that will generate a
+ // compilation error if
+ // _ARM_WINAPI_PARTITION_DESKTOP_SDK_AVAILABLE is
+ // not defined to 1. The check was added in Windows
+ // 8 days because only store apps were allowed on ARM.
+ // This changed with the release of Windows 10 IoT Core.
+ // The check will be going away in future versions of
+ // the SDK, but for all released versions of the
+ // Windows SDK it is required.
+ if target.arch == "arm" {
+ cmd.args
+ .push("-D_ARM_WINAPI_PARTITION_DESKTOP_SDK_AVAILABLE=1".into());
+ }
+ }
+ ToolFamily::Gnu => {
+ if target.vendor == "kmc" {
+ cmd.args.push("-finput-charset=utf-8".into());
+ }
+
+ if self.static_flag.is_none() {
+ let features = self.getenv("CARGO_CFG_TARGET_FEATURE");
+ let features = features.as_deref().unwrap_or_default();
+ if features.to_string_lossy().contains("crt-static") {
+ cmd.args.push("-static".into());
+ }
+ }
+
+ // armv7 targets get to use armv7 instructions
+ if (target.full_arch.starts_with("armv7")
+ || target.full_arch.starts_with("thumbv7"))
+ && (target.os == "linux" || target.vendor == "kmc")
+ {
+ cmd.args.push("-march=armv7-a".into());
+
+ if target.abi == "eabihf" {
+ // lowest common denominator FPU
+ cmd.args.push("-mfpu=vfpv3-d16".into());
+ cmd.args.push("-mfloat-abi=hard".into());
+ }
+ }
+
+ // (x86 Android doesn't say "eabi")
+ if target.os == "android" && target.full_arch.contains("v7") {
+ cmd.args.push("-march=armv7-a".into());
+ cmd.args.push("-mthumb".into());
+ if !target.full_arch.contains("neon") {
+ // On android we can guarantee some extra float instructions
+ // (specified in the android spec online)
+ // NEON guarantees even more; see below.
+ cmd.args.push("-mfpu=vfpv3-d16".into());
+ }
+ cmd.args.push("-mfloat-abi=softfp".into());
+ }
+
+ if target.full_arch.contains("neon") {
+ cmd.args.push("-mfpu=neon-vfpv4".into());
+ }
+
+ if target.full_arch == "armv4t" && target.os == "linux" {
+ cmd.args.push("-march=armv4t".into());
+ cmd.args.push("-marm".into());
+ cmd.args.push("-mfloat-abi=soft".into());
+ }
+
+ if target.full_arch == "armv5te" && target.os == "linux" {
+ cmd.args.push("-march=armv5te".into());
+ cmd.args.push("-marm".into());
+ cmd.args.push("-mfloat-abi=soft".into());
+ }
+
+ // For us arm == armv6 by default
+ if target.full_arch == "arm" && target.os == "linux" {
+ cmd.args.push("-march=armv6".into());
+ cmd.args.push("-marm".into());
+ if target.abi == "eabihf" {
+ cmd.args.push("-mfpu=vfp".into());
+ } else {
+ cmd.args.push("-mfloat-abi=soft".into());
+ }
+ }
+
+ // Turn codegen down on i586 to avoid some instructions.
+ if target.full_arch == "i586" && target.os == "linux" {
+ cmd.args.push("-march=pentium".into());
+ }
+
+ // Set codegen level for i686 correctly
+ if target.full_arch == "i686" && target.os == "linux" {
+ cmd.args.push("-march=i686".into());
+ }
+
+ // Looks like `musl-gcc` makes it hard for `-m32` to make its way
+ // all the way to the linker, so we need to actually instruct the
+ // linker that we're generating 32-bit executables as well. This'll
+ // typically only be used for build scripts which transitively use
+ // these flags that try to compile executables.
+ if target.arch == "x86" && target.env == "musl" {
+ cmd.args.push("-Wl,-melf_i386".into());
+ }
+
+ if target.arch == "arm" && target.os == "none" && target.abi == "eabihf" {
+ cmd.args.push("-mfloat-abi=hard".into())
+ }
+ if target.full_arch.starts_with("thumb") {
+ cmd.args.push("-mthumb".into());
+ }
+ if target.full_arch.starts_with("thumbv6m") {
+ cmd.args.push("-march=armv6s-m".into());
+ }
+ if target.full_arch.starts_with("thumbv7em") {
+ cmd.args.push("-march=armv7e-m".into());
+
+ if target.abi == "eabihf" {
+ cmd.args.push("-mfpu=fpv4-sp-d16".into())
+ }
+ }
+ if target.full_arch.starts_with("thumbv7m") {
+ cmd.args.push("-march=armv7-m".into());
+ }
+ if target.full_arch.starts_with("thumbv8m.base") {
+ cmd.args.push("-march=armv8-m.base".into());
+ }
+ if target.full_arch.starts_with("thumbv8m.main") {
+ cmd.args.push("-march=armv8-m.main".into());
+
+ if target.abi == "eabihf" {
+ cmd.args.push("-mfpu=fpv5-sp-d16".into())
+ }
+ }
+ if target.full_arch.starts_with("armebv7r") | target.full_arch.starts_with("armv7r")
+ {
+ if target.full_arch.starts_with("armeb") {
+ cmd.args.push("-mbig-endian".into());
+ } else {
+ cmd.args.push("-mlittle-endian".into());
+ }
+
+ // ARM mode
+ cmd.args.push("-marm".into());
+
+ // R Profile
+ cmd.args.push("-march=armv7-r".into());
+
+ if target.abi == "eabihf" {
+ // lowest common denominator FPU
+ // (see Cortex-R4 technical reference manual)
+ cmd.args.push("-mfpu=vfpv3-d16".into())
+ }
+ }
+ if target.full_arch.starts_with("armv7a") {
+ cmd.args.push("-march=armv7-a".into());
+
+ if target.abi == "eabihf" {
+ // lowest common denominator FPU
+ cmd.args.push("-mfpu=vfpv3-d16".into());
+ }
+ }
+ if target.arch == "riscv32" || target.arch == "riscv64" {
+ // get the 32i/32imac/32imc/64gc/64imac/... part
+ let arch = &target.full_arch[5..];
+ if arch.starts_with("64") {
+ if matches!(target.os, "linux" | "freebsd" | "netbsd") {
+ cmd.args.push(("-march=rv64gc").into());
+ cmd.args.push("-mabi=lp64d".into());
+ } else {
+ cmd.args.push(("-march=rv".to_owned() + arch).into());
+ cmd.args.push("-mabi=lp64".into());
+ }
+ } else if arch.starts_with("32") {
+ if target.os == "linux" {
+ cmd.args.push(("-march=rv32gc").into());
+ cmd.args.push("-mabi=ilp32d".into());
+ } else {
+ cmd.args.push(("-march=rv".to_owned() + arch).into());
+ cmd.args.push("-mabi=ilp32".into());
+ }
+ } else {
+ cmd.args.push("-mcmodel=medany".into());
+ }
+ }
+ }
+ }
+
+ if target.vendor == "apple" {
+ self.apple_flags(cmd)?;
+ }
+
+ if self.static_flag.unwrap_or(false) {
+ cmd.args.push("-static".into());
+ }
+ if self.shared_flag.unwrap_or(false) {
+ cmd.args.push("-shared".into());
+ }
+
+ if self.cpp {
+ match (self.cpp_set_stdlib.as_ref(), cmd.family) {
+ (None, _) => {}
+ (Some(stdlib), ToolFamily::Gnu) | (Some(stdlib), ToolFamily::Clang { .. }) => {
+ cmd.push_cc_arg(format!("-stdlib=lib{}", stdlib).into());
+ }
+ _ => {
+ self.cargo_output.print_warning(&format_args!("cpp_set_stdlib is specified, but the {:?} compiler does not support this option, ignored", cmd.family));
+ }
+ }
+ }
+
+ Ok(())
+ }
+
+ fn add_inherited_rustflags(
+ &self,
+ cmd: &mut Tool,
+ target: &TargetInfo<'_>,
+ ) -> Result<(), Error> {
+ let env_os = match self.getenv("CARGO_ENCODED_RUSTFLAGS") {
+ Some(env) => env,
+ // No encoded RUSTFLAGS -> nothing to do
+ None => return Ok(()),
+ };
+
+ let env = env_os.to_string_lossy();
+ let codegen_flags = RustcCodegenFlags::parse(&env)?;
+ codegen_flags.cc_flags(self, cmd, target);
+ Ok(())
+ }
+
+ fn msvc_macro_assembler(&self) -> Result<Command, Error> {
+ let target = self.get_target()?;
+ let tool = if target.arch == "x86_64" {
+ "ml64.exe"
+ } else if target.arch == "arm" {
+ "armasm.exe"
+ } else if target.arch == "aarch64" {
+ "armasm64.exe"
+ } else {
+ "ml.exe"
+ };
+ let mut cmd = self
+ .windows_registry_find(&target, tool)
+ .unwrap_or_else(|| self.cmd(tool));
+ cmd.arg("-nologo"); // undocumented, yet working with armasm[64]
+ for directory in self.include_directories.iter() {
+ cmd.arg("-I").arg(&**directory);
+ }
+ if target.arch == "aarch64" || target.arch == "arm" {
+ if self.get_debug() {
+ cmd.arg("-g");
+ }
+
+ for (key, value) in self.definitions.iter() {
+ cmd.arg("-PreDefine");
+ if let Some(ref value) = *value {
+ if let Ok(i) = value.parse::<i32>() {
+ cmd.arg(format!("{} SETA {}", key, i));
+ } else if value.starts_with('"') && value.ends_with('"') {
+ cmd.arg(format!("{} SETS {}", key, value));
+ } else {
+ cmd.arg(format!("{} SETS \"{}\"", key, value));
+ }
+ } else {
+ cmd.arg(format!("{} SETL {}", key, "{TRUE}"));
+ }
+ }
+ } else {
+ if self.get_debug() {
+ cmd.arg("-Zi");
+ }
+
+ for (key, value) in self.definitions.iter() {
+ if let Some(ref value) = *value {
+ cmd.arg(format!("-D{}={}", key, value));
+ } else {
+ cmd.arg(format!("-D{}", key));
+ }
+ }
+ }
+
+ if target.arch == "x86" {
+ cmd.arg("-safeseh");
+ }
+
+ Ok(cmd)
+ }
+
+ fn assemble(&self, lib_name: &str, dst: &Path, objs: &[Object]) -> Result<(), Error> {
+ // Delete the destination if it exists as we want to
+ // create on the first iteration instead of appending.
+ let _ = fs::remove_file(dst);
+
+ // Add objects to the archive in limited-length batches. This helps keep
+ // the length of the command line within a reasonable length to avoid
+ // blowing system limits on limiting platforms like Windows.
+ let objs: Vec<_> = objs
+ .iter()
+ .map(|o| o.dst.as_path())
+ .chain(self.objects.iter().map(std::ops::Deref::deref))
+ .collect();
+ for chunk in objs.chunks(100) {
+ self.assemble_progressive(dst, chunk)?;
+ }
+
+ if self.cuda && self.cuda_file_count() > 0 {
+ // Link the device-side code and add it to the target library,
+ // so that non-CUDA linker can link the final binary.
+
+ let out_dir = self.get_out_dir()?;
+ let dlink = out_dir.join(lib_name.to_owned() + "_dlink.o");
+ let mut nvcc = self.get_compiler().to_command();
+ nvcc.arg("--device-link").arg("-o").arg(&dlink).arg(dst);
+ run(&mut nvcc, &self.cargo_output)?;
+ self.assemble_progressive(dst, &[dlink.as_path()])?;
+ }
+
+ let target = self.get_target()?;
+ if target.env == "msvc" {
+ // The Rust compiler will look for libfoo.a and foo.lib, but the
+ // MSVC linker will also be passed foo.lib, so be sure that both
+ // exist for now.
+
+ let lib_dst = dst.with_file_name(format!("{}.lib", lib_name));
+ let _ = fs::remove_file(&lib_dst);
+ match fs::hard_link(dst, &lib_dst).or_else(|_| {
+ // if hard-link fails, just copy (ignoring the number of bytes written)
+ fs::copy(dst, &lib_dst).map(|_| ())
+ }) {
+ Ok(_) => (),
+ Err(_) => {
+ return Err(Error::new(
+ ErrorKind::IOError,
+ "Could not copy or create a hard-link to the generated lib file.",
+ ));
+ }
+ };
+ } else {
+ // Non-msvc targets (those using `ar`) need a separate step to add
+ // the symbol table to archives since our construction command of
+ // `cq` doesn't add it for us.
+ let mut ar = self.try_get_archiver()?;
+
+ // NOTE: We add `s` even if flags were passed using $ARFLAGS/ar_flag, because `s`
+ // here represents a _mode_, not an arbitrary flag. Further discussion of this choice
+ // can be seen in https://github.com/rust-lang/cc-rs/pull/763.
+ run(ar.arg("s").arg(dst), &self.cargo_output)?;
+ }
+
+ Ok(())
+ }
+
+ fn assemble_progressive(&self, dst: &Path, objs: &[&Path]) -> Result<(), Error> {
+ let target = self.get_target()?;
+
+ let (mut cmd, program, any_flags) = self.try_get_archiver_and_flags()?;
+ if target.env == "msvc" && !program.to_string_lossy().contains("llvm-ar") {
+ // NOTE: -out: here is an I/O flag, and so must be included even if $ARFLAGS/ar_flag is
+ // in use. -nologo on the other hand is just a regular flag, and one that we'll skip if
+ // the caller has explicitly dictated the flags they want. See
+ // https://github.com/rust-lang/cc-rs/pull/763 for further discussion.
+ let mut out = OsString::from("-out:");
+ out.push(dst);
+ cmd.arg(out);
+ if !any_flags {
+ cmd.arg("-nologo");
+ }
+ // If the library file already exists, add the library name
+ // as an argument to let lib.exe know we are appending the objs.
+ if dst.exists() {
+ cmd.arg(dst);
+ }
+ cmd.args(objs);
+ run(&mut cmd, &self.cargo_output)?;
+ } else {
+ // Set an environment variable to tell the OSX archiver to ensure
+ // that all dates listed in the archive are zero, improving
+ // determinism of builds. AFAIK there's not really official
+ // documentation of this but there's a lot of references to it if
+ // you search google.
+ //
+ // You can reproduce this locally on a mac with:
+ //
+ // $ touch foo.c
+ // $ cc -c foo.c -o foo.o
+ //
+ // # Notice that these two checksums are different
+ // $ ar crus libfoo1.a foo.o && sleep 2 && ar crus libfoo2.a foo.o
+ // $ md5sum libfoo*.a
+ //
+ // # Notice that these two checksums are the same
+ // $ export ZERO_AR_DATE=1
+ // $ ar crus libfoo1.a foo.o && sleep 2 && touch foo.o && ar crus libfoo2.a foo.o
+ // $ md5sum libfoo*.a
+ //
+ // In any case if this doesn't end up getting read, it shouldn't
+ // cause that many issues!
+ cmd.env("ZERO_AR_DATE", "1");
+
+ // NOTE: We add cq here regardless of whether $ARFLAGS/ar_flag have been used because
+ // it dictates the _mode_ ar runs in, which the setter of $ARFLAGS/ar_flag can't
+ // dictate. See https://github.com/rust-lang/cc-rs/pull/763 for further discussion.
+ run(cmd.arg("cq").arg(dst).args(objs), &self.cargo_output)?;
+ }
+
+ Ok(())
+ }
+
+ fn apple_flags(&self, cmd: &mut Tool) -> Result<(), Error> {
+ let target = self.get_target()?;
+
+ // This is a Darwin/Apple-specific flag that works both on GCC and Clang, but it is only
+ // necessary on GCC since we specify `-target` on Clang.
+ // https://gcc.gnu.org/onlinedocs/gcc/Darwin-Options.html#:~:text=arch
+ // https://clang.llvm.org/docs/CommandGuide/clang.html#cmdoption-arch
+ if cmd.is_like_gnu() {
+ let arch = map_darwin_target_from_rust_to_compiler_architecture(&target);
+ cmd.args.push("-arch".into());
+ cmd.args.push(arch.into());
+ }
+
+ // Pass the deployment target via `-mmacosx-version-min=`, `-miphoneos-version-min=` and
+ // similar. Also necessary on GCC, as it forces a compilation error if the compiler is not
+ // configured for Darwin: https://gcc.gnu.org/onlinedocs/gcc/Darwin-Options.html
+ //
+ // On visionOS and Mac Catalyst, there is no -m*-version-min= flag:
+ // https://github.com/llvm/llvm-project/issues/88271
+ // And the workaround to use `-mtargetos=` cannot be used with the `--target` flag that we
+ // otherwise specify. So we avoid emitting that, and put the version in `--target` instead.
+ if cmd.is_like_gnu() || !(target.os == "visionos" || target.abi == "macabi") {
+ let min_version = self.apple_deployment_target(&target);
+ cmd.args
+ .push(target.apple_version_flag(&min_version).into());
+ }
+
+ // AppleClang sometimes requires sysroot even on macOS
+ if cmd.is_xctoolchain_clang() || target.os != "macos" {
+ self.cargo_output.print_metadata(&format_args!(
+ "Detecting {:?} SDK path for {}",
+ target.os,
+ target.apple_sdk_name(),
+ ));
+ let sdk_path = self.apple_sdk_root(&target)?;
+
+ cmd.args.push("-isysroot".into());
+ cmd.args.push(OsStr::new(&sdk_path).to_owned());
+ cmd.env
+ .push(("SDKROOT".into(), OsStr::new(&sdk_path).to_owned()));
+
+ if target.abi == "macabi" {
+ // Mac Catalyst uses the macOS SDK, but to compile against and
+ // link to iOS-specific frameworks, we should have the support
+ // library stubs in the include and library search path.
+ let ios_support = Path::new(&sdk_path).join("System/iOSSupport");
+
+ cmd.args.extend([
+ // Header search path
+ OsString::from("-isystem"),
+ ios_support.join("usr/include").into(),
+ // Framework header search path
+ OsString::from("-iframework"),
+ ios_support.join("System/Library/Frameworks").into(),
+ // Library search path
+ {
+ let mut s = OsString::from("-L");
+ s.push(ios_support.join("usr/lib"));
+ s
+ },
+ // Framework linker search path
+ {
+ // Technically, we _could_ avoid emitting `-F`, as
+ // `-iframework` implies it, but let's keep it in for
+ // clarity.
+ let mut s = OsString::from("-F");
+ s.push(ios_support.join("System/Library/Frameworks"));
+ s
+ },
+ ]);
+ }
+ }
+
+ Ok(())
+ }
+
+ fn cmd<P: AsRef<OsStr>>(&self, prog: P) -> Command {
+ let mut cmd = Command::new(prog);
+ for (a, b) in self.env.iter() {
+ cmd.env(a, b);
+ }
+ cmd
+ }
+
+ fn get_base_compiler(&self) -> Result<Tool, Error> {
+ let out_dir = self.get_out_dir().ok();
+ let out_dir = out_dir.as_deref();
+
+ if let Some(c) = &self.compiler {
+ return Ok(Tool::new(
+ (**c).to_owned(),
+ &self.build_cache.cached_compiler_family,
+ &self.cargo_output,
+ out_dir,
+ ));
+ }
+ let target = self.get_target()?;
+ let raw_target = self.get_raw_target()?;
+ let (env, msvc, gnu, traditional, clang) = if self.cpp {
+ ("CXX", "cl.exe", "g++", "c++", "clang++")
+ } else {
+ ("CC", "cl.exe", "gcc", "cc", "clang")
+ };
+
+ // On historical Solaris systems, "cc" may have been Sun Studio, which
+ // is not flag-compatible with "gcc". This history casts a long shadow,
+ // and many modern illumos distributions today ship GCC as "gcc" without
+ // also making it available as "cc".
+ let default = if cfg!(target_os = "solaris") || cfg!(target_os = "illumos") {
+ gnu
+ } else {
+ traditional
+ };
+
+ let cl_exe = self.windows_registry_find_tool(&target, "cl.exe");
+
+ let tool_opt: Option<Tool> = self
+ .env_tool(env)
+ .map(|(tool, wrapper, args)| {
+ // Chop off leading/trailing whitespace to work around
+ // semi-buggy build scripts which are shared in
+ // makefiles/configure scripts (where spaces are far more
+ // lenient)
+ let mut t = Tool::with_args(
+ tool,
+ args.clone(),
+ &self.build_cache.cached_compiler_family,
+ &self.cargo_output,
+ out_dir,
+ );
+ if let Some(cc_wrapper) = wrapper {
+ t.cc_wrapper_path = Some(Path::new(&cc_wrapper).to_owned());
+ }
+ for arg in args {
+ t.cc_wrapper_args.push(arg.into());
+ }
+ t
+ })
+ .or_else(|| {
+ if target.os == "emscripten" {
+ let tool = if self.cpp { "em++" } else { "emcc" };
+ // Windows uses bat file so we have to be a bit more specific
+ if cfg!(windows) {
+ let mut t = Tool::with_family(
+ PathBuf::from("cmd"),
+ ToolFamily::Clang { zig_cc: false },
+ );
+ t.args.push("/c".into());
+ t.args.push(format!("{}.bat", tool).into());
+ Some(t)
+ } else {
+ Some(Tool::new(
+ PathBuf::from(tool),
+ &self.build_cache.cached_compiler_family,
+ &self.cargo_output,
+ out_dir,
+ ))
+ }
+ } else {
+ None
+ }
+ })
+ .or_else(|| cl_exe.clone());
+
+ let tool = match tool_opt {
+ Some(t) => t,
+ None => {
+ let compiler = if cfg!(windows) && target.os == "windows" {
+ if target.env == "msvc" {
+ msvc.to_string()
+ } else {
+ let cc = if target.abi == "llvm" { clang } else { gnu };
+ format!("{}.exe", cc)
+ }
+ } else if target.os == "ios"
+ || target.os == "watchos"
+ || target.os == "tvos"
+ || target.os == "visionos"
+ {
+ clang.to_string()
+ } else if target.os == "android" {
+ autodetect_android_compiler(&raw_target, gnu, clang)
+ } else if target.os == "cloudabi" {
+ format!(
+ "{}-{}-{}-{}",
+ target.full_arch, target.vendor, target.os, traditional
+ )
+ } else if target.arch == "wasm32" || target.arch == "wasm64" {
+ // Compiling WASM is not currently supported by GCC, so
+ // let's default to Clang.
+ clang.to_string()
+ } else if target.os == "vxworks" {
+ if self.cpp {
+ "wr-c++".to_string()
+ } else {
+ "wr-cc".to_string()
+ }
+ } else if target.arch == "arm" && target.vendor == "kmc" {
+ format!("arm-kmc-eabi-{}", gnu)
+ } else if target.arch == "aarch64" && target.vendor == "kmc" {
+ format!("aarch64-kmc-elf-{}", gnu)
+ } else if target.os == "nto" {
+ // See for details: https://github.com/rust-lang/cc-rs/pull/1319
+ if self.cpp {
+ "q++".to_string()
+ } else {
+ "qcc".to_string()
+ }
+ } else if self.get_is_cross_compile()? {
+ let prefix = self.prefix_for_target(&raw_target);
+ match prefix {
+ Some(prefix) => {
+ let cc = if target.abi == "llvm" { clang } else { gnu };
+ format!("{}-{}", prefix, cc)
+ }
+ None => default.to_string(),
+ }
+ } else {
+ default.to_string()
+ };
+
+ let mut t = Tool::new(
+ PathBuf::from(compiler),
+ &self.build_cache.cached_compiler_family,
+ &self.cargo_output,
+ out_dir,
+ );
+ if let Some(cc_wrapper) = self.rustc_wrapper_fallback() {
+ t.cc_wrapper_path = Some(Path::new(&cc_wrapper).to_owned());
+ }
+ t
+ }
+ };
+
+ let mut tool = if self.cuda {
+ assert!(
+ tool.args.is_empty(),
+ "CUDA compilation currently assumes empty pre-existing args"
+ );
+ let nvcc = match self.getenv_with_target_prefixes("NVCC") {
+ Err(_) => PathBuf::from("nvcc"),
+ Ok(nvcc) => PathBuf::from(&*nvcc),
+ };
+ let mut nvcc_tool = Tool::with_features(
+ nvcc,
+ vec![],
+ self.cuda,
+ &self.build_cache.cached_compiler_family,
+ &self.cargo_output,
+ out_dir,
+ );
+ if self.ccbin {
+ nvcc_tool
+ .args
+ .push(format!("-ccbin={}", tool.path.display()).into());
+ }
+ if let Some(cc_wrapper) = self.rustc_wrapper_fallback() {
+ nvcc_tool.cc_wrapper_path = Some(Path::new(&cc_wrapper).to_owned());
+ }
+ nvcc_tool.family = tool.family;
+ nvcc_tool
+ } else {
+ tool
+ };
+
+ // New "standalone" C/C++ cross-compiler executables from recent Android NDK
+ // are just shell scripts that call main clang binary (from Android NDK) with
+ // proper `--target` argument.
+ //
+ // For example, armv7a-linux-androideabi16-clang passes
+ // `--target=armv7a-linux-androideabi16` to clang.
+ //
+ // As the shell script calls the main clang binary, the command line limit length
+ // on Windows is restricted to around 8k characters instead of around 32k characters.
+ // To remove this limit, we call the main clang binary directly and construct the
+ // `--target=` ourselves.
+ if cfg!(windows) && android_clang_compiler_uses_target_arg_internally(&tool.path) {
+ if let Some(path) = tool.path.file_name() {
+ let file_name = path.to_str().unwrap().to_owned();
+ let (target, clang) = file_name.split_at(file_name.rfind('-').unwrap());
+
+ tool.has_internal_target_arg = true;
+ tool.path.set_file_name(clang.trim_start_matches('-'));
+ tool.path.set_extension("exe");
+ tool.args.push(format!("--target={}", target).into());
+
+ // Additionally, shell scripts for target i686-linux-android versions 16 to 24
+ // pass the `mstackrealign` option so we do that here as well.
+ if target.contains("i686-linux-android") {
+ let (_, version) = target.split_at(target.rfind('d').unwrap() + 1);
+ if let Ok(version) = version.parse::<u32>() {
+ if version > 15 && version < 25 {
+ tool.args.push("-mstackrealign".into());
+ }
+ }
+ }
+ };
+ }
+
+ // If we found `cl.exe` in our environment, the tool we're returning is
+ // an MSVC-like tool, *and* no env vars were set then set env vars for
+ // the tool that we're returning.
+ //
+ // Env vars are needed for things like `link.exe` being put into PATH as
+ // well as header include paths sometimes. These paths are automatically
+ // included by default but if the `CC` or `CXX` env vars are set these
+ // won't be used. This'll ensure that when the env vars are used to
+ // configure for invocations like `clang-cl` we still get a "works out
+ // of the box" experience.
+ if let Some(cl_exe) = cl_exe {
+ if tool.family == (ToolFamily::Msvc { clang_cl: true })
+ && tool.env.is_empty()
+ && target.env == "msvc"
+ {
+ for (k, v) in cl_exe.env.iter() {
+ tool.env.push((k.to_owned(), v.to_owned()));
+ }
+ }
+ }
+
+ if target.env == "msvc" && tool.family == ToolFamily::Gnu {
+ self.cargo_output
+ .print_warning(&"GNU compiler is not supported for this target");
+ }
+
+ Ok(tool)
+ }
+
+ /// Returns a fallback `cc_compiler_wrapper` by introspecting `RUSTC_WRAPPER`
+ fn rustc_wrapper_fallback(&self) -> Option<Arc<OsStr>> {
+ // No explicit CC wrapper was detected, but check if RUSTC_WRAPPER
+ // is defined and is a build accelerator that is compatible with
+ // C/C++ compilers (e.g. sccache)
+ const VALID_WRAPPERS: &[&str] = &["sccache", "cachepot", "buildcache"];
+
+ let rustc_wrapper = self.getenv("RUSTC_WRAPPER")?;
+ let wrapper_path = Path::new(&rustc_wrapper);
+ let wrapper_stem = wrapper_path.file_stem()?;
+
+ if VALID_WRAPPERS.contains(&wrapper_stem.to_str()?) {
+ Some(rustc_wrapper)
+ } else {
+ None
+ }
+ }
+
+ /// Returns compiler path, optional modifier name from whitelist, and arguments vec
+ fn env_tool(&self, name: &str) -> Option<(PathBuf, Option<Arc<OsStr>>, Vec<String>)> {
+ let tool = self.getenv_with_target_prefixes(name).ok()?;
+ let tool = tool.to_string_lossy();
+ let tool = tool.trim();
+
+ if tool.is_empty() {
+ return None;
+ }
+
+ // If this is an exact path on the filesystem we don't want to do any
+ // interpretation at all, just pass it on through. This'll hopefully get
+ // us to support spaces-in-paths.
+ if Path::new(tool).exists() {
+ return Some((
+ PathBuf::from(tool),
+ self.rustc_wrapper_fallback(),
+ Vec::new(),
+ ));
+ }
+
+ // Ok now we want to handle a couple of scenarios. We'll assume from
+ // here on out that spaces are splitting separate arguments. Two major
+ // features we want to support are:
+ //
+ // CC='sccache cc'
+ //
+ // aka using `sccache` or any other wrapper/caching-like-thing for
+ // compilations. We want to know what the actual compiler is still,
+ // though, because our `Tool` API support introspection of it to see
+ // what compiler is in use.
+ //
+ // additionally we want to support
+ //
+ // CC='cc -flag'
+ //
+ // where the CC env var is used to also pass default flags to the C
+ // compiler.
+ //
+ // It's true that everything here is a bit of a pain, but apparently if
+ // you're not literally make or bash then you get a lot of bug reports.
+ let mut known_wrappers = vec![
+ "ccache",
+ "distcc",
+ "sccache",
+ "icecc",
+ "cachepot",
+ "buildcache",
+ ];
+ let custom_wrapper = self.getenv("CC_KNOWN_WRAPPER_CUSTOM");
+ if custom_wrapper.is_some() {
+ known_wrappers.push(custom_wrapper.as_deref().unwrap().to_str().unwrap());
+ }
+
+ let mut parts = tool.split_whitespace();
+ let maybe_wrapper = parts.next()?;
+
+ let file_stem = Path::new(maybe_wrapper).file_stem()?.to_str()?;
+ if known_wrappers.contains(&file_stem) {
+ if let Some(compiler) = parts.next() {
+ return Some((
+ compiler.into(),
+ Some(Arc::<OsStr>::from(OsStr::new(&maybe_wrapper))),
+ parts.map(|s| s.to_string()).collect(),
+ ));
+ }
+ }
+
+ Some((
+ maybe_wrapper.into(),
+ self.rustc_wrapper_fallback(),
+ parts.map(|s| s.to_string()).collect(),
+ ))
+ }
+
+ /// Returns the C++ standard library:
+ /// 1. If [`cpp_link_stdlib`](cc::Build::cpp_link_stdlib) is set, uses its value.
+ /// 2. Else if the `CXXSTDLIB` environment variable is set, uses its value.
+ /// 3. Else the default is `c++` for OS X and BSDs, `c++_shared` for Android,
+ /// `None` for MSVC and `stdc++` for anything else.
+ fn get_cpp_link_stdlib(&self) -> Result<Option<Cow<'_, Path>>, Error> {
+ match &self.cpp_link_stdlib {
+ Some(s) => Ok(s.as_deref().map(Path::new).map(Cow::Borrowed)),
+ None => {
+ if let Ok(stdlib) = self.getenv_with_target_prefixes("CXXSTDLIB") {
+ if stdlib.is_empty() {
+ Ok(None)
+ } else {
+ Ok(Some(Cow::Owned(Path::new(&stdlib).to_owned())))
+ }
+ } else {
+ let target = self.get_target()?;
+ if target.env == "msvc" {
+ Ok(None)
+ } else if target.vendor == "apple"
+ || target.os == "freebsd"
+ || target.os == "openbsd"
+ || target.os == "aix"
+ || (target.os == "linux" && target.env == "ohos")
+ || target.os == "wasi"
+ {
+ Ok(Some(Cow::Borrowed(Path::new("c++"))))
+ } else if target.os == "android" {
+ Ok(Some(Cow::Borrowed(Path::new("c++_shared"))))
+ } else {
+ Ok(Some(Cow::Borrowed(Path::new("stdc++"))))
+ }
+ }
+ }
+ }
+ }
+
+ /// Get the archiver (ar) that's in use for this configuration.
+ ///
+ /// You can use [`Command::get_program`] to get just the path to the command.
+ ///
+ /// This method will take into account all configuration such as debug
+ /// information, optimization level, include directories, defines, etc.
+ /// Additionally, the compiler binary in use follows the standard
+ /// conventions for this path, e.g. looking at the explicitly set compiler,
+ /// environment variables (a number of which are inspected here), and then
+ /// falling back to the default configuration.
+ ///
+ /// # Panics
+ ///
+ /// Panics if an error occurred while determining the architecture.
+ pub fn get_archiver(&self) -> Command {
+ match self.try_get_archiver() {
+ Ok(tool) => tool,
+ Err(e) => fail(&e.message),
+ }
+ }
+
+ /// Get the archiver that's in use for this configuration.
+ ///
+ /// This will return a result instead of panicking;
+ /// see [`Self::get_archiver`] for the complete description.
+ pub fn try_get_archiver(&self) -> Result<Command, Error> {
+ Ok(self.try_get_archiver_and_flags()?.0)
+ }
+
+ fn try_get_archiver_and_flags(&self) -> Result<(Command, PathBuf, bool), Error> {
+ let (mut cmd, name) = self.get_base_archiver()?;
+ let mut any_flags = false;
+ if let Some(flags) = self.envflags("ARFLAGS")? {
+ any_flags = true;
+ cmd.args(flags);
+ }
+ for flag in &self.ar_flags {
+ any_flags = true;
+ cmd.arg(&**flag);
+ }
+ Ok((cmd, name, any_flags))
+ }
+
+ fn get_base_archiver(&self) -> Result<(Command, PathBuf), Error> {
+ if let Some(ref a) = self.archiver {
+ let archiver = &**a;
+ return Ok((self.cmd(archiver), archiver.into()));
+ }
+
+ self.get_base_archiver_variant("AR", "ar")
+ }
+
+ /// Get the ranlib that's in use for this configuration.
+ ///
+ /// You can use [`Command::get_program`] to get just the path to the command.
+ ///
+ /// This method will take into account all configuration such as debug
+ /// information, optimization level, include directories, defines, etc.
+ /// Additionally, the compiler binary in use follows the standard
+ /// conventions for this path, e.g. looking at the explicitly set compiler,
+ /// environment variables (a number of which are inspected here), and then
+ /// falling back to the default configuration.
+ ///
+ /// # Panics
+ ///
+ /// Panics if an error occurred while determining the architecture.
+ pub fn get_ranlib(&self) -> Command {
+ match self.try_get_ranlib() {
+ Ok(tool) => tool,
+ Err(e) => fail(&e.message),
+ }
+ }
+
+ /// Get the ranlib that's in use for this configuration.
+ ///
+ /// This will return a result instead of panicking;
+ /// see [`Self::get_ranlib`] for the complete description.
+ pub fn try_get_ranlib(&self) -> Result<Command, Error> {
+ let mut cmd = self.get_base_ranlib()?;
+ if let Some(flags) = self.envflags("RANLIBFLAGS")? {
+ cmd.args(flags);
+ }
+ Ok(cmd)
+ }
+
+ fn get_base_ranlib(&self) -> Result<Command, Error> {
+ if let Some(ref r) = self.ranlib {
+ return Ok(self.cmd(&**r));
+ }
+
+ Ok(self.get_base_archiver_variant("RANLIB", "ranlib")?.0)
+ }
+
+ fn get_base_archiver_variant(
+ &self,
+ env: &str,
+ tool: &str,
+ ) -> Result<(Command, PathBuf), Error> {
+ let target = self.get_target()?;
+ let mut name = PathBuf::new();
+ let tool_opt: Option<Command> = self
+ .env_tool(env)
+ .map(|(tool, _wrapper, args)| {
+ name.clone_from(&tool);
+ let mut cmd = self.cmd(tool);
+ cmd.args(args);
+ cmd
+ })
+ .or_else(|| {
+ if target.os == "emscripten" {
+ // Windows use bat files so we have to be a bit more specific
+ if cfg!(windows) {
+ let mut cmd = self.cmd("cmd");
+ name = format!("em{}.bat", tool).into();
+ cmd.arg("/c").arg(&name);
+ Some(cmd)
+ } else {
+ name = format!("em{}", tool).into();
+ Some(self.cmd(&name))
+ }
+ } else if target.arch == "wasm32" || target.arch == "wasm64" {
+ // Formally speaking one should be able to use this approach,
+ // parsing -print-search-dirs output, to cover all clang targets,
+ // including Android SDKs and other cross-compilation scenarios...
+ // And even extend it to gcc targets by searching for "ar" instead
+ // of "llvm-ar"...
+ let compiler = self.get_base_compiler().ok()?;
+ if compiler.is_like_clang() {
+ name = format!("llvm-{}", tool).into();
+ self.search_programs(
+ &mut self.cmd(&compiler.path),
+ &name,
+ &self.cargo_output,
+ )
+ .map(|name| self.cmd(name))
+ } else {
+ None
+ }
+ } else {
+ None
+ }
+ });
+
+ let tool = match tool_opt {
+ Some(t) => t,
+ None => {
+ if target.os == "android" {
+ name = format!("llvm-{}", tool).into();
+ match Command::new(&name).arg("--version").status() {
+ Ok(status) if status.success() => (),
+ _ => {
+ // FIXME: Use parsed target.
+ let raw_target = self.get_raw_target()?;
+ name = format!("{}-{}", raw_target.replace("armv7", "arm"), tool).into()
+ }
+ }
+ self.cmd(&name)
+ } else if target.env == "msvc" {
+ // NOTE: There isn't really a ranlib on msvc, so arguably we should return
+ // `None` somehow here. But in general, callers will already have to be aware
+ // of not running ranlib on Windows anyway, so it feels okay to return lib.exe
+ // here.
+
+ let compiler = self.get_base_compiler()?;
+ let mut lib = String::new();
+ if compiler.family == (ToolFamily::Msvc { clang_cl: true }) {
+ // See if there is 'llvm-lib' next to 'clang-cl'
+ // Another possibility could be to see if there is 'clang'
+ // next to 'clang-cl' and use 'search_programs()' to locate
+ // 'llvm-lib'. This is because 'clang-cl' doesn't support
+ // the -print-search-dirs option.
+ if let Some(mut cmd) = self.which(&compiler.path, None) {
+ cmd.pop();
+ cmd.push("llvm-lib.exe");
+ if let Some(llvm_lib) = self.which(&cmd, None) {
+ llvm_lib.to_str().unwrap().clone_into(&mut lib);
+ }
+ }
+ }
+
+ if lib.is_empty() {
+ name = PathBuf::from("lib.exe");
+ let mut cmd = match self.windows_registry_find(&target, "lib.exe") {
+ Some(t) => t,
+ None => self.cmd("lib.exe"),
+ };
+ if target.full_arch == "arm64ec" {
+ cmd.arg("/machine:arm64ec");
+ }
+ cmd
+ } else {
+ name = lib.into();
+ self.cmd(&name)
+ }
+ } else if target.os == "illumos" {
+ // The default 'ar' on illumos uses a non-standard flags,
+ // but the OS comes bundled with a GNU-compatible variant.
+ //
+ // Use the GNU-variant to match other Unix systems.
+ name = format!("g{}", tool).into();
+ self.cmd(&name)
+ } else if target.os == "vxworks" {
+ name = format!("wr-{}", tool).into();
+ self.cmd(&name)
+ } else if target.os == "nto" {
+ // Ref: https://www.qnx.com/developers/docs/8.0/com.qnx.doc.neutrino.utilities/topic/a/ar.html
+ name = match target.full_arch {
+ "i586" => format!("ntox86-{}", tool).into(),
+ "x86" | "aarch64" | "x86_64" => {
+ format!("nto{}-{}", target.arch, tool).into()
+ }
+ _ => {
+ return Err(Error::new(
+ ErrorKind::InvalidTarget,
+ format!("Unknown architecture for Neutrino QNX: {}", target.arch),
+ ))
+ }
+ };
+ self.cmd(&name)
+ } else if self.get_is_cross_compile()? {
+ match self.prefix_for_target(&self.get_raw_target()?) {
+ Some(prefix) => {
+ // GCC uses $target-gcc-ar, whereas binutils uses $target-ar -- try both.
+ // Prefer -ar if it exists, as builds of `-gcc-ar` have been observed to be
+ // outright broken (such as when targeting freebsd with `--disable-lto`
+ // toolchain where the archiver attempts to load the LTO plugin anyway but
+ // fails to find one).
+ //
+ // The same applies to ranlib.
+ let chosen = ["", "-gcc"]
+ .iter()
+ .filter_map(|infix| {
+ let target_p = format!("{prefix}{infix}-{tool}");
+ let status = Command::new(&target_p)
+ .arg("--version")
+ .stdin(Stdio::null())
+ .stdout(Stdio::null())
+ .stderr(Stdio::null())
+ .status()
+ .ok()?;
+ status.success().then_some(target_p)
+ })
+ .next()
+ .unwrap_or_else(|| tool.to_string());
+ name = chosen.into();
+ self.cmd(&name)
+ }
+ None => {
+ name = tool.into();
+ self.cmd(&name)
+ }
+ }
+ } else {
+ name = tool.into();
+ self.cmd(&name)
+ }
+ }
+ };
+
+ Ok((tool, name))
+ }
+
+ // FIXME: Use parsed target instead of raw target.
+ fn prefix_for_target(&self, target: &str) -> Option<Cow<'static, str>> {
+ // CROSS_COMPILE is of the form: "arm-linux-gnueabi-"
+ self.getenv("CROSS_COMPILE")
+ .as_deref()
+ .map(|s| s.to_string_lossy().trim_end_matches('-').to_owned())
+ .map(Cow::Owned)
+ .or_else(|| {
+ // Put aside RUSTC_LINKER's prefix to be used as second choice, after CROSS_COMPILE
+ self.getenv("RUSTC_LINKER").and_then(|var| {
+ var.to_string_lossy()
+ .strip_suffix("-gcc")
+ .map(str::to_string)
+ .map(Cow::Owned)
+ })
+ })
+ .or_else(|| {
+ match target {
+ // Note: there is no `aarch64-pc-windows-gnu` target, only `-gnullvm`
+ "aarch64-pc-windows-gnullvm" => Some("aarch64-w64-mingw32"),
+ "aarch64-uwp-windows-gnu" => Some("aarch64-w64-mingw32"),
+ "aarch64-unknown-linux-gnu" => Some("aarch64-linux-gnu"),
+ "aarch64-unknown-linux-musl" => Some("aarch64-linux-musl"),
+ "aarch64-unknown-netbsd" => Some("aarch64--netbsd"),
+ "arm-unknown-linux-gnueabi" => Some("arm-linux-gnueabi"),
+ "armv4t-unknown-linux-gnueabi" => Some("arm-linux-gnueabi"),
+ "armv5te-unknown-linux-gnueabi" => Some("arm-linux-gnueabi"),
+ "armv5te-unknown-linux-musleabi" => Some("arm-linux-gnueabi"),
+ "arm-unknown-linux-gnueabihf" => Some("arm-linux-gnueabihf"),
+ "arm-unknown-linux-musleabi" => Some("arm-linux-musleabi"),
+ "arm-unknown-linux-musleabihf" => Some("arm-linux-musleabihf"),
+ "arm-unknown-netbsd-eabi" => Some("arm--netbsdelf-eabi"),
+ "armv6-unknown-netbsd-eabihf" => Some("armv6--netbsdelf-eabihf"),
+ "armv7-unknown-linux-gnueabi" => Some("arm-linux-gnueabi"),
+ "armv7-unknown-linux-gnueabihf" => Some("arm-linux-gnueabihf"),
+ "armv7-unknown-linux-musleabihf" => Some("arm-linux-musleabihf"),
+ "armv7neon-unknown-linux-gnueabihf" => Some("arm-linux-gnueabihf"),
+ "armv7neon-unknown-linux-musleabihf" => Some("arm-linux-musleabihf"),
+ "thumbv7-unknown-linux-gnueabihf" => Some("arm-linux-gnueabihf"),
+ "thumbv7-unknown-linux-musleabihf" => Some("arm-linux-musleabihf"),
+ "thumbv7neon-unknown-linux-gnueabihf" => Some("arm-linux-gnueabihf"),
+ "thumbv7neon-unknown-linux-musleabihf" => Some("arm-linux-musleabihf"),
+ "armv7-unknown-netbsd-eabihf" => Some("armv7--netbsdelf-eabihf"),
+ "hexagon-unknown-linux-musl" => Some("hexagon-linux-musl"),
+ "i586-unknown-linux-musl" => Some("musl"),
+ "i686-pc-windows-gnu" => Some("i686-w64-mingw32"),
+ "i686-pc-windows-gnullvm" => Some("i686-w64-mingw32"),
+ "i686-uwp-windows-gnu" => Some("i686-w64-mingw32"),
+ "i686-unknown-linux-gnu" => self.find_working_gnu_prefix(&[
+ "i686-linux-gnu",
+ "x86_64-linux-gnu", // transparently support gcc-multilib
+ ]), // explicit None if not found, so caller knows to fall back
+ "i686-unknown-linux-musl" => Some("musl"),
+ "i686-unknown-netbsd" => Some("i486--netbsdelf"),
+ "loongarch64-unknown-linux-gnu" => Some("loongarch64-linux-gnu"),
+ "mips-unknown-linux-gnu" => Some("mips-linux-gnu"),
+ "mips-unknown-linux-musl" => Some("mips-linux-musl"),
+ "mipsel-unknown-linux-gnu" => Some("mipsel-linux-gnu"),
+ "mipsel-unknown-linux-musl" => Some("mipsel-linux-musl"),
+ "mips64-unknown-linux-gnuabi64" => Some("mips64-linux-gnuabi64"),
+ "mips64el-unknown-linux-gnuabi64" => Some("mips64el-linux-gnuabi64"),
+ "mipsisa32r6-unknown-linux-gnu" => Some("mipsisa32r6-linux-gnu"),
+ "mipsisa32r6el-unknown-linux-gnu" => Some("mipsisa32r6el-linux-gnu"),
+ "mipsisa64r6-unknown-linux-gnuabi64" => Some("mipsisa64r6-linux-gnuabi64"),
+ "mipsisa64r6el-unknown-linux-gnuabi64" => Some("mipsisa64r6el-linux-gnuabi64"),
+ "powerpc-unknown-linux-gnu" => Some("powerpc-linux-gnu"),
+ "powerpc-unknown-linux-gnuspe" => Some("powerpc-linux-gnuspe"),
+ "powerpc-unknown-netbsd" => Some("powerpc--netbsd"),
+ "powerpc64-unknown-linux-gnu" => Some("powerpc64-linux-gnu"),
+ "powerpc64le-unknown-linux-gnu" => Some("powerpc64le-linux-gnu"),
+ "riscv32i-unknown-none-elf" => self.find_working_gnu_prefix(&[
+ "riscv32-unknown-elf",
+ "riscv64-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv32imac-esp-espidf" => Some("riscv32-esp-elf"),
+ "riscv32imac-unknown-none-elf" => self.find_working_gnu_prefix(&[
+ "riscv32-unknown-elf",
+ "riscv64-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv32imac-unknown-xous-elf" => self.find_working_gnu_prefix(&[
+ "riscv32-unknown-elf",
+ "riscv64-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv32imc-esp-espidf" => Some("riscv32-esp-elf"),
+ "riscv32imc-unknown-none-elf" => self.find_working_gnu_prefix(&[
+ "riscv32-unknown-elf",
+ "riscv64-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv64gc-unknown-none-elf" => self.find_working_gnu_prefix(&[
+ "riscv64-unknown-elf",
+ "riscv32-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv64imac-unknown-none-elf" => self.find_working_gnu_prefix(&[
+ "riscv64-unknown-elf",
+ "riscv32-unknown-elf",
+ "riscv-none-embed",
+ ]),
+ "riscv64gc-unknown-linux-gnu" => Some("riscv64-linux-gnu"),
+ "riscv32gc-unknown-linux-gnu" => Some("riscv32-linux-gnu"),
+ "riscv64gc-unknown-linux-musl" => Some("riscv64-linux-musl"),
+ "riscv32gc-unknown-linux-musl" => Some("riscv32-linux-musl"),
+ "riscv64gc-unknown-netbsd" => Some("riscv64--netbsd"),
+ "s390x-unknown-linux-gnu" => Some("s390x-linux-gnu"),
+ "sparc-unknown-linux-gnu" => Some("sparc-linux-gnu"),
+ "sparc64-unknown-linux-gnu" => Some("sparc64-linux-gnu"),
+ "sparc64-unknown-netbsd" => Some("sparc64--netbsd"),
+ "sparcv9-sun-solaris" => Some("sparcv9-sun-solaris"),
+ "armv7a-none-eabi" => Some("arm-none-eabi"),
+ "armv7a-none-eabihf" => Some("arm-none-eabi"),
+ "armebv7r-none-eabi" => Some("arm-none-eabi"),
+ "armebv7r-none-eabihf" => Some("arm-none-eabi"),
+ "armv7r-none-eabi" => Some("arm-none-eabi"),
+ "armv7r-none-eabihf" => Some("arm-none-eabi"),
+ "armv8r-none-eabihf" => Some("arm-none-eabi"),
+ "thumbv6m-none-eabi" => Some("arm-none-eabi"),
+ "thumbv7em-none-eabi" => Some("arm-none-eabi"),
+ "thumbv7em-none-eabihf" => Some("arm-none-eabi"),
+ "thumbv7m-none-eabi" => Some("arm-none-eabi"),
+ "thumbv8m.base-none-eabi" => Some("arm-none-eabi"),
+ "thumbv8m.main-none-eabi" => Some("arm-none-eabi"),
+ "thumbv8m.main-none-eabihf" => Some("arm-none-eabi"),
+ "x86_64-pc-windows-gnu" => Some("x86_64-w64-mingw32"),
+ "x86_64-pc-windows-gnullvm" => Some("x86_64-w64-mingw32"),
+ "x86_64-uwp-windows-gnu" => Some("x86_64-w64-mingw32"),
+ "x86_64-rumprun-netbsd" => Some("x86_64-rumprun-netbsd"),
+ "x86_64-unknown-linux-gnu" => self.find_working_gnu_prefix(&[
+ "x86_64-linux-gnu", // rustfmt wrap
+ ]), // explicit None if not found, so caller knows to fall back
+ "x86_64-unknown-linux-musl" => {
+ self.find_working_gnu_prefix(&["x86_64-linux-musl", "musl"])
+ }
+ "x86_64-unknown-netbsd" => Some("x86_64--netbsd"),
+ _ => None,
+ }
+ .map(Cow::Borrowed)
+ })
+ }
+
+ /// Some platforms have multiple, compatible, canonical prefixes. Look through
+ /// each possible prefix for a compiler that exists and return it. The prefixes
+ /// should be ordered from most-likely to least-likely.
+ fn find_working_gnu_prefix(&self, prefixes: &[&'static str]) -> Option<&'static str> {
+ let suffix = if self.cpp { "-g++" } else { "-gcc" };
+ let extension = std::env::consts::EXE_SUFFIX;
+
+ // Loop through PATH entries searching for each toolchain. This ensures that we
+ // are more likely to discover the toolchain early on, because chances are good
+ // that the desired toolchain is in one of the higher-priority paths.
+ self.getenv("PATH")
+ .as_ref()
+ .and_then(|path_entries| {
+ env::split_paths(path_entries).find_map(|path_entry| {
+ for prefix in prefixes {
+ let target_compiler = format!("{}{}{}", prefix, suffix, extension);
+ if path_entry.join(&target_compiler).exists() {
+ return Some(prefix);
+ }
+ }
+ None
+ })
+ })
+ .copied()
+ // If no toolchain was found, provide the first toolchain that was passed in.
+ // This toolchain has been shown not to exist, however it will appear in the
+ // error that is shown to the user which should make it easier to search for
+ // where it should be obtained.
+ .or_else(|| prefixes.first().copied())
+ }
+
+ fn get_target(&self) -> Result<TargetInfo<'_>, Error> {
+ match &self.target {
+ Some(t) if Some(&**t) != self.getenv_unwrap_str("TARGET").ok().as_deref() => {
+ TargetInfo::from_rustc_target(t)
+ }
+ // Fetch target information from environment if not set, or if the
+ // target was the same as the TARGET environment variable, in
+ // case the user did `build.target(&env::var("TARGET").unwrap())`.
+ _ => self
+ .build_cache
+ .target_info_parser
+ .parse_from_cargo_environment_variables(),
+ }
+ }
+
+ fn get_raw_target(&self) -> Result<Cow<'_, str>, Error> {
+ match &self.target {
+ Some(t) => Ok(Cow::Borrowed(t)),
+ None => self.getenv_unwrap_str("TARGET").map(Cow::Owned),
+ }
+ }
+
+ fn get_is_cross_compile(&self) -> Result<bool, Error> {
+ let target = self.get_raw_target()?;
+ let host: Cow<'_, str> = match &self.host {
+ Some(h) => Cow::Borrowed(h),
+ None => Cow::Owned(self.getenv_unwrap_str("HOST")?),
+ };
+ Ok(host != target)
+ }
+
+ fn get_opt_level(&self) -> Result<Cow<'_, str>, Error> {
+ match &self.opt_level {
+ Some(ol) => Ok(Cow::Borrowed(ol)),
+ None => self.getenv_unwrap_str("OPT_LEVEL").map(Cow::Owned),
+ }
+ }
+
+ fn get_debug(&self) -> bool {
+ self.debug.unwrap_or_else(|| self.getenv_boolean("DEBUG"))
+ }
+
+ fn get_shell_escaped_flags(&self) -> bool {
+ self.shell_escaped_flags
+ .unwrap_or_else(|| self.getenv_boolean("CC_SHELL_ESCAPED_FLAGS"))
+ }
+
+ fn get_dwarf_version(&self) -> Option<u32> {
+ // Tentatively matches the DWARF version defaults as of rustc 1.62.
+ let target = self.get_target().ok()?;
+ if matches!(
+ target.os,
+ "android" | "dragonfly" | "freebsd" | "netbsd" | "openbsd"
+ ) || target.vendor == "apple"
+ || (target.os == "windows" && target.env == "gnu")
+ {
+ Some(2)
+ } else if target.os == "linux" {
+ Some(4)
+ } else {
+ None
+ }
+ }
+
+ fn get_force_frame_pointer(&self) -> bool {
+ self.force_frame_pointer.unwrap_or_else(|| self.get_debug())
+ }
+
+ fn get_out_dir(&self) -> Result<Cow<'_, Path>, Error> {
+ match &self.out_dir {
+ Some(p) => Ok(Cow::Borrowed(&**p)),
+ None => self
+ .getenv("OUT_DIR")
+ .as_deref()
+ .map(PathBuf::from)
+ .map(Cow::Owned)
+ .ok_or_else(|| {
+ Error::new(
+ ErrorKind::EnvVarNotFound,
+ "Environment variable OUT_DIR not defined.",
+ )
+ }),
+ }
+ }
+
+ #[allow(clippy::disallowed_methods)]
+ fn getenv(&self, v: &str) -> Option<Arc<OsStr>> {
+ // Returns true for environment variables cargo sets for build scripts:
+ // https://doc.rust-lang.org/cargo/reference/environment-variables.html#environment-variables-cargo-sets-for-build-scripts
+ //
+ // This handles more of the vars than we actually use (it tries to check
+ // complete-ish set), just to avoid needing maintenance if/when new
+ // calls to `getenv`/`getenv_unwrap` are added.
+ fn provided_by_cargo(envvar: &str) -> bool {
+ match envvar {
+ v if v.starts_with("CARGO") || v.starts_with("RUSTC") => true,
+ "HOST" | "TARGET" | "RUSTDOC" | "OUT_DIR" | "OPT_LEVEL" | "DEBUG" | "PROFILE"
+ | "NUM_JOBS" | "RUSTFLAGS" => true,
+ _ => false,
+ }
+ }
+ if let Some(val) = self.build_cache.env_cache.read().unwrap().get(v).cloned() {
+ return val;
+ }
+ // Excluding `PATH` prevents spurious rebuilds on Windows, see
+ // <https://github.com/rust-lang/cc-rs/pull/1215> for details.
+ if self.emit_rerun_if_env_changed && !provided_by_cargo(v) && v != "PATH" {
+ self.cargo_output
+ .print_metadata(&format_args!("cargo:rerun-if-env-changed={}", v));
+ }
+ let r = env::var_os(v).map(Arc::from);
+ self.cargo_output.print_metadata(&format_args!(
+ "{} = {}",
+ v,
+ OptionOsStrDisplay(r.as_deref())
+ ));
+ self.build_cache
+ .env_cache
+ .write()
+ .unwrap()
+ .insert(v.into(), r.clone());
+ r
+ }
+
+ /// get boolean flag that is either true or false
+ fn getenv_boolean(&self, v: &str) -> bool {
+ match self.getenv(v) {
+ Some(s) => &*s != "0" && &*s != "false" && !s.is_empty(),
+ None => false,
+ }
+ }
+
+ fn getenv_unwrap(&self, v: &str) -> Result<Arc<OsStr>, Error> {
+ match self.getenv(v) {
+ Some(s) => Ok(s),
+ None => Err(Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("Environment variable {} not defined.", v),
+ )),
+ }
+ }
+
+ fn getenv_unwrap_str(&self, v: &str) -> Result<String, Error> {
+ let env = self.getenv_unwrap(v)?;
+ env.to_str().map(String::from).ok_or_else(|| {
+ Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("Environment variable {} is not valid utf-8.", v),
+ )
+ })
+ }
+
+ /// The list of environment variables to check for a given env, in order of priority.
+ fn target_envs(&self, env: &str) -> Result<[String; 4], Error> {
+ let target = self.get_raw_target()?;
+ let kind = if self.get_is_cross_compile()? {
+ "TARGET"
+ } else {
+ "HOST"
+ };
+ let target_u = target.replace('-', "_");
+
+ Ok([
+ format!("{env}_{target}"),
+ format!("{env}_{target_u}"),
+ format!("{kind}_{env}"),
+ env.to_string(),
+ ])
+ }
+
+ /// Get a single-valued environment variable with target variants.
+ fn getenv_with_target_prefixes(&self, env: &str) -> Result<Arc<OsStr>, Error> {
+ // Take from first environment variable in the environment.
+ let res = self
+ .target_envs(env)?
+ .iter()
+ .filter_map(|env| self.getenv(env))
+ .next();
+
+ match res {
+ Some(res) => Ok(res),
+ None => Err(Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("could not find environment variable {env}"),
+ )),
+ }
+ }
+
+ /// Get values from CFLAGS-style environment variable.
+ fn envflags(&self, env: &str) -> Result<Option<Vec<String>>, Error> {
+ // Collect from all environment variables, in reverse order as in
+ // `getenv_with_target_prefixes` precedence (so that `CFLAGS_$TARGET`
+ // can override flags in `TARGET_CFLAGS`, which overrides those in
+ // `CFLAGS`).
+ let mut any_set = false;
+ let mut res = vec![];
+ for env in self.target_envs(env)?.iter().rev() {
+ if let Some(var) = self.getenv(env) {
+ any_set = true;
+
+ let var = var.to_string_lossy();
+ if self.get_shell_escaped_flags() {
+ res.extend(Shlex::new(&var));
+ } else {
+ res.extend(var.split_ascii_whitespace().map(ToString::to_string));
+ }
+ }
+ }
+
+ Ok(if any_set { Some(res) } else { None })
+ }
+
+ fn fix_env_for_apple_os(&self, cmd: &mut Command) -> Result<(), Error> {
+ let target = self.get_target()?;
+ if cfg!(target_os = "macos") && target.os == "macos" {
+ // Additionally, `IPHONEOS_DEPLOYMENT_TARGET` must not be set when using the Xcode linker at
+ // "/Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/ld",
+ // although this is apparently ignored when using the linker at "/usr/bin/ld".
+ cmd.env_remove("IPHONEOS_DEPLOYMENT_TARGET");
+ }
+ Ok(())
+ }
+
+ fn apple_sdk_root_inner(&self, sdk: &str) -> Result<Arc<OsStr>, Error> {
+ // Code copied from rustc's compiler/rustc_codegen_ssa/src/back/link.rs.
+ if let Some(sdkroot) = self.getenv("SDKROOT") {
+ let p = Path::new(&sdkroot);
+ let does_sdkroot_contain = |strings: &[&str]| {
+ let sdkroot_str = p.to_string_lossy();
+ strings.iter().any(|s| sdkroot_str.contains(s))
+ };
+ match sdk {
+ // Ignore `SDKROOT` if it's clearly set for the wrong platform.
+ "appletvos"
+ if does_sdkroot_contain(&["TVSimulator.platform", "MacOSX.platform"]) => {}
+ "appletvsimulator"
+ if does_sdkroot_contain(&["TVOS.platform", "MacOSX.platform"]) => {}
+ "iphoneos"
+ if does_sdkroot_contain(&["iPhoneSimulator.platform", "MacOSX.platform"]) => {}
+ "iphonesimulator"
+ if does_sdkroot_contain(&["iPhoneOS.platform", "MacOSX.platform"]) => {}
+ "macosx10.15"
+ if does_sdkroot_contain(&["iPhoneOS.platform", "iPhoneSimulator.platform"]) => {
+ }
+ "watchos"
+ if does_sdkroot_contain(&["WatchSimulator.platform", "MacOSX.platform"]) => {}
+ "watchsimulator"
+ if does_sdkroot_contain(&["WatchOS.platform", "MacOSX.platform"]) => {}
+ "xros" if does_sdkroot_contain(&["XRSimulator.platform", "MacOSX.platform"]) => {}
+ "xrsimulator" if does_sdkroot_contain(&["XROS.platform", "MacOSX.platform"]) => {}
+ // Ignore `SDKROOT` if it's not a valid path.
+ _ if !p.is_absolute() || p == Path::new("/") || !p.exists() => {}
+ _ => return Ok(sdkroot),
+ }
+ }
+
+ let sdk_path = run_output(
+ self.cmd("xcrun")
+ .arg("--show-sdk-path")
+ .arg("--sdk")
+ .arg(sdk),
+ &self.cargo_output,
+ )?;
+
+ let sdk_path = match String::from_utf8(sdk_path) {
+ Ok(p) => p,
+ Err(_) => {
+ return Err(Error::new(
+ ErrorKind::IOError,
+ "Unable to determine Apple SDK path.",
+ ));
+ }
+ };
+ Ok(Arc::from(OsStr::new(sdk_path.trim())))
+ }
+
+ fn apple_sdk_root(&self, target: &TargetInfo<'_>) -> Result<Arc<OsStr>, Error> {
+ let sdk = target.apple_sdk_name();
+
+ if let Some(ret) = self
+ .build_cache
+ .apple_sdk_root_cache
+ .read()
+ .expect("apple_sdk_root_cache lock failed")
+ .get(sdk)
+ .cloned()
+ {
+ return Ok(ret);
+ }
+ let sdk_path = self.apple_sdk_root_inner(sdk)?;
+ self.build_cache
+ .apple_sdk_root_cache
+ .write()
+ .expect("apple_sdk_root_cache lock failed")
+ .insert(sdk.into(), sdk_path.clone());
+ Ok(sdk_path)
+ }
+
+ fn apple_deployment_target(&self, target: &TargetInfo<'_>) -> Arc<str> {
+ let sdk = target.apple_sdk_name();
+ if let Some(ret) = self
+ .build_cache
+ .apple_versions_cache
+ .read()
+ .expect("apple_versions_cache lock failed")
+ .get(sdk)
+ .cloned()
+ {
+ return ret;
+ }
+
+ let default_deployment_from_sdk = || -> Option<Arc<str>> {
+ let version = run_output(
+ self.cmd("xcrun")
+ .arg("--show-sdk-version")
+ .arg("--sdk")
+ .arg(sdk),
+ &self.cargo_output,
+ )
+ .ok()?;
+
+ Some(Arc::from(std::str::from_utf8(&version).ok()?.trim()))
+ };
+
+ let deployment_from_env = |name: &str| -> Option<Arc<str>> {
+ // note that self.env isn't hit in production codepaths, its mostly just for tests which don't
+ // set the real env
+ self.env
+ .iter()
+ .find(|(k, _)| &**k == OsStr::new(name))
+ .map(|(_, v)| v)
+ .cloned()
+ .or_else(|| self.getenv(name))?
+ .to_str()
+ .map(Arc::from)
+ };
+
+ // Determines if the acquired deployment target is too low to support modern C++ on some Apple platform.
+ //
+ // A long time ago they used libstdc++, but since macOS 10.9 and iOS 7 libc++ has been the library the SDKs provide to link against.
+ // If a `cc`` config wants to use C++, we round up to these versions as the baseline.
+ let maybe_cpp_version_baseline = |deployment_target_ver: Arc<str>| -> Option<Arc<str>> {
+ if !self.cpp {
+ return Some(deployment_target_ver);
+ }
+
+ let mut deployment_target = deployment_target_ver
+ .split('.')
+ .map(|v| v.parse::<u32>().expect("integer version"));
+
+ match target.os {
+ "macos" => {
+ let major = deployment_target.next().unwrap_or(0);
+ let minor = deployment_target.next().unwrap_or(0);
+
+ // If below 10.9, we ignore it and let the SDK's target definitions handle it.
+ if major == 10 && minor < 9 {
+ self.cargo_output.print_warning(&format_args!(
+ "macOS deployment target ({}) too low, it will be increased",
+ deployment_target_ver
+ ));
+ return None;
+ }
+ }
+ "ios" => {
+ let major = deployment_target.next().unwrap_or(0);
+
+ // If below 10.7, we ignore it and let the SDK's target definitions handle it.
+ if major < 7 {
+ self.cargo_output.print_warning(&format_args!(
+ "iOS deployment target ({}) too low, it will be increased",
+ deployment_target_ver
+ ));
+ return None;
+ }
+ }
+ // watchOS, tvOS, visionOS, and others are all new enough that libc++ is their baseline.
+ _ => {}
+ }
+
+ // If the deployment target met or exceeded the C++ baseline
+ Some(deployment_target_ver)
+ };
+
+ // The hardcoded minimums here are subject to change in a future compiler release,
+ // and only exist as last resort fallbacks. Don't consider them stable.
+ // `cc` doesn't use rustc's `--print deployment-target`` because the compiler's defaults
+ // don't align well with Apple's SDKs and other third-party libraries that require ~generally~ higher
+ // deployment targets. rustc isn't interested in those by default though so its fine to be different here.
+ //
+ // If no explicit target is passed, `cc` defaults to the current Xcode SDK's `DefaultDeploymentTarget` for better
+ // compatibility. This is also the crate's historical behavior and what has become a relied-on value.
+ //
+ // The ordering of env -> XCode SDK -> old rustc defaults is intentional for performance when using
+ // an explicit target.
+ let version: Arc<str> = match target.os {
+ "macos" => deployment_from_env("MACOSX_DEPLOYMENT_TARGET")
+ .and_then(maybe_cpp_version_baseline)
+ .or_else(default_deployment_from_sdk)
+ .unwrap_or_else(|| {
+ if target.arch == "aarch64" {
+ "11.0".into()
+ } else {
+ let default: Arc<str> = Arc::from("10.7");
+ maybe_cpp_version_baseline(default.clone()).unwrap_or(default)
+ }
+ }),
+
+ "ios" => deployment_from_env("IPHONEOS_DEPLOYMENT_TARGET")
+ .and_then(maybe_cpp_version_baseline)
+ .or_else(default_deployment_from_sdk)
+ .unwrap_or_else(|| "7.0".into()),
+
+ "watchos" => deployment_from_env("WATCHOS_DEPLOYMENT_TARGET")
+ .or_else(default_deployment_from_sdk)
+ .unwrap_or_else(|| "5.0".into()),
+
+ "tvos" => deployment_from_env("TVOS_DEPLOYMENT_TARGET")
+ .or_else(default_deployment_from_sdk)
+ .unwrap_or_else(|| "9.0".into()),
+
+ "visionos" => deployment_from_env("XROS_DEPLOYMENT_TARGET")
+ .or_else(default_deployment_from_sdk)
+ .unwrap_or_else(|| "1.0".into()),
+
+ os => unreachable!("unknown Apple OS: {}", os),
+ };
+
+ self.build_cache
+ .apple_versions_cache
+ .write()
+ .expect("apple_versions_cache lock failed")
+ .insert(sdk.into(), version.clone());
+
+ version
+ }
+
+ fn wasm_musl_sysroot(&self) -> Result<Arc<OsStr>, Error> {
+ if let Some(musl_sysroot_path) = self.getenv("WASM_MUSL_SYSROOT") {
+ Ok(musl_sysroot_path)
+ } else {
+ Err(Error::new(
+ ErrorKind::EnvVarNotFound,
+ "Environment variable WASM_MUSL_SYSROOT not defined for wasm32. Download sysroot from GitHub & setup environment variable MUSL_SYSROOT targeting the folder.",
+ ))
+ }
+ }
+
+ fn wasi_sysroot(&self) -> Result<Arc<OsStr>, Error> {
+ if let Some(wasi_sysroot_path) = self.getenv("WASI_SYSROOT") {
+ Ok(wasi_sysroot_path)
+ } else {
+ Err(Error::new(
+ ErrorKind::EnvVarNotFound,
+ "Environment variable WASI_SYSROOT not defined. Download sysroot from GitHub & setup environment variable WASI_SYSROOT targeting the folder.",
+ ))
+ }
+ }
+
+ fn cuda_file_count(&self) -> usize {
+ self.files
+ .iter()
+ .filter(|file| file.extension() == Some(OsStr::new("cu")))
+ .count()
+ }
+
+ fn which(&self, tool: &Path, path_entries: Option<&OsStr>) -> Option<PathBuf> {
+ fn check_exe(mut exe: PathBuf) -> Option<PathBuf> {
+ let exe_ext = std::env::consts::EXE_EXTENSION;
+ let check =
+ exe.exists() || (!exe_ext.is_empty() && exe.set_extension(exe_ext) && exe.exists());
+ check.then_some(exe)
+ }
+
+ // Loop through PATH entries searching for the |tool|.
+ let find_exe_in_path = |path_entries: &OsStr| -> Option<PathBuf> {
+ env::split_paths(path_entries).find_map(|path_entry| check_exe(path_entry.join(tool)))
+ };
+
+ // If |tool| is not just one "word," assume it's an actual path...
+ if tool.components().count() > 1 {
+ check_exe(PathBuf::from(tool))
+ } else {
+ path_entries
+ .and_then(find_exe_in_path)
+ .or_else(|| find_exe_in_path(&self.getenv("PATH")?))
+ }
+ }
+
+ /// search for |prog| on 'programs' path in '|cc| -print-search-dirs' output
+ fn search_programs(
+ &self,
+ cc: &mut Command,
+ prog: &Path,
+ cargo_output: &CargoOutput,
+ ) -> Option<PathBuf> {
+ let search_dirs = run_output(
+ cc.arg("-print-search-dirs"),
+ // this doesn't concern the compilation so we always want to show warnings.
+ cargo_output,
+ )
+ .ok()?;
+ // clang driver appears to be forcing UTF-8 output even on Windows,
+ // hence from_utf8 is assumed to be usable in all cases.
+ let search_dirs = std::str::from_utf8(&search_dirs).ok()?;
+ for dirs in search_dirs.split(['\r', '\n']) {
+ if let Some(path) = dirs.strip_prefix("programs: =") {
+ return self.which(prog, Some(OsStr::new(path)));
+ }
+ }
+ None
+ }
+
+ fn windows_registry_find(&self, target: &TargetInfo<'_>, tool: &str) -> Option<Command> {
+ self.windows_registry_find_tool(target, tool)
+ .map(|c| c.to_command())
+ }
+
+ fn windows_registry_find_tool(&self, target: &TargetInfo<'_>, tool: &str) -> Option<Tool> {
+ struct BuildEnvGetter<'s>(&'s Build);
+
+ impl windows_registry::EnvGetter for BuildEnvGetter<'_> {
+ fn get_env(&self, name: &str) -> Option<windows_registry::Env> {
+ self.0.getenv(name).map(windows_registry::Env::Arced)
+ }
+ }
+
+ if target.env != "msvc" {
+ return None;
+ }
+
+ windows_registry::find_tool_inner(target.full_arch, tool, &BuildEnvGetter(self))
+ }
+}
+
+impl Default for Build {
+ fn default() -> Build {
+ Build::new()
+ }
+}
+
+fn fail(s: &str) -> ! {
+ eprintln!("\n\nerror occurred in cc-rs: {}\n\n", s);
+ std::process::exit(1);
+}
+
+// Use by default minimum available API level
+// See note about naming here
+// https://android.googlesource.com/platform/ndk/+/refs/heads/ndk-release-r21/docs/BuildSystemMaintainers.md#Clang
+static NEW_STANDALONE_ANDROID_COMPILERS: [&str; 4] = [
+ "aarch64-linux-android21-clang",
+ "armv7a-linux-androideabi16-clang",
+ "i686-linux-android16-clang",
+ "x86_64-linux-android21-clang",
+];
+
+// New "standalone" C/C++ cross-compiler executables from recent Android NDK
+// are just shell scripts that call main clang binary (from Android NDK) with
+// proper `--target` argument.
+//
+// For example, armv7a-linux-androideabi16-clang passes
+// `--target=armv7a-linux-androideabi16` to clang.
+// So to construct proper command line check if
+// `--target` argument would be passed or not to clang
+fn android_clang_compiler_uses_target_arg_internally(clang_path: &Path) -> bool {
+ if let Some(filename) = clang_path.file_name() {
+ if let Some(filename_str) = filename.to_str() {
+ if let Some(idx) = filename_str.rfind('-') {
+ return filename_str.split_at(idx).0.contains("android");
+ }
+ }
+ }
+ false
+}
+
+// FIXME: Use parsed target.
+fn autodetect_android_compiler(raw_target: &str, gnu: &str, clang: &str) -> String {
+ let new_clang_key = match raw_target {
+ "aarch64-linux-android" => Some("aarch64"),
+ "armv7-linux-androideabi" => Some("armv7a"),
+ "i686-linux-android" => Some("i686"),
+ "x86_64-linux-android" => Some("x86_64"),
+ _ => None,
+ };
+
+ let new_clang = new_clang_key
+ .map(|key| {
+ NEW_STANDALONE_ANDROID_COMPILERS
+ .iter()
+ .find(|x| x.starts_with(key))
+ })
+ .unwrap_or(None);
+
+ if let Some(new_clang) = new_clang {
+ if Command::new(new_clang).output().is_ok() {
+ return (*new_clang).into();
+ }
+ }
+
+ let target = raw_target
+ .replace("armv7neon", "arm")
+ .replace("armv7", "arm")
+ .replace("thumbv7neon", "arm")
+ .replace("thumbv7", "arm");
+ let gnu_compiler = format!("{}-{}", target, gnu);
+ let clang_compiler = format!("{}-{}", target, clang);
+
+ // On Windows, the Android clang compiler is provided as a `.cmd` file instead
+ // of a `.exe` file. `std::process::Command` won't run `.cmd` files unless the
+ // `.cmd` is explicitly appended to the command name, so we do that here.
+ let clang_compiler_cmd = format!("{}-{}.cmd", target, clang);
+
+ // Check if gnu compiler is present
+ // if not, use clang
+ if Command::new(&gnu_compiler).output().is_ok() {
+ gnu_compiler
+ } else if cfg!(windows) && Command::new(&clang_compiler_cmd).output().is_ok() {
+ clang_compiler_cmd
+ } else {
+ clang_compiler
+ }
+}
+
+// Rust and clang/cc don't agree on how to name the target.
+fn map_darwin_target_from_rust_to_compiler_architecture<'a>(target: &TargetInfo<'a>) -> &'a str {
+ match target.full_arch {
+ "aarch64" => "arm64",
+ "arm64_32" => "arm64_32",
+ "arm64e" => "arm64e",
+ "armv7k" => "armv7k",
+ "armv7s" => "armv7s",
+ "i386" => "i386",
+ "i686" => "i386",
+ "powerpc" => "ppc",
+ "powerpc64" => "ppc64",
+ "x86_64" => "x86_64",
+ "x86_64h" => "x86_64h",
+ arch => arch,
+ }
+}
+
+#[derive(Clone, Copy, PartialEq)]
+enum AsmFileExt {
+ /// `.asm` files. On MSVC targets, we assume these should be passed to MASM
+ /// (`ml{,64}.exe`).
+ DotAsm,
+ /// `.s` or `.S` files, which do not have the special handling on MSVC targets.
+ DotS,
+}
+
+impl AsmFileExt {
+ fn from_path(file: &Path) -> Option<Self> {
+ if let Some(ext) = file.extension() {
+ if let Some(ext) = ext.to_str() {
+ let ext = ext.to_lowercase();
+ match &*ext {
+ "asm" => return Some(AsmFileExt::DotAsm),
+ "s" => return Some(AsmFileExt::DotS),
+ _ => return None,
+ }
+ }
+ }
+ None
+ }
+}
+
+/// Returns true if `cc` has been disabled by `CC_FORCE_DISABLE`.
+fn is_disabled() -> bool {
+ static CACHE: AtomicU8 = AtomicU8::new(0);
+
+ let val = CACHE.load(Relaxed);
+ // We manually cache the environment var, since we need it in some places
+ // where we don't have access to a `Build` instance.
+ #[allow(clippy::disallowed_methods)]
+ fn compute_is_disabled() -> bool {
+ match std::env::var_os("CC_FORCE_DISABLE") {
+ // Not set? Not disabled.
+ None => false,
+ // Respect `CC_FORCE_DISABLE=0` and some simple synonyms, otherwise
+ // we're disabled. This intentionally includes `CC_FORCE_DISABLE=""`
+ Some(v) => &*v != "0" && &*v != "false" && &*v != "no",
+ }
+ }
+ match val {
+ 2 => true,
+ 1 => false,
+ 0 => {
+ let truth = compute_is_disabled();
+ let encoded_truth = if truth { 2u8 } else { 1 };
+ // Might race against another thread, but we'd both be setting the
+ // same value so it should be fine.
+ CACHE.store(encoded_truth, Relaxed);
+ truth
+ }
+ _ => unreachable!(),
+ }
+}
+
+/// Automates the `if is_disabled() { return error }` check and ensures
+/// we produce a consistent error message for it.
+fn check_disabled() -> Result<(), Error> {
+ if is_disabled() {
+ return Err(Error::new(
+ ErrorKind::Disabled,
+ "the `cc` crate's functionality has been disabled by the `CC_FORCE_DISABLE` environment variable."
+ ));
+ }
+ Ok(())
+}
+
+#[cfg(test)]
+mod tests {
+ use super::*;
+
+ #[test]
+ fn test_android_clang_compiler_uses_target_arg_internally() {
+ for version in 16..21 {
+ assert!(android_clang_compiler_uses_target_arg_internally(
+ &PathBuf::from(format!("armv7a-linux-androideabi{}-clang", version))
+ ));
+ assert!(android_clang_compiler_uses_target_arg_internally(
+ &PathBuf::from(format!("armv7a-linux-androideabi{}-clang++", version))
+ ));
+ }
+ assert!(!android_clang_compiler_uses_target_arg_internally(
+ &PathBuf::from("clang-i686-linux-android")
+ ));
+ assert!(!android_clang_compiler_uses_target_arg_internally(
+ &PathBuf::from("clang")
+ ));
+ assert!(!android_clang_compiler_uses_target_arg_internally(
+ &PathBuf::from("clang++")
+ ));
+ }
+}
diff --git a/vendor/cc/src/parallel/async_executor.rs b/vendor/cc/src/parallel/async_executor.rs
new file mode 100644
index 00000000..9ebd1ad5
--- /dev/null
+++ b/vendor/cc/src/parallel/async_executor.rs
@@ -0,0 +1,118 @@
+use std::{
+ cell::Cell,
+ future::Future,
+ pin::Pin,
+ ptr,
+ task::{Context, Poll, RawWaker, RawWakerVTable, Waker},
+ thread,
+ time::Duration,
+};
+
+use crate::Error;
+
+const NOOP_WAKER_VTABLE: RawWakerVTable = RawWakerVTable::new(
+ // Cloning just returns a new no-op raw waker
+ |_| NOOP_RAW_WAKER,
+ // `wake` does nothing
+ |_| {},
+ // `wake_by_ref` does nothing
+ |_| {},
+ // Dropping does nothing as we don't allocate anything
+ |_| {},
+);
+const NOOP_RAW_WAKER: RawWaker = RawWaker::new(ptr::null(), &NOOP_WAKER_VTABLE);
+
+#[derive(Default)]
+pub(crate) struct YieldOnce(bool);
+
+impl Future for YieldOnce {
+ type Output = ();
+
+ fn poll(self: Pin<&mut Self>, _cx: &mut Context<'_>) -> Poll<()> {
+ let flag = &mut std::pin::Pin::into_inner(self).0;
+ if !*flag {
+ *flag = true;
+ Poll::Pending
+ } else {
+ Poll::Ready(())
+ }
+ }
+}
+
+/// Execute the futures and return when they are all done.
+///
+/// Here we use our own homebrew async executor since cc is used in the build
+/// script of many popular projects, pulling in additional dependencies would
+/// significantly slow down its compilation.
+pub(crate) fn block_on<Fut1, Fut2>(
+ mut fut1: Fut1,
+ mut fut2: Fut2,
+ has_made_progress: &Cell<bool>,
+) -> Result<(), Error>
+where
+ Fut1: Future<Output = Result<(), Error>>,
+ Fut2: Future<Output = Result<(), Error>>,
+{
+ // Shadows the future so that it can never be moved and is guaranteed
+ // to be pinned.
+ //
+ // The same trick used in `pin!` macro.
+ //
+ // TODO: Once MSRV is bumped to 1.68, replace this with `std::pin::pin!`
+ let mut fut1 = Some(unsafe { Pin::new_unchecked(&mut fut1) });
+ let mut fut2 = Some(unsafe { Pin::new_unchecked(&mut fut2) });
+
+ // TODO: Once `Waker::noop` stablised and our MSRV is bumped to the version
+ // which it is stablised, replace this with `Waker::noop`.
+ let waker = unsafe { Waker::from_raw(NOOP_RAW_WAKER) };
+ let mut context = Context::from_waker(&waker);
+
+ let mut backoff_cnt = 0;
+
+ loop {
+ has_made_progress.set(false);
+
+ if let Some(fut) = fut2.as_mut() {
+ if let Poll::Ready(res) = fut.as_mut().poll(&mut context) {
+ fut2 = None;
+ res?;
+ }
+ }
+
+ if let Some(fut) = fut1.as_mut() {
+ if let Poll::Ready(res) = fut.as_mut().poll(&mut context) {
+ fut1 = None;
+ res?;
+ }
+ }
+
+ if fut1.is_none() && fut2.is_none() {
+ return Ok(());
+ }
+
+ if !has_made_progress.get() {
+ if backoff_cnt > 3 {
+ // We have yielded at least three times without making'
+ // any progress, so we will sleep for a while.
+ let duration = Duration::from_millis(100 * (backoff_cnt - 3).min(10));
+ thread::sleep(duration);
+ } else {
+ // Given that we spawned a lot of compilation tasks, it is unlikely
+ // that OS cannot find other ready task to execute.
+ //
+ // If all of them are done, then we will yield them and spawn more,
+ // or simply return.
+ //
+ // Thus this will not be turned into a busy-wait loop and it will not
+ // waste CPU resource.
+ thread::yield_now();
+ }
+ }
+
+ backoff_cnt = if has_made_progress.get() {
+ 0
+ } else {
+ backoff_cnt + 1
+ };
+ }
+}
diff --git a/vendor/cc/src/parallel/job_token.rs b/vendor/cc/src/parallel/job_token.rs
new file mode 100644
index 00000000..c07fd94b
--- /dev/null
+++ b/vendor/cc/src/parallel/job_token.rs
@@ -0,0 +1,266 @@
+use std::marker::PhantomData;
+
+use crate::{utilities::OnceLock, Error};
+
+pub(crate) struct JobToken(PhantomData<()>);
+
+impl JobToken {
+ fn new() -> Self {
+ Self(PhantomData)
+ }
+}
+
+impl Drop for JobToken {
+ fn drop(&mut self) {
+ match JobTokenServer::new() {
+ JobTokenServer::Inherited(jobserver) => jobserver.release_token_raw(),
+ JobTokenServer::InProcess(jobserver) => jobserver.release_token_raw(),
+ }
+ }
+}
+
+enum JobTokenServer {
+ Inherited(inherited_jobserver::JobServer),
+ InProcess(inprocess_jobserver::JobServer),
+}
+
+impl JobTokenServer {
+ /// This function returns a static reference to the jobserver because
+ /// - creating a jobserver from env is a bit fd-unsafe (e.g. the fd might
+ /// be closed by other jobserver users in the process) and better do it
+ /// at the start of the program.
+ /// - in case a jobserver cannot be created from env (e.g. it's not
+ /// present), we will create a global in-process only jobserver
+ /// that has to be static so that it will be shared by all cc
+ /// compilation.
+ fn new() -> &'static Self {
+ // TODO: Replace with a OnceLock once MSRV is 1.70
+ static JOBSERVER: OnceLock<JobTokenServer> = OnceLock::new();
+
+ JOBSERVER.get_or_init(|| {
+ unsafe { inherited_jobserver::JobServer::from_env() }
+ .map(Self::Inherited)
+ .unwrap_or_else(|| Self::InProcess(inprocess_jobserver::JobServer::new()))
+ })
+ }
+}
+
+pub(crate) enum ActiveJobTokenServer {
+ Inherited(inherited_jobserver::ActiveJobServer<'static>),
+ InProcess(&'static inprocess_jobserver::JobServer),
+}
+
+impl ActiveJobTokenServer {
+ pub(crate) fn new() -> Self {
+ match JobTokenServer::new() {
+ JobTokenServer::Inherited(inherited_jobserver) => {
+ Self::Inherited(inherited_jobserver.enter_active())
+ }
+ JobTokenServer::InProcess(inprocess_jobserver) => Self::InProcess(inprocess_jobserver),
+ }
+ }
+
+ pub(crate) async fn acquire(&mut self) -> Result<JobToken, Error> {
+ match self {
+ Self::Inherited(jobserver) => jobserver.acquire().await,
+ Self::InProcess(jobserver) => Ok(jobserver.acquire().await),
+ }
+ }
+}
+
+mod inherited_jobserver {
+ use super::JobToken;
+
+ use crate::{parallel::async_executor::YieldOnce, Error, ErrorKind};
+
+ use std::{
+ io, mem,
+ sync::{mpsc, Mutex, MutexGuard, PoisonError},
+ };
+
+ pub(super) struct JobServer {
+ /// Implicit token for this process which is obtained and will be
+ /// released in parent. Since `JobTokens` only give back what they got,
+ /// there should be at most one global implicit token in the wild.
+ ///
+ /// Since Rust does not execute any `Drop` for global variables,
+ /// we can't just put it back to jobserver and then re-acquire it at
+ /// the end of the process.
+ ///
+ /// Use `Mutex` to avoid race between acquire and release.
+ /// If an `AtomicBool` is used, then it's possible for:
+ /// - `release_token_raw`: Tries to set `global_implicit_token` to true, but it is already
+ /// set to `true`, continue to release it to jobserver
+ /// - `acquire` takes the global implicit token, set `global_implicit_token` to false
+ /// - `release_token_raw` now writes the token back into the jobserver, while
+ /// `global_implicit_token` is `false`
+ ///
+ /// If the program exits here, then cc effectively increases parallelism by one, which is
+ /// incorrect, hence we use a `Mutex` here.
+ global_implicit_token: Mutex<bool>,
+ inner: jobserver::Client,
+ }
+
+ impl JobServer {
+ pub(super) unsafe fn from_env() -> Option<Self> {
+ jobserver::Client::from_env().map(|inner| Self {
+ inner,
+ global_implicit_token: Mutex::new(true),
+ })
+ }
+
+ fn get_global_implicit_token(&self) -> MutexGuard<'_, bool> {
+ self.global_implicit_token
+ .lock()
+ .unwrap_or_else(PoisonError::into_inner)
+ }
+
+ /// All tokens except for the global implicit token will be put back into the jobserver
+ /// immediately and they cannot be cached, since Rust does not call `Drop::drop` on
+ /// global variables.
+ pub(super) fn release_token_raw(&self) {
+ let mut global_implicit_token = self.get_global_implicit_token();
+
+ if *global_implicit_token {
+ // There's already a global implicit token, so this token must
+ // be released back into jobserver.
+ //
+ // `release_raw` should not block
+ let _ = self.inner.release_raw();
+ } else {
+ *global_implicit_token = true;
+ }
+ }
+
+ pub(super) fn enter_active(&self) -> ActiveJobServer<'_> {
+ ActiveJobServer {
+ jobserver: self,
+ helper_thread: None,
+ }
+ }
+ }
+
+ struct HelperThread {
+ inner: jobserver::HelperThread,
+ /// When rx is dropped, all the token stored within it will be dropped.
+ rx: mpsc::Receiver<io::Result<jobserver::Acquired>>,
+ }
+
+ impl HelperThread {
+ fn new(jobserver: &JobServer) -> Result<Self, Error> {
+ let (tx, rx) = mpsc::channel();
+
+ Ok(Self {
+ rx,
+ inner: jobserver.inner.clone().into_helper_thread(move |res| {
+ let _ = tx.send(res);
+ })?,
+ })
+ }
+ }
+
+ pub(crate) struct ActiveJobServer<'a> {
+ jobserver: &'a JobServer,
+ helper_thread: Option<HelperThread>,
+ }
+
+ impl ActiveJobServer<'_> {
+ pub(super) async fn acquire(&mut self) -> Result<JobToken, Error> {
+ let mut has_requested_token = false;
+
+ loop {
+ // Fast path
+ if mem::replace(&mut *self.jobserver.get_global_implicit_token(), false) {
+ break Ok(JobToken::new());
+ }
+
+ match self.jobserver.inner.try_acquire() {
+ Ok(Some(acquired)) => {
+ acquired.drop_without_releasing();
+ break Ok(JobToken::new());
+ }
+ Ok(None) => YieldOnce::default().await,
+ Err(err) if err.kind() == io::ErrorKind::Unsupported => {
+ // Fallback to creating a help thread with blocking acquire
+ let helper_thread = if let Some(thread) = self.helper_thread.as_ref() {
+ thread
+ } else {
+ self.helper_thread
+ .insert(HelperThread::new(self.jobserver)?)
+ };
+
+ match helper_thread.rx.try_recv() {
+ Ok(res) => {
+ let acquired = res?;
+ acquired.drop_without_releasing();
+ break Ok(JobToken::new());
+ }
+ Err(mpsc::TryRecvError::Disconnected) => break Err(Error::new(
+ ErrorKind::JobserverHelpThreadError,
+ "jobserver help thread has returned before ActiveJobServer is dropped",
+ )),
+ Err(mpsc::TryRecvError::Empty) => {
+ if !has_requested_token {
+ helper_thread.inner.request_token();
+ has_requested_token = true;
+ }
+ YieldOnce::default().await
+ }
+ }
+ }
+ Err(err) => break Err(err.into()),
+ }
+ }
+ }
+ }
+}
+
+mod inprocess_jobserver {
+ use super::JobToken;
+
+ use crate::parallel::async_executor::YieldOnce;
+
+ use std::{
+ env::var,
+ sync::atomic::{
+ AtomicU32,
+ Ordering::{AcqRel, Acquire},
+ },
+ };
+
+ pub(crate) struct JobServer(AtomicU32);
+
+ impl JobServer {
+ pub(super) fn new() -> Self {
+ // Use `NUM_JOBS` if set (it's configured by Cargo) and otherwise
+ // just fall back to the number of cores on the local machine, or a reasonable
+ // default if that cannot be determined.
+
+ let parallelism = var("NUM_JOBS")
+ .ok()
+ .and_then(|j| j.parse::<u32>().ok())
+ .or_else(|| Some(std::thread::available_parallelism().ok()?.get() as u32))
+ .unwrap_or(4);
+
+ Self(AtomicU32::new(parallelism))
+ }
+
+ pub(super) async fn acquire(&self) -> JobToken {
+ loop {
+ let res = self
+ .0
+ .fetch_update(AcqRel, Acquire, |tokens| tokens.checked_sub(1));
+
+ if res.is_ok() {
+ break JobToken::new();
+ }
+
+ YieldOnce::default().await
+ }
+ }
+
+ pub(super) fn release_token_raw(&self) {
+ self.0.fetch_add(1, AcqRel);
+ }
+ }
+}
diff --git a/vendor/cc/src/parallel/mod.rs b/vendor/cc/src/parallel/mod.rs
new file mode 100644
index 00000000..019eae10
--- /dev/null
+++ b/vendor/cc/src/parallel/mod.rs
@@ -0,0 +1,3 @@
+pub(crate) mod async_executor;
+pub(crate) mod job_token;
+pub(crate) mod stderr;
diff --git a/vendor/cc/src/parallel/stderr.rs b/vendor/cc/src/parallel/stderr.rs
new file mode 100644
index 00000000..2e5b0544
--- /dev/null
+++ b/vendor/cc/src/parallel/stderr.rs
@@ -0,0 +1,91 @@
+#![cfg_attr(target_family = "wasm", allow(unused))]
+/// Helpers functions for [`ChildStderr`].
+use std::{convert::TryInto, process::ChildStderr};
+
+use crate::{Error, ErrorKind};
+
+#[cfg(all(not(unix), not(windows), not(target_family = "wasm")))]
+compile_error!("Only unix and windows support non-blocking pipes! For other OSes, disable the parallel feature.");
+
+#[cfg(unix)]
+fn get_flags(fd: std::os::unix::io::RawFd) -> Result<i32, Error> {
+ let flags = unsafe { libc::fcntl(fd, libc::F_GETFL, 0) };
+ if flags == -1 {
+ Err(Error::new(
+ ErrorKind::IOError,
+ format!(
+ "Failed to get flags for pipe {}: {}",
+ fd,
+ std::io::Error::last_os_error()
+ ),
+ ))
+ } else {
+ Ok(flags)
+ }
+}
+
+#[cfg(unix)]
+fn set_flags(fd: std::os::unix::io::RawFd, flags: std::os::raw::c_int) -> Result<(), Error> {
+ if unsafe { libc::fcntl(fd, libc::F_SETFL, flags) } == -1 {
+ Err(Error::new(
+ ErrorKind::IOError,
+ format!(
+ "Failed to set flags for pipe {}: {}",
+ fd,
+ std::io::Error::last_os_error()
+ ),
+ ))
+ } else {
+ Ok(())
+ }
+}
+
+#[cfg(unix)]
+pub fn set_non_blocking(pipe: &impl std::os::unix::io::AsRawFd) -> Result<(), Error> {
+ // On Unix, switch the pipe to non-blocking mode.
+ // On Windows, we have a different way to be non-blocking.
+ let fd = pipe.as_raw_fd();
+
+ let flags = get_flags(fd)?;
+ set_flags(fd, flags | libc::O_NONBLOCK)
+}
+
+pub fn bytes_available(stderr: &mut ChildStderr) -> Result<usize, Error> {
+ let mut bytes_available = 0;
+ #[cfg(windows)]
+ {
+ use crate::windows::windows_sys::PeekNamedPipe;
+ use std::os::windows::io::AsRawHandle;
+ use std::ptr::null_mut;
+ if unsafe {
+ PeekNamedPipe(
+ stderr.as_raw_handle(),
+ null_mut(),
+ 0,
+ null_mut(),
+ &mut bytes_available,
+ null_mut(),
+ )
+ } == 0
+ {
+ return Err(Error::new(
+ ErrorKind::IOError,
+ format!(
+ "PeekNamedPipe failed with {}",
+ std::io::Error::last_os_error()
+ ),
+ ));
+ }
+ }
+ #[cfg(unix)]
+ {
+ use std::os::unix::io::AsRawFd;
+ if unsafe { libc::ioctl(stderr.as_raw_fd(), libc::FIONREAD, &mut bytes_available) } != 0 {
+ return Err(Error::new(
+ ErrorKind::IOError,
+ format!("ioctl failed with {}", std::io::Error::last_os_error()),
+ ));
+ }
+ }
+ Ok(bytes_available.try_into().unwrap())
+}
diff --git a/vendor/cc/src/target.rs b/vendor/cc/src/target.rs
new file mode 100644
index 00000000..ed432df5
--- /dev/null
+++ b/vendor/cc/src/target.rs
@@ -0,0 +1,41 @@
+//! Parsing of `rustc` target names to match the values exposed to Cargo
+//! build scripts (`CARGO_CFG_*`).
+
+mod apple;
+mod generated;
+mod llvm;
+mod parser;
+
+pub(crate) use parser::TargetInfoParser;
+
+/// Information specific to a `rustc` target.
+///
+/// See <https://doc.rust-lang.org/cargo/appendix/glossary.html#target>.
+#[derive(Debug, PartialEq, Clone)]
+pub(crate) struct TargetInfo<'a> {
+ /// The full architecture, including the subarchitecture.
+ ///
+ /// This differs from `cfg!(target_arch)`, which only specifies the
+ /// overall architecture, which is too coarse for certain cases.
+ pub full_arch: &'a str,
+ /// The overall target architecture.
+ ///
+ /// This is the same as the value of `cfg!(target_arch)`.
+ pub arch: &'a str,
+ /// The target vendor.
+ ///
+ /// This is the same as the value of `cfg!(target_vendor)`.
+ pub vendor: &'a str,
+ /// The operating system, or `none` on bare-metal targets.
+ ///
+ /// This is the same as the value of `cfg!(target_os)`.
+ pub os: &'a str,
+ /// The environment on top of the operating system.
+ ///
+ /// This is the same as the value of `cfg!(target_env)`.
+ pub env: &'a str,
+ /// The ABI on top of the operating system.
+ ///
+ /// This is the same as the value of `cfg!(target_abi)`.
+ pub abi: &'a str,
+}
diff --git a/vendor/cc/src/target/apple.rs b/vendor/cc/src/target/apple.rs
new file mode 100644
index 00000000..bd65e00f
--- /dev/null
+++ b/vendor/cc/src/target/apple.rs
@@ -0,0 +1,49 @@
+use super::TargetInfo;
+
+impl TargetInfo<'_> {
+ pub(crate) fn apple_sdk_name(&self) -> &'static str {
+ match (self.os, self.abi) {
+ ("macos", "") => "macosx",
+ ("ios", "") => "iphoneos",
+ ("ios", "sim") => "iphonesimulator",
+ ("ios", "macabi") => "macosx",
+ ("tvos", "") => "appletvos",
+ ("tvos", "sim") => "appletvsimulator",
+ ("watchos", "") => "watchos",
+ ("watchos", "sim") => "watchsimulator",
+ ("visionos", "") => "xros",
+ ("visionos", "sim") => "xrsimulator",
+ (os, _) => panic!("invalid Apple target OS {}", os),
+ }
+ }
+
+ pub(crate) fn apple_version_flag(&self, min_version: &str) -> String {
+ // There are many aliases for these, and `-mtargetos=` is preferred on Clang nowadays, but
+ // for compatibility with older Clang, we use the earliest supported name here.
+ //
+ // NOTE: GCC does not support `-miphoneos-version-min=` etc. (because it does not support
+ // iOS in general), but we specify them anyhow in case we actually have a Clang-like
+ // compiler disguised as a GNU-like compiler, or in case GCC adds support for these in the
+ // future.
+ //
+ // See also:
+ // https://clang.llvm.org/docs/ClangCommandLineReference.html#cmdoption-clang-mmacos-version-min
+ // https://clang.llvm.org/docs/AttributeReference.html#availability
+ // https://gcc.gnu.org/onlinedocs/gcc/Darwin-Options.html#index-mmacosx-version-min
+ match (self.os, self.abi) {
+ ("macos", "") => format!("-mmacosx-version-min={min_version}"),
+ ("ios", "") => format!("-miphoneos-version-min={min_version}"),
+ ("ios", "sim") => format!("-mios-simulator-version-min={min_version}"),
+ ("ios", "macabi") => format!("-mtargetos=ios{min_version}-macabi"),
+ ("tvos", "") => format!("-mappletvos-version-min={min_version}"),
+ ("tvos", "sim") => format!("-mappletvsimulator-version-min={min_version}"),
+ ("watchos", "") => format!("-mwatchos-version-min={min_version}"),
+ ("watchos", "sim") => format!("-mwatchsimulator-version-min={min_version}"),
+ // `-mxros-version-min` does not exist
+ // https://github.com/llvm/llvm-project/issues/88271
+ ("visionos", "") => format!("-mtargetos=xros{min_version}"),
+ ("visionos", "sim") => format!("-mtargetos=xros{min_version}-simulator"),
+ (os, _) => panic!("invalid Apple target OS {}", os),
+ }
+ }
+}
diff --git a/vendor/cc/src/target/generated.rs b/vendor/cc/src/target/generated.rs
new file mode 100644
index 00000000..7db389d9
--- /dev/null
+++ b/vendor/cc/src/target/generated.rs
@@ -0,0 +1,306 @@
+//! This file is generated code. Please edit the generator in
+//! dev-tools/gen-target-info if you need to make changes, or see
+//! src/target/llvm.rs if you need to configure a specific LLVM triple.
+
+#[rustfmt::skip]
+pub(crate) const LLVM_TARGETS: &[(&str, &str)] = &[
+ ("aarch64-apple-darwin", "arm64-apple-macosx"),
+ ("aarch64-apple-ios", "arm64-apple-ios"),
+ ("aarch64-apple-ios-macabi", "arm64-apple-ios-macabi"),
+ ("aarch64-apple-ios-sim", "arm64-apple-ios-simulator"),
+ ("aarch64-apple-tvos", "arm64-apple-tvos"),
+ ("aarch64-apple-tvos-sim", "arm64-apple-tvos-simulator"),
+ ("aarch64-apple-visionos", "arm64-apple-xros"),
+ ("aarch64-apple-visionos-sim", "arm64-apple-xros-simulator"),
+ ("aarch64-apple-watchos", "arm64-apple-watchos"),
+ ("aarch64-apple-watchos-sim", "arm64-apple-watchos-simulator"),
+ ("aarch64-fuchsia", "aarch64-fuchsia"),
+ ("aarch64-kmc-solid_asp3", "aarch64-unknown-none"),
+ ("aarch64-linux-android", "aarch64-linux-android"),
+ ("aarch64-nintendo-switch-freestanding", "aarch64-unknown-none"),
+ ("aarch64-pc-windows-gnullvm", "aarch64-pc-windows-gnu"),
+ ("aarch64-pc-windows-msvc", "aarch64-pc-windows-msvc"),
+ ("aarch64-unknown-freebsd", "aarch64-unknown-freebsd"),
+ ("aarch64-unknown-fuchsia", "aarch64-unknown-fuchsia"),
+ ("aarch64-unknown-hermit", "aarch64-unknown-hermit"),
+ ("aarch64-unknown-illumos", "aarch64-unknown-solaris2.11"),
+ ("aarch64-unknown-linux-gnu", "aarch64-unknown-linux-gnu"),
+ ("aarch64-unknown-linux-gnu_ilp32", "aarch64-unknown-linux-gnu_ilp32"),
+ ("aarch64-unknown-linux-musl", "aarch64-unknown-linux-musl"),
+ ("aarch64-unknown-linux-ohos", "aarch64-unknown-linux-ohos"),
+ ("aarch64-unknown-netbsd", "aarch64-unknown-netbsd"),
+ ("aarch64-unknown-none", "aarch64-unknown-none"),
+ ("aarch64-unknown-none-softfloat", "aarch64-unknown-none"),
+ ("aarch64-unknown-nto-qnx700", "aarch64-unknown-unknown"),
+ ("aarch64-unknown-nto-qnx710", "aarch64-unknown-unknown"),
+ ("aarch64-unknown-nto-qnx710_iosock", "aarch64-unknown-unknown"),
+ ("aarch64-unknown-nto-qnx800", "aarch64-unknown-unknown"),
+ ("aarch64-unknown-nuttx", "aarch64-unknown-none"),
+ ("aarch64-unknown-openbsd", "aarch64-unknown-openbsd"),
+ ("aarch64-unknown-redox", "aarch64-unknown-redox"),
+ ("aarch64-unknown-teeos", "aarch64-unknown-none"),
+ ("aarch64-unknown-trusty", "aarch64-unknown-unknown-musl"),
+ ("aarch64-unknown-uefi", "aarch64-unknown-windows"),
+ ("aarch64-uwp-windows-msvc", "aarch64-pc-windows-msvc"),
+ ("aarch64-wrs-vxworks", "aarch64-unknown-linux-gnu"),
+ ("aarch64_be-unknown-linux-gnu", "aarch64_be-unknown-linux-gnu"),
+ ("aarch64_be-unknown-linux-gnu_ilp32", "aarch64_be-unknown-linux-gnu_ilp32"),
+ ("aarch64_be-unknown-netbsd", "aarch64_be-unknown-netbsd"),
+ ("amdgcn-amd-amdhsa", "amdgcn-amd-amdhsa"),
+ ("arm-linux-androideabi", "arm-linux-androideabi"),
+ ("arm-unknown-linux-gnueabi", "arm-unknown-linux-gnueabi"),
+ ("arm-unknown-linux-gnueabihf", "arm-unknown-linux-gnueabihf"),
+ ("arm-unknown-linux-musleabi", "arm-unknown-linux-musleabi"),
+ ("arm-unknown-linux-musleabihf", "arm-unknown-linux-musleabihf"),
+ ("arm64_32-apple-watchos", "arm64_32-apple-watchos"),
+ ("arm64e-apple-darwin", "arm64e-apple-macosx"),
+ ("arm64e-apple-ios", "arm64e-apple-ios"),
+ ("arm64e-apple-tvos", "arm64e-apple-tvos"),
+ ("arm64ec-pc-windows-msvc", "arm64ec-pc-windows-msvc"),
+ ("armeb-unknown-linux-gnueabi", "armeb-unknown-linux-gnueabi"),
+ ("armebv7r-none-eabi", "armebv7r-none-eabi"),
+ ("armebv7r-none-eabihf", "armebv7r-none-eabihf"),
+ ("armv4t-none-eabi", "armv4t-none-eabi"),
+ ("armv4t-unknown-linux-gnueabi", "armv4t-unknown-linux-gnueabi"),
+ ("armv5te-none-eabi", "armv5te-none-eabi"),
+ ("armv5te-unknown-linux-gnueabi", "armv5te-unknown-linux-gnueabi"),
+ ("armv5te-unknown-linux-musleabi", "armv5te-unknown-linux-musleabi"),
+ ("armv5te-unknown-linux-uclibceabi", "armv5te-unknown-linux-gnueabi"),
+ ("armv6-unknown-freebsd", "armv6-unknown-freebsd-gnueabihf"),
+ ("armv6-unknown-netbsd-eabihf", "armv6-unknown-netbsdelf-eabihf"),
+ ("armv6k-nintendo-3ds", "armv6k-none-eabihf"),
+ ("armv7-apple-ios", "armv7-apple-ios7.0.0"),
+ ("armv7-linux-androideabi", "armv7-none-linux-android"),
+ ("armv7-rtems-eabihf", "armv7-unknown-none-eabihf"),
+ ("armv7-sony-vita-newlibeabihf", "thumbv7a-sony-vita-eabihf"),
+ ("armv7-unknown-freebsd", "armv7-unknown-freebsd-gnueabihf"),
+ ("armv7-unknown-linux-gnueabi", "armv7-unknown-linux-gnueabi"),
+ ("armv7-unknown-linux-gnueabihf", "armv7-unknown-linux-gnueabihf"),
+ ("armv7-unknown-linux-musleabi", "armv7-unknown-linux-musleabi"),
+ ("armv7-unknown-linux-musleabihf", "armv7-unknown-linux-musleabihf"),
+ ("armv7-unknown-linux-ohos", "armv7-unknown-linux-ohos"),
+ ("armv7-unknown-linux-uclibceabi", "armv7-unknown-linux-gnueabi"),
+ ("armv7-unknown-linux-uclibceabihf", "armv7-unknown-linux-gnueabihf"),
+ ("armv7-unknown-netbsd-eabihf", "armv7-unknown-netbsdelf-eabihf"),
+ ("armv7-unknown-trusty", "armv7-unknown-unknown-gnueabi"),
+ ("armv7-wrs-vxworks-eabihf", "armv7-unknown-linux-gnueabihf"),
+ ("armv7a-kmc-solid_asp3-eabi", "armv7a-none-eabi"),
+ ("armv7a-kmc-solid_asp3-eabihf", "armv7a-none-eabihf"),
+ ("armv7a-none-eabi", "armv7a-none-eabi"),
+ ("armv7a-none-eabihf", "armv7a-none-eabihf"),
+ ("armv7a-nuttx-eabi", "armv7a-none-eabi"),
+ ("armv7a-nuttx-eabihf", "armv7a-none-eabihf"),
+ ("armv7k-apple-watchos", "armv7k-apple-watchos"),
+ ("armv7r-none-eabi", "armv7r-none-eabi"),
+ ("armv7r-none-eabihf", "armv7r-none-eabihf"),
+ ("armv7s-apple-ios", "armv7s-apple-ios"),
+ ("armv8r-none-eabihf", "armv8r-none-eabihf"),
+ ("asmjs-unknown-emscripten", "wasm32-unknown-emscripten"),
+ ("avr-none", "avr-unknown-unknown"),
+ ("avr-unknown-gnu-atmega328", "avr-unknown-unknown"),
+ ("bpfeb-unknown-none", "bpfeb"),
+ ("bpfel-unknown-none", "bpfel"),
+ ("csky-unknown-linux-gnuabiv2", "csky-unknown-linux-gnuabiv2"),
+ ("csky-unknown-linux-gnuabiv2hf", "csky-unknown-linux-gnuabiv2"),
+ ("hexagon-unknown-linux-musl", "hexagon-unknown-linux-musl"),
+ ("hexagon-unknown-none-elf", "hexagon-unknown-none-elf"),
+ ("i386-apple-ios", "i386-apple-ios-simulator"),
+ ("i586-pc-windows-msvc", "i586-pc-windows-msvc"),
+ ("i586-unknown-linux-gnu", "i586-unknown-linux-gnu"),
+ ("i586-unknown-linux-musl", "i586-unknown-linux-musl"),
+ ("i586-unknown-netbsd", "i586-unknown-netbsdelf"),
+ ("i586-unknown-redox", "i586-unknown-redox"),
+ ("i686-apple-darwin", "i686-apple-macosx"),
+ ("i686-linux-android", "i686-linux-android"),
+ ("i686-pc-nto-qnx700", "i586-pc-unknown"),
+ ("i686-pc-windows-gnu", "i686-pc-windows-gnu"),
+ ("i686-pc-windows-gnullvm", "i686-pc-windows-gnu"),
+ ("i686-pc-windows-msvc", "i686-pc-windows-msvc"),
+ ("i686-unknown-freebsd", "i686-unknown-freebsd"),
+ ("i686-unknown-haiku", "i686-unknown-haiku"),
+ ("i686-unknown-hurd-gnu", "i686-unknown-hurd-gnu"),
+ ("i686-unknown-linux-gnu", "i686-unknown-linux-gnu"),
+ ("i686-unknown-linux-musl", "i686-unknown-linux-musl"),
+ ("i686-unknown-netbsd", "i686-unknown-netbsdelf"),
+ ("i686-unknown-openbsd", "i686-unknown-openbsd"),
+ ("i686-unknown-uefi", "i686-unknown-windows-gnu"),
+ ("i686-uwp-windows-gnu", "i686-pc-windows-gnu"),
+ ("i686-uwp-windows-msvc", "i686-pc-windows-msvc"),
+ ("i686-win7-windows-gnu", "i686-pc-windows-gnu"),
+ ("i686-win7-windows-msvc", "i686-pc-windows-msvc"),
+ ("i686-wrs-vxworks", "i686-unknown-linux-gnu"),
+ ("loongarch32-unknown-none", "loongarch32-unknown-none"),
+ ("loongarch32-unknown-none-softfloat", "loongarch32-unknown-none"),
+ ("loongarch64-unknown-linux-gnu", "loongarch64-unknown-linux-gnu"),
+ ("loongarch64-unknown-linux-musl", "loongarch64-unknown-linux-musl"),
+ ("loongarch64-unknown-linux-ohos", "loongarch64-unknown-linux-ohos"),
+ ("loongarch64-unknown-none", "loongarch64-unknown-none"),
+ ("loongarch64-unknown-none-softfloat", "loongarch64-unknown-none"),
+ ("m68k-unknown-linux-gnu", "m68k-unknown-linux-gnu"),
+ ("m68k-unknown-none-elf", "m68k"),
+ ("mips-mti-none-elf", "mips"),
+ ("mips-unknown-linux-gnu", "mips-unknown-linux-gnu"),
+ ("mips-unknown-linux-musl", "mips-unknown-linux-musl"),
+ ("mips-unknown-linux-uclibc", "mips-unknown-linux-gnu"),
+ ("mips64-openwrt-linux-musl", "mips64-unknown-linux-musl"),
+ ("mips64-unknown-linux-gnuabi64", "mips64-unknown-linux-gnuabi64"),
+ ("mips64-unknown-linux-muslabi64", "mips64-unknown-linux-musl"),
+ ("mips64el-unknown-linux-gnuabi64", "mips64el-unknown-linux-gnuabi64"),
+ ("mips64el-unknown-linux-muslabi64", "mips64el-unknown-linux-musl"),
+ ("mipsel-mti-none-elf", "mipsel"),
+ ("mipsel-sony-psp", "mipsel-sony-psp"),
+ ("mipsel-sony-psx", "mipsel-sony-psx"),
+ ("mipsel-unknown-linux-gnu", "mipsel-unknown-linux-gnu"),
+ ("mipsel-unknown-linux-musl", "mipsel-unknown-linux-musl"),
+ ("mipsel-unknown-linux-uclibc", "mipsel-unknown-linux-gnu"),
+ ("mipsel-unknown-netbsd", "mipsel-unknown-netbsd"),
+ ("mipsel-unknown-none", "mipsel-unknown-none"),
+ ("mipsisa32r6-unknown-linux-gnu", "mipsisa32r6-unknown-linux-gnu"),
+ ("mipsisa32r6el-unknown-linux-gnu", "mipsisa32r6el-unknown-linux-gnu"),
+ ("mipsisa64r6-unknown-linux-gnuabi64", "mipsisa64r6-unknown-linux-gnuabi64"),
+ ("mipsisa64r6el-unknown-linux-gnuabi64", "mipsisa64r6el-unknown-linux-gnuabi64"),
+ ("msp430-none-elf", "msp430-none-elf"),
+ ("nvptx64-nvidia-cuda", "nvptx64-nvidia-cuda"),
+ ("powerpc-unknown-freebsd", "powerpc-unknown-freebsd13.0"),
+ ("powerpc-unknown-linux-gnu", "powerpc-unknown-linux-gnu"),
+ ("powerpc-unknown-linux-gnuspe", "powerpc-unknown-linux-gnuspe"),
+ ("powerpc-unknown-linux-musl", "powerpc-unknown-linux-musl"),
+ ("powerpc-unknown-linux-muslspe", "powerpc-unknown-linux-muslspe"),
+ ("powerpc-unknown-netbsd", "powerpc-unknown-netbsd"),
+ ("powerpc-unknown-openbsd", "powerpc-unknown-openbsd"),
+ ("powerpc-wrs-vxworks", "powerpc-unknown-linux-gnu"),
+ ("powerpc-wrs-vxworks-spe", "powerpc-unknown-linux-gnuspe"),
+ ("powerpc64-ibm-aix", "powerpc64-ibm-aix"),
+ ("powerpc64-unknown-freebsd", "powerpc64-unknown-freebsd"),
+ ("powerpc64-unknown-linux-gnu", "powerpc64-unknown-linux-gnu"),
+ ("powerpc64-unknown-linux-musl", "powerpc64-unknown-linux-musl"),
+ ("powerpc64-unknown-openbsd", "powerpc64-unknown-openbsd"),
+ ("powerpc64-wrs-vxworks", "powerpc64-unknown-linux-gnu"),
+ ("powerpc64le-unknown-freebsd", "powerpc64le-unknown-freebsd"),
+ ("powerpc64le-unknown-linux-gnu", "powerpc64le-unknown-linux-gnu"),
+ ("powerpc64le-unknown-linux-musl", "powerpc64le-unknown-linux-musl"),
+ ("riscv32-wrs-vxworks", "riscv32-unknown-linux-gnu"),
+ ("riscv32e-unknown-none-elf", "riscv32"),
+ ("riscv32em-unknown-none-elf", "riscv32"),
+ ("riscv32emc-unknown-none-elf", "riscv32"),
+ ("riscv32gc-unknown-linux-gnu", "riscv32-unknown-linux-gnu"),
+ ("riscv32gc-unknown-linux-musl", "riscv32-unknown-linux-musl"),
+ ("riscv32i-unknown-none-elf", "riscv32"),
+ ("riscv32im-risc0-zkvm-elf", "riscv32"),
+ ("riscv32im-unknown-none-elf", "riscv32"),
+ ("riscv32ima-unknown-none-elf", "riscv32"),
+ ("riscv32imac-esp-espidf", "riscv32"),
+ ("riscv32imac-unknown-none-elf", "riscv32"),
+ ("riscv32imac-unknown-nuttx-elf", "riscv32"),
+ ("riscv32imac-unknown-xous-elf", "riscv32"),
+ ("riscv32imafc-esp-espidf", "riscv32"),
+ ("riscv32imafc-unknown-none-elf", "riscv32"),
+ ("riscv32imafc-unknown-nuttx-elf", "riscv32"),
+ ("riscv32imc-esp-espidf", "riscv32"),
+ ("riscv32imc-unknown-none-elf", "riscv32"),
+ ("riscv32imc-unknown-nuttx-elf", "riscv32"),
+ ("riscv64-linux-android", "riscv64-linux-android"),
+ ("riscv64-wrs-vxworks", "riscv64-unknown-linux-gnu"),
+ ("riscv64gc-unknown-freebsd", "riscv64-unknown-freebsd"),
+ ("riscv64gc-unknown-fuchsia", "riscv64-unknown-fuchsia"),
+ ("riscv64gc-unknown-hermit", "riscv64-unknown-hermit"),
+ ("riscv64gc-unknown-linux-gnu", "riscv64-unknown-linux-gnu"),
+ ("riscv64gc-unknown-linux-musl", "riscv64-unknown-linux-musl"),
+ ("riscv64gc-unknown-netbsd", "riscv64-unknown-netbsd"),
+ ("riscv64gc-unknown-none-elf", "riscv64"),
+ ("riscv64gc-unknown-nuttx-elf", "riscv64"),
+ ("riscv64gc-unknown-openbsd", "riscv64-unknown-openbsd"),
+ ("riscv64imac-unknown-none-elf", "riscv64"),
+ ("riscv64imac-unknown-nuttx-elf", "riscv64"),
+ ("s390x-unknown-linux-gnu", "s390x-unknown-linux-gnu"),
+ ("s390x-unknown-linux-musl", "s390x-unknown-linux-musl"),
+ ("sparc-unknown-linux-gnu", "sparc-unknown-linux-gnu"),
+ ("sparc-unknown-none-elf", "sparc-unknown-none-elf"),
+ ("sparc64-unknown-linux-gnu", "sparc64-unknown-linux-gnu"),
+ ("sparc64-unknown-netbsd", "sparc64-unknown-netbsd"),
+ ("sparc64-unknown-openbsd", "sparc64-unknown-openbsd"),
+ ("sparcv9-sun-solaris", "sparcv9-sun-solaris"),
+ ("thumbv4t-none-eabi", "thumbv4t-none-eabi"),
+ ("thumbv5te-none-eabi", "thumbv5te-none-eabi"),
+ ("thumbv6m-none-eabi", "thumbv6m-none-eabi"),
+ ("thumbv6m-nuttx-eabi", "thumbv6m-none-eabi"),
+ ("thumbv7a-nuttx-eabi", "thumbv7a-none-eabi"),
+ ("thumbv7a-nuttx-eabihf", "thumbv7a-none-eabihf"),
+ ("thumbv7a-pc-windows-msvc", "thumbv7a-pc-windows-msvc"),
+ ("thumbv7a-uwp-windows-msvc", "thumbv7a-pc-windows-msvc"),
+ ("thumbv7em-none-eabi", "thumbv7em-none-eabi"),
+ ("thumbv7em-none-eabihf", "thumbv7em-none-eabihf"),
+ ("thumbv7em-nuttx-eabi", "thumbv7em-none-eabi"),
+ ("thumbv7em-nuttx-eabihf", "thumbv7em-none-eabihf"),
+ ("thumbv7m-none-eabi", "thumbv7m-none-eabi"),
+ ("thumbv7m-nuttx-eabi", "thumbv7m-none-eabi"),
+ ("thumbv7neon-linux-androideabi", "armv7-none-linux-android"),
+ ("thumbv7neon-unknown-linux-gnueabihf", "armv7-unknown-linux-gnueabihf"),
+ ("thumbv7neon-unknown-linux-musleabihf", "armv7-unknown-linux-musleabihf"),
+ ("thumbv8m.base-none-eabi", "thumbv8m.base-none-eabi"),
+ ("thumbv8m.base-nuttx-eabi", "thumbv8m.base-none-eabi"),
+ ("thumbv8m.main-none-eabi", "thumbv8m.main-none-eabi"),
+ ("thumbv8m.main-none-eabihf", "thumbv8m.main-none-eabihf"),
+ ("thumbv8m.main-nuttx-eabi", "thumbv8m.main-none-eabi"),
+ ("thumbv8m.main-nuttx-eabihf", "thumbv8m.main-none-eabihf"),
+ ("wasm32-unknown-emscripten", "wasm32-unknown-emscripten"),
+ ("wasm32-unknown-unknown", "wasm32-unknown-unknown"),
+ ("wasm32-wali-linux-musl", "wasm32-wasi"),
+ ("wasm32-wasi", "wasm32-wasi"),
+ ("wasm32-wasip1", "wasm32-wasip1"),
+ ("wasm32-wasip1-threads", "wasm32-wasi"),
+ ("wasm32-wasip2", "wasm32-wasip2"),
+ ("wasm32v1-none", "wasm32-unknown-unknown"),
+ ("wasm64-unknown-unknown", "wasm64-unknown-unknown"),
+ ("x86_64-apple-darwin", "x86_64-apple-macosx"),
+ ("x86_64-apple-ios", "x86_64-apple-ios-simulator"),
+ ("x86_64-apple-ios-macabi", "x86_64-apple-ios-macabi"),
+ ("x86_64-apple-tvos", "x86_64-apple-tvos-simulator"),
+ ("x86_64-apple-watchos-sim", "x86_64-apple-watchos-simulator"),
+ ("x86_64-fortanix-unknown-sgx", "x86_64-elf"),
+ ("x86_64-fuchsia", "x86_64-fuchsia"),
+ ("x86_64-linux-android", "x86_64-linux-android"),
+ ("x86_64-lynx-lynxos178", "x86_64-unknown-unknown-gnu"),
+ ("x86_64-pc-cygwin", "x86_64-pc-cygwin"),
+ ("x86_64-pc-nto-qnx710", "x86_64-pc-unknown"),
+ ("x86_64-pc-nto-qnx710_iosock", "x86_64-pc-unknown"),
+ ("x86_64-pc-nto-qnx800", "x86_64-pc-unknown"),
+ ("x86_64-pc-solaris", "x86_64-pc-solaris"),
+ ("x86_64-pc-windows-gnu", "x86_64-pc-windows-gnu"),
+ ("x86_64-pc-windows-gnullvm", "x86_64-pc-windows-gnu"),
+ ("x86_64-pc-windows-msvc", "x86_64-pc-windows-msvc"),
+ ("x86_64-sun-solaris", "x86_64-pc-solaris"),
+ ("x86_64-unikraft-linux-musl", "x86_64-unknown-linux-musl"),
+ ("x86_64-unknown-dragonfly", "x86_64-unknown-dragonfly"),
+ ("x86_64-unknown-freebsd", "x86_64-unknown-freebsd"),
+ ("x86_64-unknown-fuchsia", "x86_64-unknown-fuchsia"),
+ ("x86_64-unknown-haiku", "x86_64-unknown-haiku"),
+ ("x86_64-unknown-hermit", "x86_64-unknown-hermit"),
+ ("x86_64-unknown-hurd-gnu", "x86_64-unknown-hurd-gnu"),
+ ("x86_64-unknown-illumos", "x86_64-pc-solaris"),
+ ("x86_64-unknown-l4re-uclibc", "x86_64-unknown-l4re-gnu"),
+ ("x86_64-unknown-linux-gnu", "x86_64-unknown-linux-gnu"),
+ ("x86_64-unknown-linux-gnux32", "x86_64-unknown-linux-gnux32"),
+ ("x86_64-unknown-linux-musl", "x86_64-unknown-linux-musl"),
+ ("x86_64-unknown-linux-none", "x86_64-unknown-linux-none"),
+ ("x86_64-unknown-linux-ohos", "x86_64-unknown-linux-ohos"),
+ ("x86_64-unknown-netbsd", "x86_64-unknown-netbsd"),
+ ("x86_64-unknown-none", "x86_64-unknown-none-elf"),
+ ("x86_64-unknown-none-linuxkernel", "x86_64-unknown-none-elf"),
+ ("x86_64-unknown-openbsd", "x86_64-unknown-openbsd"),
+ ("x86_64-unknown-redox", "x86_64-unknown-redox"),
+ ("x86_64-unknown-trusty", "x86_64-unknown-unknown-musl"),
+ ("x86_64-unknown-uefi", "x86_64-unknown-windows"),
+ ("x86_64-uwp-windows-gnu", "x86_64-pc-windows-gnu"),
+ ("x86_64-uwp-windows-msvc", "x86_64-pc-windows-msvc"),
+ ("x86_64-win7-windows-gnu", "x86_64-pc-windows-gnu"),
+ ("x86_64-win7-windows-msvc", "x86_64-pc-windows-msvc"),
+ ("x86_64-wrs-vxworks", "x86_64-unknown-linux-gnu"),
+ ("x86_64h-apple-darwin", "x86_64h-apple-macosx"),
+ ("xtensa-esp32-espidf", "xtensa-none-elf"),
+ ("xtensa-esp32-none-elf", "xtensa-none-elf"),
+ ("xtensa-esp32s2-espidf", "xtensa-none-elf"),
+ ("xtensa-esp32s2-none-elf", "xtensa-none-elf"),
+ ("xtensa-esp32s3-espidf", "xtensa-none-elf"),
+ ("xtensa-esp32s3-none-elf", "xtensa-none-elf"),
+];
diff --git a/vendor/cc/src/target/llvm.rs b/vendor/cc/src/target/llvm.rs
new file mode 100644
index 00000000..124ab2a0
--- /dev/null
+++ b/vendor/cc/src/target/llvm.rs
@@ -0,0 +1,315 @@
+use std::borrow::Cow;
+
+use super::{generated, TargetInfo};
+
+impl TargetInfo<'_> {
+ /// The LLVM/Clang target triple.
+ ///
+ /// See <https://clang.llvm.org/docs/CrossCompilation.html#target-triple>.
+ ///
+ /// Rust and Clang don't really agree on target naming, so we first try to
+ /// find the matching trible based on `rustc`'s output, but if no such
+ /// triple exists, we attempt to construct the triple from scratch.
+ ///
+ /// NOTE: You should never need to match on this explicitly, use the
+ /// fields on [`TargetInfo`] instead.
+ pub(crate) fn llvm_target(
+ &self,
+ rustc_target: &str,
+ version: Option<&str>,
+ ) -> Cow<'static, str> {
+ if rustc_target == "armv7-apple-ios" {
+ // FIXME(madsmtm): Unnecessary once we bump MSRV to Rust 1.74
+ return Cow::Borrowed("armv7-apple-ios");
+ } else if self.os == "uefi" {
+ // Override the UEFI LLVM targets.
+ //
+ // The rustc mappings (as of 1.82) for the UEFI targets are:
+ // * i686-unknown-uefi -> i686-unknown-windows-gnu
+ // * x86_64-unknown-uefi -> x86_64-unknown-windows
+ // * aarch64-unknown-uefi -> aarch64-unknown-windows
+ //
+ // However, in cc-rs all the UEFI targets use
+ // -windows-gnu. This has been the case since 2021 [1].
+ // * i686-unknown-uefi -> i686-unknown-windows-gnu
+ // * x86_64-unknown-uefi -> x86_64-unknown-windows-gnu
+ // * aarch64-unknown-uefi -> aarch64-unknown-windows-gnu
+ //
+ // For now, override the UEFI mapping to keep the behavior
+ // of cc-rs unchanged.
+ //
+ // TODO: as discussed in [2], it may be possible to switch
+ // to new UEFI targets added to clang, and regardless it
+ // would be good to have consistency between rustc and
+ // cc-rs.
+ //
+ // [1]: https://github.com/rust-lang/cc-rs/pull/623
+ // [2]: https://github.com/rust-lang/cc-rs/pull/1264
+ return Cow::Owned(format!("{}-unknown-windows-gnu", self.full_arch));
+ }
+
+ // If no version is requested, let's take the triple directly from
+ // `rustc` (the logic below is not yet good enough for most targets).
+ //
+ // FIXME(madsmtm): This should ideally be removed.
+ if version.is_none() {
+ if let Ok(index) = generated::LLVM_TARGETS
+ .binary_search_by_key(&rustc_target, |(rustc_target, _)| rustc_target)
+ {
+ let (_, llvm_target) = &generated::LLVM_TARGETS[index];
+ return Cow::Borrowed(llvm_target);
+ }
+ }
+
+ // Otherwise, attempt to construct the triple from the target info.
+
+ let arch = match self.full_arch {
+ riscv32 if riscv32.starts_with("riscv32") => "riscv32",
+ riscv64 if riscv64.starts_with("riscv64") => "riscv64",
+ "aarch64" if self.vendor == "apple" => "arm64",
+ "armv7" if self.vendor == "sony" => "thumbv7a", // FIXME
+ arch => arch,
+ };
+ let vendor = match self.vendor {
+ "kmc" | "nintendo" => "unknown",
+ "unknown" if self.os == "android" => "linux",
+ "uwp" => "pc",
+ "espressif" => "",
+ _ if self.arch == "msp430" => "",
+ vendor => vendor,
+ };
+ let os = match self.os {
+ "macos" => "macosx",
+ "visionos" => "xros",
+ "uefi" => "windows",
+ "solid_asp3" | "horizon" | "teeos" | "nuttx" | "espidf" => "none",
+ "nto" => "unknown", // FIXME
+ "trusty" => "unknown", // FIXME
+ os => os,
+ };
+ let version = version.unwrap_or("");
+ let env = match self.env {
+ "newlib" | "nto70" | "nto71" | "nto71_iosock" | "p1" | "p2" | "relibc" | "sgx"
+ | "uclibc" => "",
+ env => env,
+ };
+ let abi = match self.abi {
+ "sim" => "simulator",
+ "llvm" | "softfloat" | "uwp" | "vec-extabi" => "",
+ "ilp32" => "_ilp32",
+ "abi64" => "",
+ abi => abi,
+ };
+ Cow::Owned(match (vendor, env, abi) {
+ ("", "", "") => format!("{arch}-{os}{version}"),
+ ("", env, abi) => format!("{arch}-{os}{version}-{env}{abi}"),
+ (vendor, "", "") => format!("{arch}-{vendor}-{os}{version}"),
+ (vendor, env, abi) => format!("{arch}-{vendor}-{os}{version}-{env}{abi}"),
+ })
+ }
+}
+
+#[cfg(test)]
+mod tests {
+ use std::process::Command;
+
+ use crate::TargetInfo;
+
+ #[test]
+ fn test_old_ios_target() {
+ assert_eq!(
+ TargetInfo {
+ full_arch: "armv7",
+ arch: "armv7",
+ vendor: "apple",
+ os: "ios",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("armv7-apple-ios", None),
+ "armv7-apple-ios"
+ );
+ }
+
+ #[test]
+ fn basic_llvm_triple_guessing() {
+ assert_eq!(
+ TargetInfo {
+ full_arch: "aarch64",
+ arch: "aarch64",
+ vendor: "unknown",
+ os: "linux",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("invalid", None),
+ "aarch64-unknown-linux"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "x86_64",
+ arch: "x86_64",
+ vendor: "unknown",
+ os: "linux",
+ env: "gnu",
+ abi: "",
+ }
+ .llvm_target("invalid", None),
+ "x86_64-unknown-linux-gnu"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "x86_64",
+ arch: "x86_64",
+ vendor: "unknown",
+ os: "linux",
+ env: "gnu",
+ abi: "eabi",
+ }
+ .llvm_target("invalid", None),
+ "x86_64-unknown-linux-gnueabi"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "x86_64",
+ arch: "x86_64",
+ vendor: "apple",
+ os: "macos",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("invalid", None),
+ "x86_64-apple-macosx"
+ );
+ }
+
+ #[test]
+ fn llvm_version() {
+ assert_eq!(
+ TargetInfo {
+ full_arch: "aarch64",
+ arch: "aarch64",
+ vendor: "apple",
+ os: "ios",
+ env: "",
+ abi: "sim",
+ }
+ .llvm_target("aarch64-apple-ios-sim", Some("14.0")),
+ "arm64-apple-ios14.0-simulator"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "aarch64",
+ arch: "aarch64",
+ vendor: "apple",
+ os: "visionos",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("aarch64-apple-visionos", Some("2.0")),
+ "arm64-apple-xros2.0"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "aarch64",
+ arch: "aarch64",
+ vendor: "apple",
+ os: "ios",
+ env: "",
+ abi: "macabi",
+ }
+ .llvm_target("aarch64-apple-ios-macabi", Some("13.1")),
+ "arm64-apple-ios13.1-macabi"
+ );
+ }
+
+ #[test]
+ fn uefi() {
+ assert_eq!(
+ TargetInfo {
+ full_arch: "i686",
+ arch: "x86",
+ vendor: "unknown",
+ os: "uefi",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("i686-unknown-uefi", None),
+ "i686-unknown-windows-gnu"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "x86_64",
+ arch: "x86_64",
+ vendor: "unknown",
+ os: "uefi",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("x86_64-unknown-uefi", None),
+ "x86_64-unknown-windows-gnu"
+ );
+ assert_eq!(
+ TargetInfo {
+ full_arch: "aarch64",
+ arch: "aarch64",
+ vendor: "unknown",
+ os: "uefi",
+ env: "",
+ abi: "",
+ }
+ .llvm_target("aarch64-unknown-uefi", None),
+ "aarch64-unknown-windows-gnu"
+ );
+ }
+
+ #[test]
+ #[ignore = "not yet done"]
+ fn llvm_for_all_rustc_targets() {
+ let rustc = std::env::var("RUSTC").unwrap_or_else(|_| "rustc".to_string());
+
+ let target_list = Command::new(&rustc)
+ .arg("--print=target-list")
+ .output()
+ .unwrap()
+ .stdout;
+ let target_list = String::from_utf8(target_list).unwrap();
+
+ let mut has_failure = false;
+ for target in target_list.lines() {
+ let spec_json = Command::new(&rustc)
+ .arg("--target")
+ .arg(target)
+ .arg("-Zunstable-options")
+ .arg("--print=target-spec-json")
+ .env("RUSTC_BOOTSTRAP", "1") // Crimes
+ .output()
+ .unwrap()
+ .stdout;
+ let spec_json = String::from_utf8(spec_json).unwrap();
+
+ // JSON crimes
+ let expected = spec_json
+ .split_once("llvm-target\": \"")
+ .unwrap()
+ .1
+ .split_once("\"")
+ .unwrap()
+ .0;
+ let actual = TargetInfo::from_rustc_target(target)
+ .map(|target| target.llvm_target("invalid", None));
+
+ if Some(expected) != actual.as_deref().ok() {
+ eprintln!("failed comparing {target}:");
+ eprintln!(" expected: Ok({expected:?})");
+ eprintln!(" actual: {actual:?}");
+ eprintln!();
+ has_failure = true;
+ }
+ }
+
+ if has_failure {
+ panic!("failed comparing targets");
+ }
+ }
+}
diff --git a/vendor/cc/src/target/parser.rs b/vendor/cc/src/target/parser.rs
new file mode 100644
index 00000000..c4cfcbbb
--- /dev/null
+++ b/vendor/cc/src/target/parser.rs
@@ -0,0 +1,563 @@
+use std::env;
+
+use crate::{target::TargetInfo, utilities::OnceLock, Error, ErrorKind};
+
+#[derive(Debug)]
+struct TargetInfoParserInner {
+ full_arch: Box<str>,
+ arch: Box<str>,
+ vendor: Box<str>,
+ os: Box<str>,
+ env: Box<str>,
+ abi: Box<str>,
+}
+
+impl TargetInfoParserInner {
+ fn from_cargo_environment_variables() -> Result<Self, Error> {
+ // `TARGET` must be present.
+ //
+ // No need to emit `rerun-if-env-changed` for this,
+ // as it is controlled by Cargo itself.
+ #[allow(clippy::disallowed_methods)]
+ let target_name = env::var("TARGET").map_err(|err| {
+ Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("failed reading TARGET: {err}"),
+ )
+ })?;
+
+ // Parse the full architecture name from the target name.
+ let (full_arch, _rest) = target_name.split_once('-').ok_or(Error::new(
+ ErrorKind::InvalidTarget,
+ format!("target `{target_name}` only had a single component (at least two required)"),
+ ))?;
+
+ let cargo_env = |name, fallback: Option<&str>| -> Result<Box<str>, Error> {
+ // No need to emit `rerun-if-env-changed` for these,
+ // as they are controlled by Cargo itself.
+ #[allow(clippy::disallowed_methods)]
+ match env::var(name) {
+ Ok(var) => Ok(var.into_boxed_str()),
+ Err(err) => match fallback {
+ Some(fallback) => Ok(fallback.into()),
+ None => Err(Error::new(
+ ErrorKind::EnvVarNotFound,
+ format!("did not find fallback information for target `{target_name}`, and failed reading {name}: {err}"),
+ )),
+ },
+ }
+ };
+
+ // Prefer to use `CARGO_ENV_*` if set, since these contain the most
+ // correct information relative to the current `rustc`, and makes it
+ // possible to support custom target JSON specs unknown to `rustc`.
+ //
+ // NOTE: If the user is using an older `rustc`, that data may be older
+ // than our pre-generated data, but we still prefer Cargo's view of
+ // the world, since at least `cc` won't differ from `rustc` in that
+ // case.
+ //
+ // These may not be set in case the user depended on being able to
+ // just set `TARGET` outside of build scripts; in those cases, fall
+ // back back to data from the known set of target names instead.
+ //
+ // See discussion in #1225 for further details.
+ let fallback_target = TargetInfo::from_rustc_target(&target_name).ok();
+ let ft = fallback_target.as_ref();
+ let arch = cargo_env("CARGO_CFG_TARGET_ARCH", ft.map(|t| t.arch))?;
+ let vendor = cargo_env("CARGO_CFG_TARGET_VENDOR", ft.map(|t| t.vendor))?;
+ let os = cargo_env("CARGO_CFG_TARGET_OS", ft.map(|t| t.os))?;
+ let env = cargo_env("CARGO_CFG_TARGET_ENV", ft.map(|t| t.env))?;
+ // `target_abi` was stabilized in Rust 1.78, which is higher than our
+ // MSRV, so it may not always be available; In that case, fall back to
+ // `""`, which is _probably_ correct for unknown target names.
+ let abi = cargo_env("CARGO_CFG_TARGET_ABI", ft.map(|t| t.abi))
+ .unwrap_or_else(|_| String::default().into_boxed_str());
+
+ Ok(Self {
+ full_arch: full_arch.to_string().into_boxed_str(),
+ arch,
+ vendor,
+ os,
+ env,
+ abi,
+ })
+ }
+}
+
+/// Parser for [`TargetInfo`], contains cached information.
+#[derive(Default, Debug)]
+pub(crate) struct TargetInfoParser(OnceLock<Result<TargetInfoParserInner, Error>>);
+
+impl TargetInfoParser {
+ pub fn parse_from_cargo_environment_variables(&self) -> Result<TargetInfo<'_>, Error> {
+ match self
+ .0
+ .get_or_init(TargetInfoParserInner::from_cargo_environment_variables)
+ {
+ Ok(TargetInfoParserInner {
+ full_arch,
+ arch,
+ vendor,
+ os,
+ env,
+ abi,
+ }) => Ok(TargetInfo {
+ full_arch,
+ arch,
+ vendor,
+ os,
+ env,
+ abi,
+ }),
+ Err(e) => Err(e.clone()),
+ }
+ }
+}
+
+/// Parse the full architecture in the target name into the simpler
+/// `cfg(target_arch = "...")` that `rustc` exposes.
+fn parse_arch(full_arch: &str) -> Option<&str> {
+ // NOTE: Some of these don't necessarily match an existing target in
+ // `rustc`. They're parsed anyhow to be as forward-compatible as possible,
+ // while still being correct.
+ //
+ // See also:
+ // https://docs.rs/cfg-expr/0.18.0/cfg_expr/targets/index.html
+ // https://docs.rs/target-lexicon/0.13.2/target_lexicon/enum.Architecture.html
+ // https://gcc.gnu.org/onlinedocs/gcc/Submodel-Options.html
+ // `clang -print-targets`
+ Some(match full_arch {
+ arch if arch.starts_with("mipsisa32r6") => "mips32r6", // mipsisa32r6 | mipsisa32r6el
+ arch if arch.starts_with("mipsisa64r6") => "mips64r6", // mipsisa64r6 | mipsisa64r6el
+
+ arch if arch.starts_with("mips64") => "mips64", // mips64 | mips64el
+ arch if arch.starts_with("mips") => "mips", // mips | mipsel
+
+ arch if arch.starts_with("loongarch64") => "loongarch64",
+ arch if arch.starts_with("loongarch32") => "loongarch32",
+
+ arch if arch.starts_with("powerpc64") => "powerpc64", // powerpc64 | powerpc64le
+ arch if arch.starts_with("powerpc") => "powerpc",
+ arch if arch.starts_with("ppc64") => "powerpc64",
+ arch if arch.starts_with("ppc") => "powerpc",
+
+ arch if arch.starts_with("x86_64") => "x86_64", // x86_64 | x86_64h
+ arch if arch.starts_with("i") && arch.ends_with("86") => "x86", // i386 | i586 | i686
+
+ "arm64ec" => "arm64ec", // https://github.com/rust-lang/rust/issues/131172
+ arch if arch.starts_with("aarch64") => "aarch64", // arm64e | arm64_32
+ arch if arch.starts_with("arm64") => "aarch64", // aarch64 | aarch64_be
+
+ arch if arch.starts_with("arm") => "arm", // arm | armv7s | armeb | ...
+ arch if arch.starts_with("thumb") => "arm", // thumbv4t | thumbv7a | thumbv8m | ...
+
+ arch if arch.starts_with("riscv64") => "riscv64",
+ arch if arch.starts_with("riscv32") => "riscv32",
+
+ arch if arch.starts_with("wasm64") => "wasm64",
+ arch if arch.starts_with("wasm32") => "wasm32", // wasm32 | wasm32v1
+ "asmjs" => "wasm32",
+
+ arch if arch.starts_with("nvptx64") => "nvptx64",
+ arch if arch.starts_with("nvptx") => "nvptx",
+
+ arch if arch.starts_with("bpf") => "bpf", // bpfeb | bpfel
+
+ // https://github.com/bytecodealliance/wasmtime/tree/v30.0.1/pulley
+ arch if arch.starts_with("pulley64") => "pulley64",
+ arch if arch.starts_with("pulley32") => "pulley32",
+
+ // https://github.com/Clever-ISA/Clever-ISA
+ arch if arch.starts_with("clever") => "clever",
+
+ "sparc" | "sparcv7" | "sparcv8" => "sparc",
+ "sparc64" | "sparcv9" => "sparc64",
+
+ "amdgcn" => "amdgpu",
+ "avr" => "avr",
+ "csky" => "csky",
+ "hexagon" => "hexagon",
+ "m68k" => "m68k",
+ "msp430" => "msp430",
+ "r600" => "r600",
+ "s390x" => "s390x",
+ "xtensa" => "xtensa",
+
+ _ => return None,
+ })
+}
+
+/// Parse environment and ABI from the last component of the target name.
+fn parse_envabi(last_component: &str) -> Option<(&str, &str)> {
+ let (env, abi) = match last_component {
+ // Combined environment and ABI
+
+ // gnullvm | gnueabi | gnueabihf | gnuabiv2 | gnuabi64 | gnuspe | gnux32 | gnu_ilp32
+ env_and_abi if env_and_abi.starts_with("gnu") => {
+ let abi = env_and_abi.strip_prefix("gnu").unwrap();
+ let abi = abi.strip_prefix("_").unwrap_or(abi);
+ ("gnu", abi)
+ }
+ // musl | musleabi | musleabihf | muslabi64 | muslspe
+ env_and_abi if env_and_abi.starts_with("musl") => {
+ ("musl", env_and_abi.strip_prefix("musl").unwrap())
+ }
+ // uclibc | uclibceabi | uclibceabihf
+ env_and_abi if env_and_abi.starts_with("uclibc") => {
+ ("uclibc", env_and_abi.strip_prefix("uclibc").unwrap())
+ }
+ // newlib | newlibeabihf
+ env_and_abi if env_and_abi.starts_with("newlib") => {
+ ("newlib", env_and_abi.strip_prefix("newlib").unwrap())
+ }
+
+ // Environments
+ "msvc" => ("msvc", ""),
+ "ohos" => ("ohos", ""),
+ "qnx700" => ("nto70", ""),
+ "qnx710_iosock" => ("nto71_iosock", ""),
+ "qnx710" => ("nto71", ""),
+ "qnx800" => ("nto80", ""),
+ "sgx" => ("sgx", ""),
+ "threads" => ("threads", ""),
+
+ // ABIs
+ "abi64" => ("", "abi64"),
+ "abiv2" => ("", "spe"),
+ "eabi" => ("", "eabi"),
+ "eabihf" => ("", "eabihf"),
+ "macabi" => ("", "macabi"),
+ "sim" => ("", "sim"),
+ "softfloat" => ("", "softfloat"),
+ "spe" => ("", "spe"),
+ "x32" => ("", "x32"),
+
+ // Badly named targets, ELF is already known from target OS.
+ // Probably too late to fix now though.
+ "elf" => ("", ""),
+ // Undesirable to expose to user code (yet):
+ // https://github.com/rust-lang/rust/pull/131166#issuecomment-2389541917
+ "freestanding" => ("", ""),
+
+ _ => return None,
+ };
+ Some((env, abi))
+}
+
+impl<'a> TargetInfo<'a> {
+ pub(crate) fn from_rustc_target(target: &'a str) -> Result<Self, Error> {
+ // FIXME(madsmtm): This target should be renamed, cannot be parsed
+ // with the means we do below (since `none` must not be interpreted
+ // as an env/ABI).
+ if target == "x86_64-unknown-linux-none" {
+ return Ok(Self {
+ full_arch: "x86_64",
+ arch: "x86_64",
+ vendor: "unknown",
+ os: "linux",
+ env: "",
+ abi: "",
+ });
+ }
+
+ let mut components = target.split('-');
+
+ // Insist that the target name contains at least a valid architecture.
+ let full_arch = components.next().ok_or(Error::new(
+ ErrorKind::InvalidTarget,
+ "target was empty".to_string(),
+ ))?;
+ let arch = parse_arch(full_arch).ok_or_else(|| {
+ Error::new(
+ ErrorKind::UnknownTarget,
+ format!("target `{target}` had an unknown architecture"),
+ )
+ })?;
+
+ // Newer target names have begun omitting the vendor, so the only
+ // component we know must be there is the OS name.
+ let components: Vec<_> = components.collect();
+ let (vendor, os, mut env, mut abi) = match &*components {
+ [] => {
+ return Err(Error::new(
+ ErrorKind::InvalidTarget,
+ format!("target `{target}` must have at least two components"),
+ ))
+ }
+ // Two components; format is `arch-os`.
+ [os] => ("unknown", *os, "", ""),
+ // The three-component case is a bit tricky to handle, it could
+ // either have the format `arch-vendor-os` or `arch-os-env+abi`.
+ [vendor_or_os, os_or_envabi] => {
+ // We differentiate between these by checking if the last
+ // component is an env/ABI; if it isn't, then it's probably
+ // an OS instead.
+ if let Some((env, abi)) = parse_envabi(os_or_envabi) {
+ ("unknown", *vendor_or_os, env, abi)
+ } else {
+ (*vendor_or_os, *os_or_envabi, "", "")
+ }
+ }
+ // Four components; format is `arch-vendor-os-env+abi`.
+ [vendor, os, envabi] => {
+ let (env, abi) = parse_envabi(envabi).ok_or_else(|| {
+ Error::new(
+ ErrorKind::UnknownTarget,
+ format!("unknown environment/ABI `{envabi}` in target `{target}`"),
+ )
+ })?;
+ (*vendor, *os, env, abi)
+ }
+ _ => {
+ return Err(Error::new(
+ ErrorKind::InvalidTarget,
+ format!("too many components in target `{target}`"),
+ ))
+ }
+ };
+
+ // Part of the architecture name is carried over into the ABI.
+ match full_arch {
+ // https://github.com/rust-lang/compiler-team/issues/830
+ arch if arch.starts_with("riscv32e") => {
+ abi = "ilp32e";
+ }
+ _ => {}
+ }
+
+ // Various environment/ABIs are determined based on OS name.
+ match os {
+ "3ds" | "rtems" | "espidf" => env = "newlib",
+ "vxworks" => env = "gnu",
+ "redox" => env = "relibc",
+ "aix" => abi = "vec-extabi",
+ _ => {}
+ }
+
+ // Extra overrides for badly named targets.
+ match target {
+ // Actually simulator targets.
+ "i386-apple-ios" | "x86_64-apple-ios" | "x86_64-apple-tvos" => {
+ abi = "sim";
+ }
+ // Name should've contained `muslabi64`.
+ "mips64-openwrt-linux-musl" => {
+ abi = "abi64";
+ }
+ // Specifies abi even though not in name.
+ "armv6-unknown-freebsd" | "armv6k-nintendo-3ds" | "armv7-unknown-freebsd" => {
+ abi = "eabihf";
+ }
+ // Specifies abi even though not in name.
+ "armv7-unknown-linux-ohos" | "armv7-unknown-trusty" => {
+ abi = "eabi";
+ }
+ _ => {}
+ }
+
+ let os = match os {
+ // Horizon is the common/internal OS name for 3DS and the Switch.
+ "3ds" | "switch" => "horizon",
+ // FIXME(madsmtm): macOS targets are badly named.
+ "darwin" => "macos",
+
+ // WASI targets contain the preview version in them too. Should've
+ // been `wasi-p1`/`wasi-p2`, but that's probably too late now.
+ os if os.starts_with("wasi") => {
+ env = os.strip_prefix("wasi").unwrap();
+ "wasi"
+ }
+ // FIXME(madsmtm): Badly named targets `*-linux-androideabi`,
+ // should be `*-android-eabi`.
+ "androideabi" => {
+ abi = "eabi";
+ "android"
+ }
+
+ os => os,
+ };
+
+ let vendor = match vendor {
+ // esp, esp32, esp32s2 etc.
+ vendor if vendor.starts_with("esp") => "espressif",
+ // FIXME(madsmtm): Badly named targets `*-linux-android*`,
+ // "linux" makes no sense as the vendor name.
+ "linux" if os == "android" || os == "androideabi" => "unknown",
+ // FIXME(madsmtm): Fix in `rustc` after
+ // https://github.com/rust-lang/compiler-team/issues/850.
+ "wali" => "unknown",
+ "lynx" => "unknown",
+ // Some Linux distributions set their name as the target vendor,
+ // so we have to assume that it can be an arbitary string.
+ vendor => vendor,
+ };
+
+ // Intentionally also marked as an ABI:
+ // https://github.com/rust-lang/rust/pull/86922
+ if vendor == "fortanix" {
+ abi = "fortanix";
+ }
+ if vendor == "uwp" {
+ abi = "uwp";
+ }
+
+ Ok(Self {
+ full_arch,
+ arch,
+ vendor,
+ os,
+ env,
+ abi,
+ })
+ }
+}
+
+#[cfg(test)]
+#[allow(unexpected_cfgs)]
+mod tests {
+ use std::process::Command;
+
+ use super::TargetInfo;
+ use crate::ErrorKind;
+
+ // Test tier 1 targets.
+ #[test]
+ fn tier1() {
+ let targets = [
+ "aarch64-unknown-linux-gnu",
+ "aarch64-apple-darwin",
+ "i686-pc-windows-gnu",
+ "i686-pc-windows-msvc",
+ "i686-unknown-linux-gnu",
+ "x86_64-apple-darwin",
+ "x86_64-pc-windows-gnu",
+ "x86_64-pc-windows-msvc",
+ "x86_64-unknown-linux-gnu",
+ ];
+
+ for target in targets {
+ // Check that they parse.
+ let _ = TargetInfo::from_rustc_target(target).unwrap();
+ }
+ }
+
+ // Various custom target names not (or no longer) known by `rustc`.
+ #[test]
+ fn parse_extra() {
+ let targets = [
+ "aarch64-unknown-none-gnu",
+ "aarch64-uwp-windows-gnu",
+ "arm-frc-linux-gnueabi",
+ "arm-unknown-netbsd-eabi",
+ "armv7neon-unknown-linux-gnueabihf",
+ "armv7neon-unknown-linux-musleabihf",
+ "thumbv7-unknown-linux-gnueabihf",
+ "thumbv7-unknown-linux-musleabihf",
+ "armv7-apple-ios",
+ "wasm32-wasi",
+ "x86_64-rumprun-netbsd",
+ "x86_64-unknown-linux",
+ "x86_64-alpine-linux-musl",
+ "x86_64-chimera-linux-musl",
+ "x86_64-foxkit-linux-musl",
+ "arm-poky-linux-gnueabi",
+ "x86_64-unknown-moturus",
+ ];
+
+ for target in targets {
+ // Check that they parse.
+ let _ = TargetInfo::from_rustc_target(target).unwrap();
+ }
+ }
+
+ fn target_from_rustc_cfgs<'a>(target: &'a str, cfgs: &'a str) -> TargetInfo<'a> {
+ // Cannot determine full architecture from cfgs.
+ let (full_arch, _rest) = target.split_once('-').expect("target to have arch");
+
+ let mut target = TargetInfo {
+ full_arch,
+ arch: "invalid-none-set",
+ vendor: "invalid-none-set",
+ os: "invalid-none-set",
+ env: "invalid-none-set",
+ // Not set in older Rust versions
+ abi: "",
+ };
+
+ for cfg in cfgs.lines() {
+ if let Some((name, value)) = cfg.split_once('=') {
+ // Remove whitespace, if `rustc` decided to insert any.
+ let name = name.trim();
+ let value = value.trim();
+
+ // Remove quotes around value.
+ let value = value.strip_prefix('"').unwrap_or(value);
+ let value = value.strip_suffix('"').unwrap_or(value);
+
+ match name {
+ "target_arch" => target.arch = value,
+ "target_vendor" => target.vendor = value,
+ "target_os" => target.os = value,
+ "target_env" => target.env = value,
+ "target_abi" => target.abi = value,
+ _ => {}
+ }
+ } else {
+ // Skip cfgs like `debug_assertions` and `unix`.
+ }
+ }
+
+ target
+ }
+
+ #[test]
+ fn unknown_env_determined_as_unknown() {
+ let err = TargetInfo::from_rustc_target("aarch64-unknown-linux-bogus").unwrap_err();
+ assert!(matches!(err.kind, ErrorKind::UnknownTarget));
+ }
+
+ // Used in .github/workflows/test-rustc-targets.yml
+ #[test]
+ #[cfg_attr(
+ not(rustc_target_test),
+ ignore = "must enable explicitly with --cfg=rustc_target_test"
+ )]
+ fn parse_rustc_targets() {
+ let rustc = std::env::var("RUSTC").unwrap_or_else(|_| "rustc".to_string());
+
+ let target_list = Command::new(&rustc)
+ .arg("--print=target-list")
+ .output()
+ .unwrap()
+ .stdout;
+ let target_list = String::from_utf8(target_list).unwrap();
+
+ let mut has_failure = false;
+ for target in target_list.lines() {
+ let cfgs = Command::new(&rustc)
+ .arg("--target")
+ .arg(target)
+ .arg("--print=cfg")
+ .output()
+ .unwrap()
+ .stdout;
+ let cfgs = String::from_utf8(cfgs).unwrap();
+
+ let expected = target_from_rustc_cfgs(target, &cfgs);
+ let actual = TargetInfo::from_rustc_target(target);
+
+ if Some(&expected) != actual.as_ref().ok() {
+ eprintln!("failed comparing {target}:");
+ eprintln!(" expected: Ok({expected:?})");
+ eprintln!(" actual: {actual:?}");
+ eprintln!();
+ has_failure = true;
+ }
+ }
+
+ if has_failure {
+ panic!("failed comparing targets");
+ }
+ }
+}
diff --git a/vendor/cc/src/tempfile.rs b/vendor/cc/src/tempfile.rs
new file mode 100644
index 00000000..833e6f28
--- /dev/null
+++ b/vendor/cc/src/tempfile.rs
@@ -0,0 +1,86 @@
+#![cfg_attr(target_family = "wasm", allow(unused))]
+
+use std::{
+ collections::hash_map::RandomState,
+ fs::{remove_file, File, OpenOptions},
+ hash::{BuildHasher, Hasher},
+ io, os,
+ path::{Path, PathBuf},
+};
+
+#[cfg(not(any(unix, target_family = "wasm", windows)))]
+compile_error!("Your system is not supported since cc cannot create named tempfile");
+
+fn rand() -> u64 {
+ RandomState::new().build_hasher().finish()
+}
+
+fn tmpname(suffix: &str) -> String {
+ format!("{}{}", rand(), suffix)
+}
+
+fn create_named(path: &Path) -> io::Result<File> {
+ let mut open_options = OpenOptions::new();
+
+ open_options.read(true).write(true).create_new(true);
+
+ #[cfg(all(unix, not(target_os = "wasi")))]
+ <OpenOptions as os::unix::fs::OpenOptionsExt>::mode(&mut open_options, 0o600);
+
+ #[cfg(windows)]
+ <OpenOptions as os::windows::fs::OpenOptionsExt>::custom_flags(
+ &mut open_options,
+ crate::windows::windows_sys::FILE_ATTRIBUTE_TEMPORARY,
+ );
+
+ open_options.open(path)
+}
+
+pub(super) struct NamedTempfile {
+ path: PathBuf,
+ file: Option<File>,
+}
+
+impl NamedTempfile {
+ pub(super) fn new(base: &Path, suffix: &str) -> io::Result<Self> {
+ for _ in 0..10 {
+ let path = base.join(tmpname(suffix));
+ match create_named(&path) {
+ Ok(file) => {
+ return Ok(Self {
+ file: Some(file),
+ path,
+ })
+ }
+ Err(e) if e.kind() == io::ErrorKind::AlreadyExists => continue,
+ Err(e) => return Err(e),
+ };
+ }
+
+ Err(io::Error::new(
+ io::ErrorKind::AlreadyExists,
+ format!(
+ "too many temporary files exist in base `{}` with suffix `{}`",
+ base.display(),
+ suffix
+ ),
+ ))
+ }
+
+ pub(super) fn path(&self) -> &Path {
+ &self.path
+ }
+
+ pub(super) fn take_file(&mut self) -> Option<File> {
+ self.file.take()
+ }
+}
+
+impl Drop for NamedTempfile {
+ fn drop(&mut self) {
+ // On Windows you have to close all handle to it before
+ // removing the file.
+ self.file.take();
+ let _ = remove_file(&self.path);
+ }
+}
diff --git a/vendor/cc/src/tool.rs b/vendor/cc/src/tool.rs
new file mode 100644
index 00000000..a7daf1b2
--- /dev/null
+++ b/vendor/cc/src/tool.rs
@@ -0,0 +1,552 @@
+use crate::{
+ command_helpers::{run_output, spawn, CargoOutput},
+ run,
+ tempfile::NamedTempfile,
+ Error, ErrorKind, OutputKind,
+};
+use std::io::Read;
+use std::{
+ borrow::Cow,
+ collections::HashMap,
+ env,
+ ffi::{OsStr, OsString},
+ io::Write,
+ path::{Path, PathBuf},
+ process::{Command, Stdio},
+ sync::RwLock,
+};
+
+pub(crate) type CompilerFamilyLookupCache = HashMap<Box<[Box<OsStr>]>, ToolFamily>;
+
+/// Configuration used to represent an invocation of a C compiler.
+///
+/// This can be used to figure out what compiler is in use, what the arguments
+/// to it are, and what the environment variables look like for the compiler.
+/// This can be used to further configure other build systems (e.g. forward
+/// along CC and/or CFLAGS) or the `to_command` method can be used to run the
+/// compiler itself.
+#[derive(Clone, Debug)]
+#[allow(missing_docs)]
+pub struct Tool {
+ pub(crate) path: PathBuf,
+ pub(crate) cc_wrapper_path: Option<PathBuf>,
+ pub(crate) cc_wrapper_args: Vec<OsString>,
+ pub(crate) args: Vec<OsString>,
+ pub(crate) env: Vec<(OsString, OsString)>,
+ pub(crate) family: ToolFamily,
+ pub(crate) cuda: bool,
+ pub(crate) removed_args: Vec<OsString>,
+ pub(crate) has_internal_target_arg: bool,
+}
+
+impl Tool {
+ pub(crate) fn new(
+ path: PathBuf,
+ cached_compiler_family: &RwLock<CompilerFamilyLookupCache>,
+ cargo_output: &CargoOutput,
+ out_dir: Option<&Path>,
+ ) -> Self {
+ Self::with_features(
+ path,
+ vec![],
+ false,
+ cached_compiler_family,
+ cargo_output,
+ out_dir,
+ )
+ }
+
+ pub(crate) fn with_args(
+ path: PathBuf,
+ args: Vec<String>,
+ cached_compiler_family: &RwLock<CompilerFamilyLookupCache>,
+ cargo_output: &CargoOutput,
+ out_dir: Option<&Path>,
+ ) -> Self {
+ Self::with_features(
+ path,
+ args,
+ false,
+ cached_compiler_family,
+ cargo_output,
+ out_dir,
+ )
+ }
+
+ /// Explicitly set the `ToolFamily`, skipping name-based detection.
+ pub(crate) fn with_family(path: PathBuf, family: ToolFamily) -> Self {
+ Self {
+ path,
+ cc_wrapper_path: None,
+ cc_wrapper_args: Vec::new(),
+ args: Vec::new(),
+ env: Vec::new(),
+ family,
+ cuda: false,
+ removed_args: Vec::new(),
+ has_internal_target_arg: false,
+ }
+ }
+
+ pub(crate) fn with_features(
+ path: PathBuf,
+ args: Vec<String>,
+ cuda: bool,
+ cached_compiler_family: &RwLock<CompilerFamilyLookupCache>,
+ cargo_output: &CargoOutput,
+ out_dir: Option<&Path>,
+ ) -> Self {
+ fn is_zig_cc(path: &Path, cargo_output: &CargoOutput) -> bool {
+ run_output(
+ Command::new(path).arg("--version"),
+ // tool detection issues should always be shown as warnings
+ cargo_output,
+ )
+ .map(|o| String::from_utf8_lossy(&o).contains("ziglang"))
+ .unwrap_or_default()
+ || {
+ match path.file_name().map(OsStr::to_string_lossy) {
+ Some(fname) => fname.contains("zig"),
+ _ => false,
+ }
+ }
+ }
+
+ fn guess_family_from_stdout(
+ stdout: &str,
+ path: &Path,
+ args: &[String],
+ cargo_output: &CargoOutput,
+ ) -> Result<ToolFamily, Error> {
+ cargo_output.print_debug(&stdout);
+
+ // https://gitlab.kitware.com/cmake/cmake/-/blob/69a2eeb9dff5b60f2f1e5b425002a0fd45b7cadb/Modules/CMakeDetermineCompilerId.cmake#L267-271
+ // stdin is set to null to ensure that the help output is never paginated.
+ let accepts_cl_style_flags = run(
+ Command::new(path).args(args).arg("-?").stdin(Stdio::null()),
+ &{
+ // the errors are not errors!
+ let mut cargo_output = cargo_output.clone();
+ cargo_output.warnings = cargo_output.debug;
+ cargo_output.output = OutputKind::Discard;
+ cargo_output
+ },
+ )
+ .is_ok();
+
+ let clang = stdout.contains(r#""clang""#);
+ let gcc = stdout.contains(r#""gcc""#);
+ let emscripten = stdout.contains(r#""emscripten""#);
+ let vxworks = stdout.contains(r#""VxWorks""#);
+
+ match (clang, accepts_cl_style_flags, gcc, emscripten, vxworks) {
+ (clang_cl, true, _, false, false) => Ok(ToolFamily::Msvc { clang_cl }),
+ (true, _, _, _, false) | (_, _, _, true, false) => Ok(ToolFamily::Clang {
+ zig_cc: is_zig_cc(path, cargo_output),
+ }),
+ (false, false, true, _, false) | (_, _, _, _, true) => Ok(ToolFamily::Gnu),
+ (false, false, false, false, false) => {
+ cargo_output.print_warning(&"Compiler family detection failed since it does not define `__clang__`, `__GNUC__`, `__EMSCRIPTEN__` or `__VXWORKS__`, also does not accept cl style flag `-?`, fallback to treating it as GNU");
+ Err(Error::new(
+ ErrorKind::ToolFamilyMacroNotFound,
+ "Expects macro `__clang__`, `__GNUC__` or `__EMSCRIPTEN__`, `__VXWORKS__` or accepts cl style flag `-?`, but found none",
+ ))
+ }
+ }
+ }
+
+ fn detect_family_inner(
+ path: &Path,
+ args: &[String],
+ cargo_output: &CargoOutput,
+ out_dir: Option<&Path>,
+ ) -> Result<ToolFamily, Error> {
+ let out_dir = out_dir
+ .map(Cow::Borrowed)
+ .unwrap_or_else(|| Cow::Owned(env::temp_dir()));
+
+ // Ensure all the parent directories exist otherwise temp file creation
+ // will fail
+ std::fs::create_dir_all(&out_dir).map_err(|err| Error {
+ kind: ErrorKind::IOError,
+ message: format!("failed to create OUT_DIR '{}': {}", out_dir.display(), err)
+ .into(),
+ })?;
+
+ let mut tmp =
+ NamedTempfile::new(&out_dir, "detect_compiler_family.c").map_err(|err| Error {
+ kind: ErrorKind::IOError,
+ message: format!(
+ "failed to create detect_compiler_family.c temp file in '{}': {}",
+ out_dir.display(),
+ err
+ )
+ .into(),
+ })?;
+ let mut tmp_file = tmp.take_file().unwrap();
+ tmp_file.write_all(include_bytes!("detect_compiler_family.c"))?;
+ // Close the file handle *now*, otherwise the compiler may fail to open it on Windows
+ // (#1082). The file stays on disk and its path remains valid until `tmp` is dropped.
+ tmp_file.flush()?;
+ tmp_file.sync_data()?;
+ drop(tmp_file);
+
+ // When expanding the file, the compiler prints a lot of information to stderr
+ // that it is not an error, but related to expanding itself.
+ //
+ // cc would have to disable warning here to prevent generation of too many warnings.
+ let mut compiler_detect_output = cargo_output.clone();
+ compiler_detect_output.warnings = compiler_detect_output.debug;
+
+ let mut cmd = Command::new(path);
+ cmd.arg("-E").arg(tmp.path());
+
+ // The -Wslash-u-filename warning is normally part of stdout.
+ // But with clang-cl it can be part of stderr instead and exit with a
+ // non-zero exit code.
+ let mut captured_cargo_output = compiler_detect_output.clone();
+ captured_cargo_output.output = OutputKind::Capture;
+ captured_cargo_output.warnings = true;
+ let mut child = spawn(&mut cmd, &captured_cargo_output)?;
+
+ let mut out = vec![];
+ let mut err = vec![];
+ child.stdout.take().unwrap().read_to_end(&mut out)?;
+ child.stderr.take().unwrap().read_to_end(&mut err)?;
+
+ let status = child.wait()?;
+
+ let stdout = if [&out, &err]
+ .iter()
+ .any(|o| String::from_utf8_lossy(o).contains("-Wslash-u-filename"))
+ {
+ run_output(
+ Command::new(path).arg("-E").arg("--").arg(tmp.path()),
+ &compiler_detect_output,
+ )?
+ } else {
+ if !status.success() {
+ return Err(Error::new(
+ ErrorKind::ToolExecError,
+ format!(
+ "command did not execute successfully (status code {status}): {cmd:?}"
+ ),
+ ));
+ }
+
+ out
+ };
+
+ let stdout = String::from_utf8_lossy(&stdout);
+ guess_family_from_stdout(&stdout, path, args, cargo_output)
+ }
+ let detect_family = |path: &Path, args: &[String]| -> Result<ToolFamily, Error> {
+ let cache_key = [path.as_os_str()]
+ .iter()
+ .cloned()
+ .chain(args.iter().map(OsStr::new))
+ .map(Into::into)
+ .collect();
+ if let Some(family) = cached_compiler_family.read().unwrap().get(&cache_key) {
+ return Ok(*family);
+ }
+
+ let family = detect_family_inner(path, args, cargo_output, out_dir)?;
+ cached_compiler_family
+ .write()
+ .unwrap()
+ .insert(cache_key, family);
+ Ok(family)
+ };
+
+ let family = detect_family(&path, &args).unwrap_or_else(|e| {
+ cargo_output.print_warning(&format_args!(
+ "Compiler family detection failed due to error: {}",
+ e
+ ));
+ match path.file_name().map(OsStr::to_string_lossy) {
+ Some(fname) if fname.contains("clang-cl") => ToolFamily::Msvc { clang_cl: true },
+ Some(fname) if fname.ends_with("cl") || fname == "cl.exe" => {
+ ToolFamily::Msvc { clang_cl: false }
+ }
+ Some(fname) if fname.contains("clang") => {
+ let is_clang_cl = args
+ .iter()
+ .any(|a| a.strip_prefix("--driver-mode=") == Some("cl"));
+ if is_clang_cl {
+ ToolFamily::Msvc { clang_cl: true }
+ } else {
+ ToolFamily::Clang {
+ zig_cc: is_zig_cc(&path, cargo_output),
+ }
+ }
+ }
+ Some(fname) if fname.contains("zig") => ToolFamily::Clang { zig_cc: true },
+ _ => ToolFamily::Gnu,
+ }
+ });
+
+ Tool {
+ path,
+ cc_wrapper_path: None,
+ cc_wrapper_args: Vec::new(),
+ args: Vec::new(),
+ env: Vec::new(),
+ family,
+ cuda,
+ removed_args: Vec::new(),
+ has_internal_target_arg: false,
+ }
+ }
+
+ /// Add an argument to be stripped from the final command arguments.
+ pub(crate) fn remove_arg(&mut self, flag: OsString) {
+ self.removed_args.push(flag);
+ }
+
+ /// Push an "exotic" flag to the end of the compiler's arguments list.
+ ///
+ /// Nvidia compiler accepts only the most common compiler flags like `-D`,
+ /// `-I`, `-c`, etc. Options meant specifically for the underlying
+ /// host C++ compiler have to be prefixed with `-Xcompiler`.
+ /// [Another possible future application for this function is passing
+ /// clang-specific flags to clang-cl, which otherwise accepts only
+ /// MSVC-specific options.]
+ pub(crate) fn push_cc_arg(&mut self, flag: OsString) {
+ if self.cuda {
+ self.args.push("-Xcompiler".into());
+ }
+ self.args.push(flag);
+ }
+
+ /// Checks if an argument or flag has already been specified or conflicts.
+ ///
+ /// Currently only checks optimization flags.
+ pub(crate) fn is_duplicate_opt_arg(&self, flag: &OsString) -> bool {
+ let flag = flag.to_str().unwrap();
+ let mut chars = flag.chars();
+
+ // Only duplicate check compiler flags
+ if self.is_like_msvc() {
+ if chars.next() != Some('/') {
+ return false;
+ }
+ } else if (self.is_like_gnu() || self.is_like_clang()) && chars.next() != Some('-') {
+ return false;
+ }
+
+ // Check for existing optimization flags (-O, /O)
+ if chars.next() == Some('O') {
+ return self
+ .args()
+ .iter()
+ .any(|a| a.to_str().unwrap_or("").chars().nth(1) == Some('O'));
+ }
+
+ // TODO Check for existing -m..., -m...=..., /arch:... flags
+ false
+ }
+
+ /// Don't push optimization arg if it conflicts with existing args.
+ pub(crate) fn push_opt_unless_duplicate(&mut self, flag: OsString) {
+ if self.is_duplicate_opt_arg(&flag) {
+ eprintln!("Info: Ignoring duplicate arg {:?}", &flag);
+ } else {
+ self.push_cc_arg(flag);
+ }
+ }
+
+ /// Converts this compiler into a `Command` that's ready to be run.
+ ///
+ /// This is useful for when the compiler needs to be executed and the
+ /// command returned will already have the initial arguments and environment
+ /// variables configured.
+ pub fn to_command(&self) -> Command {
+ let mut cmd = match self.cc_wrapper_path {
+ Some(ref cc_wrapper_path) => {
+ let mut cmd = Command::new(cc_wrapper_path);
+ cmd.arg(&self.path);
+ cmd
+ }
+ None => Command::new(&self.path),
+ };
+ cmd.args(&self.cc_wrapper_args);
+
+ let value = self
+ .args
+ .iter()
+ .filter(|a| !self.removed_args.contains(a))
+ .collect::<Vec<_>>();
+ cmd.args(&value);
+
+ for (k, v) in self.env.iter() {
+ cmd.env(k, v);
+ }
+ cmd
+ }
+
+ /// Returns the path for this compiler.
+ ///
+ /// Note that this may not be a path to a file on the filesystem, e.g. "cc",
+ /// but rather something which will be resolved when a process is spawned.
+ pub fn path(&self) -> &Path {
+ &self.path
+ }
+
+ /// Returns the default set of arguments to the compiler needed to produce
+ /// executables for the target this compiler generates.
+ pub fn args(&self) -> &[OsString] {
+ &self.args
+ }
+
+ /// Returns the set of environment variables needed for this compiler to
+ /// operate.
+ ///
+ /// This is typically only used for MSVC compilers currently.
+ pub fn env(&self) -> &[(OsString, OsString)] {
+ &self.env
+ }
+
+ /// Returns the compiler command in format of CC environment variable.
+ /// Or empty string if CC env was not present
+ ///
+ /// This is typically used by configure script
+ pub fn cc_env(&self) -> OsString {
+ match self.cc_wrapper_path {
+ Some(ref cc_wrapper_path) => {
+ let mut cc_env = cc_wrapper_path.as_os_str().to_owned();
+ cc_env.push(" ");
+ cc_env.push(self.path.to_path_buf().into_os_string());
+ for arg in self.cc_wrapper_args.iter() {
+ cc_env.push(" ");
+ cc_env.push(arg);
+ }
+ cc_env
+ }
+ None => OsString::from(""),
+ }
+ }
+
+ /// Returns the compiler flags in format of CFLAGS environment variable.
+ /// Important here - this will not be CFLAGS from env, its internal gcc's flags to use as CFLAGS
+ /// This is typically used by configure script
+ pub fn cflags_env(&self) -> OsString {
+ let mut flags = OsString::new();
+ for (i, arg) in self.args.iter().enumerate() {
+ if i > 0 {
+ flags.push(" ");
+ }
+ flags.push(arg);
+ }
+ flags
+ }
+
+ /// Whether the tool is GNU Compiler Collection-like.
+ pub fn is_like_gnu(&self) -> bool {
+ self.family == ToolFamily::Gnu
+ }
+
+ /// Whether the tool is Clang-like.
+ pub fn is_like_clang(&self) -> bool {
+ matches!(self.family, ToolFamily::Clang { .. })
+ }
+
+ /// Whether the tool is AppleClang under .xctoolchain
+ #[cfg(target_vendor = "apple")]
+ pub(crate) fn is_xctoolchain_clang(&self) -> bool {
+ let path = self.path.to_string_lossy();
+ path.contains(".xctoolchain/")
+ }
+ #[cfg(not(target_vendor = "apple"))]
+ pub(crate) fn is_xctoolchain_clang(&self) -> bool {
+ false
+ }
+
+ /// Whether the tool is MSVC-like.
+ pub fn is_like_msvc(&self) -> bool {
+ matches!(self.family, ToolFamily::Msvc { .. })
+ }
+
+ /// Whether the tool is `clang-cl`-based MSVC-like.
+ pub fn is_like_clang_cl(&self) -> bool {
+ matches!(self.family, ToolFamily::Msvc { clang_cl: true })
+ }
+
+ /// Supports using `--` delimiter to separate arguments and path to source files.
+ pub(crate) fn supports_path_delimiter(&self) -> bool {
+ // homebrew clang and zig-cc does not support this while stock version does
+ matches!(self.family, ToolFamily::Msvc { clang_cl: true }) && !self.cuda
+ }
+}
+
+/// Represents the family of tools this tool belongs to.
+///
+/// Each family of tools differs in how and what arguments they accept.
+///
+/// Detection of a family is done on best-effort basis and may not accurately reflect the tool.
+#[derive(Copy, Clone, Debug, PartialEq)]
+pub enum ToolFamily {
+ /// Tool is GNU Compiler Collection-like.
+ Gnu,
+ /// Tool is Clang-like. It differs from the GCC in a sense that it accepts superset of flags
+ /// and its cross-compilation approach is different.
+ Clang { zig_cc: bool },
+ /// Tool is the MSVC cl.exe.
+ Msvc { clang_cl: bool },
+}
+
+impl ToolFamily {
+ /// What the flag to request debug info for this family of tools look like
+ pub(crate) fn add_debug_flags(&self, cmd: &mut Tool, dwarf_version: Option<u32>) {
+ match *self {
+ ToolFamily::Msvc { .. } => {
+ cmd.push_cc_arg("-Z7".into());
+ }
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => {
+ cmd.push_cc_arg(
+ dwarf_version
+ .map_or_else(|| "-g".into(), |v| format!("-gdwarf-{}", v))
+ .into(),
+ );
+ }
+ }
+ }
+
+ /// What the flag to force frame pointers.
+ pub(crate) fn add_force_frame_pointer(&self, cmd: &mut Tool) {
+ match *self {
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => {
+ cmd.push_cc_arg("-fno-omit-frame-pointer".into());
+ }
+ _ => (),
+ }
+ }
+
+ /// What the flags to enable all warnings
+ pub(crate) fn warnings_flags(&self) -> &'static str {
+ match *self {
+ ToolFamily::Msvc { .. } => "-W4",
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => "-Wall",
+ }
+ }
+
+ /// What the flags to enable extra warnings
+ pub(crate) fn extra_warnings_flags(&self) -> Option<&'static str> {
+ match *self {
+ ToolFamily::Msvc { .. } => None,
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => Some("-Wextra"),
+ }
+ }
+
+ /// What the flag to turn warning into errors
+ pub(crate) fn warnings_to_errors_flag(&self) -> &'static str {
+ match *self {
+ ToolFamily::Msvc { .. } => "-WX",
+ ToolFamily::Gnu | ToolFamily::Clang { .. } => "-Werror",
+ }
+ }
+
+ pub(crate) fn verbose_stderr(&self) -> bool {
+ matches!(*self, ToolFamily::Clang { .. })
+ }
+}
diff --git a/vendor/cc/src/utilities.rs b/vendor/cc/src/utilities.rs
new file mode 100644
index 00000000..7a8a9493
--- /dev/null
+++ b/vendor/cc/src/utilities.rs
@@ -0,0 +1,130 @@
+use std::{
+ cell::UnsafeCell,
+ ffi::OsStr,
+ fmt::{self, Write},
+ marker::PhantomData,
+ mem::MaybeUninit,
+ panic::{RefUnwindSafe, UnwindSafe},
+ path::Path,
+ sync::Once,
+};
+
+pub(super) struct JoinOsStrs<'a, T> {
+ pub(super) slice: &'a [T],
+ pub(super) delimiter: char,
+}
+
+impl<T> fmt::Display for JoinOsStrs<'_, T>
+where
+ T: AsRef<OsStr>,
+{
+ fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
+ let len = self.slice.len();
+ for (index, os_str) in self.slice.iter().enumerate() {
+ // TODO: Use OsStr::display once it is stablised,
+ // Path and OsStr has the same `Display` impl
+ write!(f, "{}", Path::new(os_str).display())?;
+ if index + 1 < len {
+ f.write_char(self.delimiter)?;
+ }
+ }
+ Ok(())
+ }
+}
+
+pub(super) struct OptionOsStrDisplay<T>(pub(super) Option<T>);
+
+impl<T> fmt::Display for OptionOsStrDisplay<T>
+where
+ T: AsRef<OsStr>,
+{
+ fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
+ // TODO: Use OsStr::display once it is stablised
+ // Path and OsStr has the same `Display` impl
+ if let Some(os_str) = self.0.as_ref() {
+ write!(f, "Some({})", Path::new(os_str).display())
+ } else {
+ f.write_str("None")
+ }
+ }
+}
+
+pub(crate) struct OnceLock<T> {
+ once: Once,
+ value: UnsafeCell<MaybeUninit<T>>,
+ _marker: PhantomData<T>,
+}
+
+impl<T> Default for OnceLock<T> {
+ fn default() -> Self {
+ Self::new()
+ }
+}
+
+impl<T> OnceLock<T> {
+ pub(crate) const fn new() -> Self {
+ Self {
+ once: Once::new(),
+ value: UnsafeCell::new(MaybeUninit::uninit()),
+ _marker: PhantomData,
+ }
+ }
+
+ #[inline]
+ fn is_initialized(&self) -> bool {
+ self.once.is_completed()
+ }
+
+ unsafe fn get_unchecked(&self) -> &T {
+ debug_assert!(self.is_initialized());
+ #[allow(clippy::needless_borrow)]
+ #[allow(unused_unsafe)]
+ unsafe {
+ (&*self.value.get()).assume_init_ref()
+ }
+ }
+
+ pub(crate) fn get_or_init(&self, f: impl FnOnce() -> T) -> &T {
+ self.once.call_once(|| {
+ unsafe { &mut *self.value.get() }.write(f());
+ });
+ unsafe { self.get_unchecked() }
+ }
+
+ pub(crate) fn get(&self) -> Option<&T> {
+ if self.is_initialized() {
+ // Safe b/c checked is_initialized
+ Some(unsafe { self.get_unchecked() })
+ } else {
+ None
+ }
+ }
+}
+
+impl<T: fmt::Debug> fmt::Debug for OnceLock<T> {
+ fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
+ let mut d = f.debug_tuple("OnceLock");
+ match self.get() {
+ Some(v) => d.field(v),
+ None => d.field(&format_args!("<uninit>")),
+ };
+ d.finish()
+ }
+}
+
+unsafe impl<T: Sync + Send> Sync for OnceLock<T> {}
+unsafe impl<T: Send> Send for OnceLock<T> {}
+
+impl<T: RefUnwindSafe + UnwindSafe> RefUnwindSafe for OnceLock<T> {}
+impl<T: UnwindSafe> UnwindSafe for OnceLock<T> {}
+
+impl<T> Drop for OnceLock<T> {
+ #[inline]
+ fn drop(&mut self) {
+ if self.once.is_completed() {
+ // SAFETY: The cell is initialized and being dropped, so it can't
+ // be accessed again.
+ unsafe { self.value.get_mut().assume_init_drop() };
+ }
+ }
+}
diff --git a/vendor/cc/src/windows/com.rs b/vendor/cc/src/windows/com.rs
new file mode 100644
index 00000000..0391b5af
--- /dev/null
+++ b/vendor/cc/src/windows/com.rs
@@ -0,0 +1,110 @@
+// Copyright © 2017 winapi-rs developers
+// Licensed under the Apache License, Version 2.0
+// <LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
+// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your option.
+// All files in the project carrying such notice may not be copied, modified, or distributed
+// except according to those terms.
+
+use crate::windows::{
+ winapi::{IUnknown, Interface},
+ windows_sys::{
+ CoInitializeEx, SysFreeString, SysStringLen, BSTR, COINIT_MULTITHREADED, HRESULT, S_FALSE,
+ S_OK,
+ },
+};
+use std::{
+ convert::TryInto,
+ ffi::OsString,
+ ops::Deref,
+ os::windows::ffi::OsStringExt,
+ ptr::{null, null_mut},
+ slice::from_raw_parts,
+};
+
+pub fn initialize() -> Result<(), HRESULT> {
+ let err = unsafe { CoInitializeEx(null(), COINIT_MULTITHREADED.try_into().unwrap()) };
+ if err != S_OK && err != S_FALSE {
+ // S_FALSE just means COM is already initialized
+ Err(err)
+ } else {
+ Ok(())
+ }
+}
+
+pub struct ComPtr<T>(*mut T)
+where
+ T: Interface;
+impl<T> ComPtr<T>
+where
+ T: Interface,
+{
+ /// Creates a `ComPtr` to wrap a raw pointer.
+ /// It takes ownership over the pointer which means it does __not__ call `AddRef`.
+ /// `T` __must__ be a COM interface that inherits from `IUnknown`.
+ pub unsafe fn from_raw(ptr: *mut T) -> ComPtr<T> {
+ assert!(!ptr.is_null());
+ ComPtr(ptr)
+ }
+ /// For internal use only.
+ fn as_unknown(&self) -> &IUnknown {
+ unsafe { &*(self.0 as *mut IUnknown) }
+ }
+ /// Performs `QueryInterface` fun.
+ pub fn cast<U>(&self) -> Result<ComPtr<U>, i32>
+ where
+ U: Interface,
+ {
+ let mut obj = null_mut();
+ let err = unsafe { self.as_unknown().QueryInterface(&U::uuidof(), &mut obj) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(unsafe { ComPtr::from_raw(obj as *mut U) })
+ }
+}
+impl<T> Deref for ComPtr<T>
+where
+ T: Interface,
+{
+ type Target = T;
+ fn deref(&self) -> &T {
+ unsafe { &*self.0 }
+ }
+}
+impl<T> Clone for ComPtr<T>
+where
+ T: Interface,
+{
+ fn clone(&self) -> Self {
+ unsafe {
+ self.as_unknown().AddRef();
+ ComPtr::from_raw(self.0)
+ }
+ }
+}
+impl<T> Drop for ComPtr<T>
+where
+ T: Interface,
+{
+ fn drop(&mut self) {
+ unsafe {
+ self.as_unknown().Release();
+ }
+ }
+}
+pub struct BStr(BSTR);
+impl BStr {
+ pub unsafe fn from_raw(s: BSTR) -> BStr {
+ BStr(s)
+ }
+ pub fn to_osstring(&self) -> OsString {
+ let len = unsafe { SysStringLen(self.0) };
+ let slice = unsafe { from_raw_parts(self.0, len as usize) };
+ OsStringExt::from_wide(slice)
+ }
+}
+impl Drop for BStr {
+ fn drop(&mut self) {
+ unsafe { SysFreeString(self.0) };
+ }
+}
diff --git a/vendor/cc/src/windows/find_tools.rs b/vendor/cc/src/windows/find_tools.rs
new file mode 100644
index 00000000..ec7c786c
--- /dev/null
+++ b/vendor/cc/src/windows/find_tools.rs
@@ -0,0 +1,1238 @@
+// Copyright 2015 The Rust Project Developers. See the COPYRIGHT
+// file at the top-level directory of this distribution and at
+// http://rust-lang.org/COPYRIGHT.
+//
+// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
+// https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
+// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your
+// option. This file may not be copied, modified, or distributed
+// except according to those terms.
+
+//! A helper module to looking for windows-specific tools:
+//! 1. On Windows host, probe the Windows Registry if needed;
+//! 2. On non-Windows host, check specified environment variables.
+
+#![allow(clippy::upper_case_acronyms)]
+
+use std::{
+ env,
+ ffi::{OsStr, OsString},
+ ops::Deref,
+ path::PathBuf,
+ process::Command,
+ sync::Arc,
+};
+
+use crate::Tool;
+use crate::ToolFamily;
+
+const MSVC_FAMILY: ToolFamily = ToolFamily::Msvc { clang_cl: false };
+
+/// The target provided by the user.
+#[derive(Copy, Clone, PartialEq, Eq)]
+enum TargetArch {
+ X86,
+ X64,
+ Arm,
+ Arm64,
+ Arm64ec,
+}
+impl TargetArch {
+ /// Parse the `TargetArch` from a str. Returns `None` if the arch is unrecognized.
+ fn new(arch: &str) -> Option<Self> {
+ // NOTE: Keep up to date with docs in [`find`].
+ match arch {
+ "x64" | "x86_64" => Some(Self::X64),
+ "arm64" | "aarch64" => Some(Self::Arm64),
+ "arm64ec" => Some(Self::Arm64ec),
+ "x86" | "i686" | "i586" => Some(Self::X86),
+ "arm" | "thumbv7a" => Some(Self::Arm),
+ _ => None,
+ }
+ }
+
+ #[cfg(windows)]
+ /// Gets the Visual Studio name for the architecture.
+ fn as_vs_arch(&self) -> &'static str {
+ match self {
+ Self::X64 => "x64",
+ Self::Arm64 | Self::Arm64ec => "arm64",
+ Self::X86 => "x86",
+ Self::Arm => "arm",
+ }
+ }
+}
+
+pub(crate) enum Env {
+ Owned(OsString),
+ Arced(Arc<OsStr>),
+}
+
+impl AsRef<OsStr> for Env {
+ fn as_ref(&self) -> &OsStr {
+ self.deref()
+ }
+}
+
+impl Deref for Env {
+ type Target = OsStr;
+
+ fn deref(&self) -> &Self::Target {
+ match self {
+ Env::Owned(os_str) => os_str,
+ Env::Arced(os_str) => os_str,
+ }
+ }
+}
+
+impl From<Env> for PathBuf {
+ fn from(env: Env) -> Self {
+ match env {
+ Env::Owned(os_str) => PathBuf::from(os_str),
+ Env::Arced(os_str) => PathBuf::from(os_str.deref()),
+ }
+ }
+}
+
+pub(crate) trait EnvGetter {
+ fn get_env(&self, name: &'static str) -> Option<Env>;
+}
+
+struct StdEnvGetter;
+
+impl EnvGetter for StdEnvGetter {
+ #[allow(clippy::disallowed_methods)]
+ fn get_env(&self, name: &'static str) -> Option<Env> {
+ env::var_os(name).map(Env::Owned)
+ }
+}
+
+/// Attempts to find a tool within an MSVC installation using the Windows
+/// registry as a point to search from.
+///
+/// The `arch_or_target` argument is the architecture or the Rust target name
+/// that the tool should work for (e.g. compile or link for). The supported
+/// architecture names are:
+/// - `"x64"` or `"x86_64"`
+/// - `"arm64"` or `"aarch64"`
+/// - `"arm64ec"`
+/// - `"x86"`, `"i586"` or `"i686"`
+/// - `"arm"` or `"thumbv7a"`
+///
+/// The `tool` argument is the tool to find (e.g. `cl.exe` or `link.exe`).
+///
+/// This function will return `None` if the tool could not be found, or it will
+/// return `Some(cmd)` which represents a command that's ready to execute the
+/// tool with the appropriate environment variables set.
+///
+/// Note that this function always returns `None` for non-MSVC targets (if a
+/// full target name was specified).
+pub fn find(arch_or_target: &str, tool: &str) -> Option<Command> {
+ find_tool(arch_or_target, tool).map(|c| c.to_command())
+}
+
+/// Similar to the `find` function above, this function will attempt the same
+/// operation (finding a MSVC tool in a local install) but instead returns a
+/// `Tool` which may be introspected.
+pub fn find_tool(arch_or_target: &str, tool: &str) -> Option<Tool> {
+ let full_arch = if let Some((full_arch, rest)) = arch_or_target.split_once("-") {
+ // The logic is all tailored for MSVC, if the target is not that then
+ // bail out early.
+ if !rest.contains("msvc") {
+ return None;
+ }
+ full_arch
+ } else {
+ arch_or_target
+ };
+ find_tool_inner(full_arch, tool, &StdEnvGetter)
+}
+
+pub(crate) fn find_tool_inner(
+ full_arch: &str,
+ tool: &str,
+ env_getter: &dyn EnvGetter,
+) -> Option<Tool> {
+ // We only need the arch.
+ let target = TargetArch::new(full_arch)?;
+
+ // Looks like msbuild isn't located in the same location as other tools like
+ // cl.exe and lib.exe.
+ if tool.contains("msbuild") {
+ return impl_::find_msbuild(target, env_getter);
+ }
+
+ // Looks like devenv isn't located in the same location as other tools like
+ // cl.exe and lib.exe.
+ if tool.contains("devenv") {
+ return impl_::find_devenv(target, env_getter);
+ }
+
+ // Ok, if we're here, now comes the fun part of the probing. Default shells
+ // or shells like MSYS aren't really configured to execute `cl.exe` and the
+ // various compiler tools shipped as part of Visual Studio. Here we try to
+ // first find the relevant tool, then we also have to be sure to fill in
+ // environment variables like `LIB`, `INCLUDE`, and `PATH` to ensure that
+ // the tool is actually usable.
+
+ impl_::find_msvc_environment(tool, target, env_getter)
+ .or_else(|| impl_::find_msvc_15plus(tool, target, env_getter))
+ .or_else(|| impl_::find_msvc_14(tool, target, env_getter))
+}
+
+/// A version of Visual Studio
+#[derive(Debug, PartialEq, Eq, Copy, Clone)]
+#[non_exhaustive]
+pub enum VsVers {
+ /// Visual Studio 12 (2013)
+ #[deprecated(
+ note = "Visual Studio 12 is no longer supported. cc will never return this value."
+ )]
+ Vs12,
+ /// Visual Studio 14 (2015)
+ Vs14,
+ /// Visual Studio 15 (2017)
+ Vs15,
+ /// Visual Studio 16 (2019)
+ Vs16,
+ /// Visual Studio 17 (2022)
+ Vs17,
+}
+
+/// Find the most recent installed version of Visual Studio
+///
+/// This is used by the cmake crate to figure out the correct
+/// generator.
+#[allow(clippy::disallowed_methods)]
+pub fn find_vs_version() -> Result<VsVers, String> {
+ fn has_msbuild_version(version: &str) -> bool {
+ impl_::has_msbuild_version(version, &StdEnvGetter)
+ }
+
+ match std::env::var("VisualStudioVersion") {
+ Ok(version) => match &version[..] {
+ "17.0" => Ok(VsVers::Vs17),
+ "16.0" => Ok(VsVers::Vs16),
+ "15.0" => Ok(VsVers::Vs15),
+ "14.0" => Ok(VsVers::Vs14),
+ vers => Err(format!(
+ "\n\n\
+ unsupported or unknown VisualStudio version: {}\n\
+ if another version is installed consider running \
+ the appropriate vcvars script before building this \
+ crate\n\
+ ",
+ vers
+ )),
+ },
+ _ => {
+ // Check for the presence of a specific registry key
+ // that indicates visual studio is installed.
+ if has_msbuild_version("17.0") {
+ Ok(VsVers::Vs17)
+ } else if has_msbuild_version("16.0") {
+ Ok(VsVers::Vs16)
+ } else if has_msbuild_version("15.0") {
+ Ok(VsVers::Vs15)
+ } else if has_msbuild_version("14.0") {
+ Ok(VsVers::Vs14)
+ } else {
+ Err("\n\n\
+ couldn't determine visual studio generator\n\
+ if VisualStudio is installed, however, consider \
+ running the appropriate vcvars script before building \
+ this crate\n\
+ "
+ .to_string())
+ }
+ }
+ }
+}
+
+/// Windows Implementation.
+#[cfg(windows)]
+mod impl_ {
+ use crate::windows::com;
+ use crate::windows::registry::{RegistryKey, LOCAL_MACHINE};
+ use crate::windows::setup_config::SetupConfiguration;
+ use crate::windows::vs_instances::{VsInstances, VswhereInstance};
+ use crate::windows::windows_sys::{
+ GetMachineTypeAttributes, GetProcAddress, LoadLibraryA, UserEnabled, HMODULE,
+ IMAGE_FILE_MACHINE_AMD64, MACHINE_ATTRIBUTES, S_OK,
+ };
+ use std::convert::TryFrom;
+ use std::env;
+ use std::ffi::OsString;
+ use std::fs::File;
+ use std::io::Read;
+ use std::iter;
+ use std::mem;
+ use std::path::{Path, PathBuf};
+ use std::process::Command;
+ use std::str::FromStr;
+ use std::sync::atomic::{AtomicBool, Ordering};
+ use std::sync::Once;
+
+ use super::{EnvGetter, TargetArch, MSVC_FAMILY};
+ use crate::Tool;
+
+ struct MsvcTool {
+ tool: PathBuf,
+ libs: Vec<PathBuf>,
+ path: Vec<PathBuf>,
+ include: Vec<PathBuf>,
+ }
+
+ struct LibraryHandle(HMODULE);
+
+ impl LibraryHandle {
+ fn new(name: &[u8]) -> Option<Self> {
+ let handle = unsafe { LoadLibraryA(name.as_ptr() as _) };
+ (!handle.is_null()).then_some(Self(handle))
+ }
+
+ /// Get a function pointer to a function in the library.
+ /// # SAFETY
+ ///
+ /// The caller must ensure that the function signature matches the actual function.
+ /// The easiest way to do this is to add an entry to `windows_sys_no_link.list` and use the
+ /// generated function for `func_signature`.
+ ///
+ /// The function returned cannot be used after the handle is dropped.
+ unsafe fn get_proc_address<F>(&self, name: &[u8]) -> Option<F> {
+ let symbol = GetProcAddress(self.0, name.as_ptr() as _);
+ symbol.map(|symbol| mem::transmute_copy(&symbol))
+ }
+ }
+
+ type GetMachineTypeAttributesFuncType =
+ unsafe extern "system" fn(u16, *mut MACHINE_ATTRIBUTES) -> i32;
+ const _: () = {
+ // Ensure that our hand-written signature matches the actual function signature.
+ // We can't use `GetMachineTypeAttributes` outside of a const scope otherwise we'll end up statically linking to
+ // it, which will fail to load on older versions of Windows.
+ let _: GetMachineTypeAttributesFuncType = GetMachineTypeAttributes;
+ };
+
+ fn is_amd64_emulation_supported_inner() -> Option<bool> {
+ // GetMachineTypeAttributes is only available on Win11 22000+, so dynamically load it.
+ let kernel32 = LibraryHandle::new(b"kernel32.dll\0")?;
+ // SAFETY: GetMachineTypeAttributesFuncType is checked to match the real function signature.
+ let get_machine_type_attributes = unsafe {
+ kernel32
+ .get_proc_address::<GetMachineTypeAttributesFuncType>(b"GetMachineTypeAttributes\0")
+ }?;
+ let mut attributes = Default::default();
+ if unsafe { get_machine_type_attributes(IMAGE_FILE_MACHINE_AMD64, &mut attributes) } == S_OK
+ {
+ Some((attributes & UserEnabled) != 0)
+ } else {
+ Some(false)
+ }
+ }
+
+ fn is_amd64_emulation_supported() -> bool {
+ // TODO: Replace with a OnceLock once MSRV is 1.70.
+ static LOAD_VALUE: Once = Once::new();
+ static IS_SUPPORTED: AtomicBool = AtomicBool::new(false);
+
+ // Using Relaxed ordering since the Once is providing synchronization.
+ LOAD_VALUE.call_once(|| {
+ IS_SUPPORTED.store(
+ is_amd64_emulation_supported_inner().unwrap_or(false),
+ Ordering::Relaxed,
+ );
+ });
+ IS_SUPPORTED.load(Ordering::Relaxed)
+ }
+
+ impl MsvcTool {
+ fn new(tool: PathBuf) -> MsvcTool {
+ MsvcTool {
+ tool,
+ libs: Vec::new(),
+ path: Vec::new(),
+ include: Vec::new(),
+ }
+ }
+
+ fn into_tool(self, env_getter: &dyn EnvGetter) -> Tool {
+ let MsvcTool {
+ tool,
+ libs,
+ path,
+ include,
+ } = self;
+ let mut tool = Tool::with_family(tool, MSVC_FAMILY);
+ add_env(&mut tool, "LIB", libs, env_getter);
+ add_env(&mut tool, "PATH", path, env_getter);
+ add_env(&mut tool, "INCLUDE", include, env_getter);
+ tool
+ }
+ }
+
+ /// Checks to see if the target's arch matches the VS environment. Returns `None` if the
+ /// environment is unknown.
+ fn is_vscmd_target(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<bool> {
+ is_vscmd_target_env(target, env_getter).or_else(|| is_vscmd_target_cl(target, env_getter))
+ }
+
+ /// Checks to see if the `VSCMD_ARG_TGT_ARCH` environment variable matches the
+ /// given target's arch. Returns `None` if the variable does not exist.
+ fn is_vscmd_target_env(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<bool> {
+ let vscmd_arch = env_getter.get_env("VSCMD_ARG_TGT_ARCH")?;
+ Some(target.as_vs_arch() == vscmd_arch.as_ref())
+ }
+
+ /// Checks if the cl.exe target matches the given target's arch. Returns `None` if anything
+ /// fails.
+ fn is_vscmd_target_cl(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<bool> {
+ let cmd_target = vscmd_target_cl(env_getter)?;
+ Some(target.as_vs_arch() == cmd_target)
+ }
+
+ /// Detect the target architecture of `cl.exe` in the current path, and return `None` if this
+ /// fails for any reason.
+ fn vscmd_target_cl(env_getter: &dyn EnvGetter) -> Option<&'static str> {
+ let cl_exe = env_getter.get_env("PATH").and_then(|path| {
+ env::split_paths(&path)
+ .map(|p| p.join("cl.exe"))
+ .find(|p| p.exists())
+ })?;
+ let mut cl = Command::new(cl_exe);
+ cl.stderr(std::process::Stdio::piped())
+ .stdout(std::process::Stdio::null());
+
+ let out = cl.output().ok()?;
+ let cl_arch = out
+ .stderr
+ .split(|&b| b == b'\n' || b == b'\r')
+ .next()?
+ .rsplit(|&b| b == b' ')
+ .next()?;
+
+ match cl_arch {
+ b"x64" => Some("x64"),
+ b"x86" => Some("x86"),
+ b"ARM64" => Some("arm64"),
+ b"ARM" => Some("arm"),
+ _ => None,
+ }
+ }
+
+ /// Attempt to find the tool using environment variables set by vcvars.
+ pub(super) fn find_msvc_environment(
+ tool: &str,
+ target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ // Early return if the environment isn't one that is known to have compiler toolsets in PATH
+ // `VCINSTALLDIR` is set from vcvarsall.bat (developer command prompt)
+ // `VSTEL_MSBuildProjectFullPath` is set by msbuild when invoking custom build steps
+ // NOTE: `VisualStudioDir` used to be used but this isn't set when invoking msbuild from the commandline
+ if env_getter.get_env("VCINSTALLDIR").is_none()
+ && env_getter.get_env("VSTEL_MSBuildProjectFullPath").is_none()
+ {
+ return None;
+ }
+
+ // If the vscmd target differs from the requested target then
+ // attempt to get the tool using the VS install directory.
+ if is_vscmd_target(target, env_getter) == Some(false) {
+ // We will only get here with versions 15+.
+ let vs_install_dir: PathBuf = env_getter.get_env("VSINSTALLDIR")?.into();
+ tool_from_vs15plus_instance(tool, target, &vs_install_dir, env_getter)
+ } else {
+ // Fallback to simply using the current environment.
+ env_getter
+ .get_env("PATH")
+ .and_then(|path| {
+ env::split_paths(&path)
+ .map(|p| p.join(tool))
+ .find(|p| p.exists())
+ })
+ .map(|path| Tool::with_family(path, MSVC_FAMILY))
+ }
+ }
+
+ fn find_msbuild_vs17(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ find_tool_in_vs16plus_path(r"MSBuild\Current\Bin\MSBuild.exe", target, "17", env_getter)
+ }
+
+ #[allow(bare_trait_objects)]
+ fn vs16plus_instances(
+ target: TargetArch,
+ version: &'static str,
+ env_getter: &dyn EnvGetter,
+ ) -> Box<Iterator<Item = PathBuf>> {
+ let instances = if let Some(instances) = vs15plus_instances(target, env_getter) {
+ instances
+ } else {
+ return Box::new(iter::empty());
+ };
+ Box::new(instances.into_iter().filter_map(move |instance| {
+ let installation_name = instance.installation_name()?;
+ if installation_name.starts_with(&format!("VisualStudio/{}.", version))
+ || installation_name.starts_with(&format!("VisualStudioPreview/{}.", version))
+ {
+ Some(instance.installation_path()?)
+ } else {
+ None
+ }
+ }))
+ }
+
+ fn find_tool_in_vs16plus_path(
+ tool: &str,
+ target: TargetArch,
+ version: &'static str,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ vs16plus_instances(target, version, env_getter)
+ .filter_map(|path| {
+ let path = path.join(tool);
+ if !path.is_file() {
+ return None;
+ }
+ let mut tool = Tool::with_family(path, MSVC_FAMILY);
+ if target == TargetArch::X64 {
+ tool.env.push(("Platform".into(), "X64".into()));
+ }
+ if matches!(target, TargetArch::Arm64 | TargetArch::Arm64ec) {
+ tool.env.push(("Platform".into(), "ARM64".into()));
+ }
+ Some(tool)
+ })
+ .next()
+ }
+
+ fn find_msbuild_vs16(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ find_tool_in_vs16plus_path(r"MSBuild\Current\Bin\MSBuild.exe", target, "16", env_getter)
+ }
+
+ // In MSVC 15 (2017) MS once again changed the scheme for locating
+ // the tooling. Now we must go through some COM interfaces, which
+ // is super fun for Rust.
+ //
+ // Note that much of this logic can be found [online] wrt paths, COM, etc.
+ //
+ // [online]: https://blogs.msdn.microsoft.com/vcblog/2017/03/06/finding-the-visual-c-compiler-tools-in-visual-studio-2017/
+ //
+ // Returns MSVC 15+ instances (15, 16 right now), the order should be consider undefined.
+ //
+ // However, on ARM64 this method doesn't work because VS Installer fails to register COM component on ARM64.
+ // Hence, as the last resort we try to use vswhere.exe to list available instances.
+ fn vs15plus_instances(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<VsInstances> {
+ vs15plus_instances_using_com()
+ .or_else(|| vs15plus_instances_using_vswhere(target, env_getter))
+ }
+
+ fn vs15plus_instances_using_com() -> Option<VsInstances> {
+ com::initialize().ok()?;
+
+ let config = SetupConfiguration::new().ok()?;
+ let enum_setup_instances = config.enum_all_instances().ok()?;
+
+ Some(VsInstances::ComBased(enum_setup_instances))
+ }
+
+ fn vs15plus_instances_using_vswhere(
+ target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<VsInstances> {
+ let program_files_path = env_getter
+ .get_env("ProgramFiles(x86)")
+ .or_else(|| env_getter.get_env("ProgramFiles"))?;
+
+ let program_files_path = Path::new(program_files_path.as_ref());
+
+ let vswhere_path =
+ program_files_path.join(r"Microsoft Visual Studio\Installer\vswhere.exe");
+
+ if !vswhere_path.exists() {
+ return None;
+ }
+
+ let tools_arch = match target {
+ TargetArch::X86 | TargetArch::X64 => Some("x86.x64"),
+ TargetArch::Arm => Some("ARM"),
+ TargetArch::Arm64 | TargetArch::Arm64ec => Some("ARM64"),
+ };
+
+ let vswhere_output = Command::new(vswhere_path)
+ .args([
+ "-latest",
+ "-products",
+ "*",
+ "-requires",
+ &format!("Microsoft.VisualStudio.Component.VC.Tools.{}", tools_arch?),
+ "-format",
+ "text",
+ "-nologo",
+ ])
+ .stderr(std::process::Stdio::inherit())
+ .output()
+ .ok()?;
+
+ let vs_instances =
+ VsInstances::VswhereBased(VswhereInstance::try_from(&vswhere_output.stdout).ok()?);
+
+ Some(vs_instances)
+ }
+
+ // Inspired from official microsoft/vswhere ParseVersionString
+ // i.e. at most four u16 numbers separated by '.'
+ fn parse_version(version: &str) -> Option<Vec<u16>> {
+ version
+ .split('.')
+ .map(|chunk| u16::from_str(chunk).ok())
+ .collect()
+ }
+
+ pub(super) fn find_msvc_15plus(
+ tool: &str,
+ target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ let iter = vs15plus_instances(target, env_getter)?;
+ iter.into_iter()
+ .filter_map(|instance| {
+ let version = parse_version(&instance.installation_version()?)?;
+ let instance_path = instance.installation_path()?;
+ let tool = tool_from_vs15plus_instance(tool, target, &instance_path, env_getter)?;
+ Some((version, tool))
+ })
+ .max_by(|(a_version, _), (b_version, _)| a_version.cmp(b_version))
+ .map(|(_version, tool)| tool)
+ }
+
+ // While the paths to Visual Studio 2017's devenv and MSBuild could
+ // potentially be retrieved from the registry, finding them via
+ // SetupConfiguration has shown to be [more reliable], and is preferred
+ // according to Microsoft. To help head off potential regressions though,
+ // we keep the registry method as a fallback option.
+ //
+ // [more reliable]: https://github.com/rust-lang/cc-rs/pull/331
+ fn find_tool_in_vs15_path(
+ tool: &str,
+ target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ let mut path = match vs15plus_instances(target, env_getter) {
+ Some(instances) => instances
+ .into_iter()
+ .filter_map(|instance| instance.installation_path())
+ .map(|path| path.join(tool))
+ .find(|path| path.is_file()),
+ None => None,
+ };
+
+ if path.is_none() {
+ let key = r"SOFTWARE\WOW6432Node\Microsoft\VisualStudio\SxS\VS7";
+ path = LOCAL_MACHINE
+ .open(key.as_ref())
+ .ok()
+ .and_then(|key| key.query_str("15.0").ok())
+ .map(|path| PathBuf::from(path).join(tool))
+ .and_then(|path| if path.is_file() { Some(path) } else { None });
+ }
+
+ path.map(|path| {
+ let mut tool = Tool::with_family(path, MSVC_FAMILY);
+ if target == TargetArch::X64 {
+ tool.env.push(("Platform".into(), "X64".into()));
+ } else if matches!(target, TargetArch::Arm64 | TargetArch::Arm64ec) {
+ tool.env.push(("Platform".into(), "ARM64".into()));
+ }
+ tool
+ })
+ }
+
+ fn tool_from_vs15plus_instance(
+ tool: &str,
+ target: TargetArch,
+ instance_path: &Path,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ let (root_path, bin_path, host_dylib_path, lib_path, alt_lib_path, include_path) =
+ vs15plus_vc_paths(target, instance_path, env_getter)?;
+ let tool_path = bin_path.join(tool);
+ if !tool_path.exists() {
+ return None;
+ };
+
+ let mut tool = MsvcTool::new(tool_path);
+ tool.path.push(bin_path.clone());
+ tool.path.push(host_dylib_path);
+ if let Some(alt_lib_path) = alt_lib_path {
+ tool.libs.push(alt_lib_path);
+ }
+ tool.libs.push(lib_path);
+ tool.include.push(include_path);
+
+ if let Some((atl_lib_path, atl_include_path)) = atl_paths(target, &root_path) {
+ tool.libs.push(atl_lib_path);
+ tool.include.push(atl_include_path);
+ }
+
+ add_sdks(&mut tool, target, env_getter)?;
+
+ Some(tool.into_tool(env_getter))
+ }
+
+ fn vs15plus_vc_paths(
+ target_arch: TargetArch,
+ instance_path: &Path,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<(PathBuf, PathBuf, PathBuf, PathBuf, Option<PathBuf>, PathBuf)> {
+ let version = vs15plus_vc_read_version(instance_path)?;
+
+ let hosts = match host_arch() {
+ X86 => &["X86"],
+ X86_64 => &["X64"],
+ // Starting with VS 17.4, there is a natively hosted compiler on ARM64:
+ // https://devblogs.microsoft.com/visualstudio/arm64-visual-studio-is-officially-here/
+ // On older versions of VS, we use x64 if running under emulation is supported,
+ // otherwise use x86.
+ AARCH64 => {
+ if is_amd64_emulation_supported() {
+ &["ARM64", "X64", "X86"][..]
+ } else {
+ &["ARM64", "X86"]
+ }
+ }
+ _ => return None,
+ };
+ let target_dir = target_arch.as_vs_arch();
+ // The directory layout here is MSVC/bin/Host$host/$target/
+ let path = instance_path.join(r"VC\Tools\MSVC").join(version);
+ // We use the first available host architecture that can build for the target
+ let (host_path, host) = hosts.iter().find_map(|&x| {
+ let candidate = path.join("bin").join(format!("Host{}", x));
+ if candidate.join(target_dir).exists() {
+ Some((candidate, x))
+ } else {
+ None
+ }
+ })?;
+ // This is the path to the toolchain for a particular target, running
+ // on a given host
+ let bin_path = host_path.join(target_dir);
+ // But! we also need PATH to contain the target directory for the host
+ // architecture, because it contains dlls like mspdb140.dll compiled for
+ // the host architecture.
+ let host_dylib_path = host_path.join(host.to_lowercase());
+ let lib_fragment = if use_spectre_mitigated_libs(env_getter) {
+ r"lib\spectre"
+ } else {
+ "lib"
+ };
+ let lib_path = path.join(lib_fragment).join(target_dir);
+ let alt_lib_path =
+ (target_arch == TargetArch::Arm64ec).then(|| path.join(lib_fragment).join("arm64ec"));
+ let include_path = path.join("include");
+ Some((
+ path,
+ bin_path,
+ host_dylib_path,
+ lib_path,
+ alt_lib_path,
+ include_path,
+ ))
+ }
+
+ fn vs15plus_vc_read_version(dir: &Path) -> Option<String> {
+ // Try to open the default version file.
+ let mut version_path: PathBuf =
+ dir.join(r"VC\Auxiliary\Build\Microsoft.VCToolsVersion.default.txt");
+ let mut version_file = if let Ok(f) = File::open(&version_path) {
+ f
+ } else {
+ // If the default doesn't exist, search for other version files.
+ // These are in the form Microsoft.VCToolsVersion.v143.default.txt
+ // where `143` is any three decimal digit version number.
+ // This sorts versions by lexical order and selects the highest version.
+ let mut version_file = String::new();
+ version_path.pop();
+ for file in version_path.read_dir().ok()? {
+ let name = file.ok()?.file_name();
+ let name = name.to_str()?;
+ if name.starts_with("Microsoft.VCToolsVersion.v")
+ && name.ends_with(".default.txt")
+ && name > &version_file
+ {
+ version_file.replace_range(.., name);
+ }
+ }
+ if version_file.is_empty() {
+ return None;
+ }
+ version_path.push(version_file);
+ File::open(version_path).ok()?
+ };
+
+ // Get the version string from the file we found.
+ let mut version = String::new();
+ version_file.read_to_string(&mut version).ok()?;
+ version.truncate(version.trim_end().len());
+ Some(version)
+ }
+
+ fn use_spectre_mitigated_libs(env_getter: &dyn EnvGetter) -> bool {
+ env_getter
+ .get_env("VSCMD_ARG_VCVARS_SPECTRE")
+ .map(|env| env.as_ref() == "spectre")
+ .unwrap_or_default()
+ }
+
+ fn atl_paths(target: TargetArch, path: &Path) -> Option<(PathBuf, PathBuf)> {
+ let atl_path = path.join("atlmfc");
+ let sub = target.as_vs_arch();
+ if atl_path.exists() {
+ Some((atl_path.join("lib").join(sub), atl_path.join("include")))
+ } else {
+ None
+ }
+ }
+
+ // For MSVC 14 we need to find the Universal CRT as well as either
+ // the Windows 10 SDK or Windows 8.1 SDK.
+ pub(super) fn find_msvc_14(
+ tool: &str,
+ target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ let vcdir = get_vc_dir("14.0")?;
+ let mut tool = get_tool(tool, &vcdir, target)?;
+ add_sdks(&mut tool, target, env_getter)?;
+ Some(tool.into_tool(env_getter))
+ }
+
+ fn add_sdks(tool: &mut MsvcTool, target: TargetArch, env_getter: &dyn EnvGetter) -> Option<()> {
+ let sub = target.as_vs_arch();
+ let (ucrt, ucrt_version) = get_ucrt_dir()?;
+
+ let host = match host_arch() {
+ X86 => "x86",
+ X86_64 => "x64",
+ AARCH64 => "arm64",
+ _ => return None,
+ };
+
+ tool.path
+ .push(ucrt.join("bin").join(&ucrt_version).join(host));
+
+ let ucrt_include = ucrt.join("include").join(&ucrt_version);
+ tool.include.push(ucrt_include.join("ucrt"));
+
+ let ucrt_lib = ucrt.join("lib").join(&ucrt_version);
+ tool.libs.push(ucrt_lib.join("ucrt").join(sub));
+
+ if let Some((sdk, version)) = get_sdk10_dir(env_getter) {
+ tool.path.push(sdk.join("bin").join(host));
+ let sdk_lib = sdk.join("lib").join(&version);
+ tool.libs.push(sdk_lib.join("um").join(sub));
+ let sdk_include = sdk.join("include").join(&version);
+ tool.include.push(sdk_include.join("um"));
+ tool.include.push(sdk_include.join("cppwinrt"));
+ tool.include.push(sdk_include.join("winrt"));
+ tool.include.push(sdk_include.join("shared"));
+ } else if let Some(sdk) = get_sdk81_dir() {
+ tool.path.push(sdk.join("bin").join(host));
+ let sdk_lib = sdk.join("lib").join("winv6.3");
+ tool.libs.push(sdk_lib.join("um").join(sub));
+ let sdk_include = sdk.join("include");
+ tool.include.push(sdk_include.join("um"));
+ tool.include.push(sdk_include.join("winrt"));
+ tool.include.push(sdk_include.join("shared"));
+ }
+
+ Some(())
+ }
+
+ fn add_env(
+ tool: &mut Tool,
+ env: &'static str,
+ paths: Vec<PathBuf>,
+ env_getter: &dyn EnvGetter,
+ ) {
+ let prev = env_getter.get_env(env);
+ let prev = prev.as_ref().map(AsRef::as_ref).unwrap_or_default();
+ let prev = env::split_paths(&prev);
+ let new = paths.into_iter().chain(prev);
+ tool.env
+ .push((env.to_string().into(), env::join_paths(new).unwrap()));
+ }
+
+ // Given a possible MSVC installation directory, we look for the linker and
+ // then add the MSVC library path.
+ fn get_tool(tool: &str, path: &Path, target: TargetArch) -> Option<MsvcTool> {
+ bin_subdir(target)
+ .into_iter()
+ .map(|(sub, host)| {
+ (
+ path.join("bin").join(sub).join(tool),
+ path.join("bin").join(host),
+ )
+ })
+ .filter(|(path, _)| path.is_file())
+ .map(|(path, host)| {
+ let mut tool = MsvcTool::new(path);
+ tool.path.push(host);
+ tool
+ })
+ .filter_map(|mut tool| {
+ let sub = vc_lib_subdir(target);
+ tool.libs.push(path.join("lib").join(sub));
+ tool.include.push(path.join("include"));
+ let atlmfc_path = path.join("atlmfc");
+ if atlmfc_path.exists() {
+ tool.libs.push(atlmfc_path.join("lib").join(sub));
+ tool.include.push(atlmfc_path.join("include"));
+ }
+ Some(tool)
+ })
+ .next()
+ }
+
+ // To find MSVC we look in a specific registry key for the version we are
+ // trying to find.
+ fn get_vc_dir(ver: &str) -> Option<PathBuf> {
+ let key = r"SOFTWARE\Microsoft\VisualStudio\SxS\VC7";
+ let key = LOCAL_MACHINE.open(key.as_ref()).ok()?;
+ let path = key.query_str(ver).ok()?;
+ Some(path.into())
+ }
+
+ // To find the Universal CRT we look in a specific registry key for where
+ // all the Universal CRTs are located and then sort them asciibetically to
+ // find the newest version. While this sort of sorting isn't ideal, it is
+ // what vcvars does so that's good enough for us.
+ //
+ // Returns a pair of (root, version) for the ucrt dir if found
+ fn get_ucrt_dir() -> Option<(PathBuf, String)> {
+ let key = r"SOFTWARE\Microsoft\Windows Kits\Installed Roots";
+ let key = LOCAL_MACHINE.open(key.as_ref()).ok()?;
+ let root = key.query_str("KitsRoot10").ok()?;
+ let readdir = Path::new(&root).join("lib").read_dir().ok()?;
+ let max_libdir = readdir
+ .filter_map(|dir| dir.ok())
+ .map(|dir| dir.path())
+ .filter(|dir| {
+ dir.components()
+ .last()
+ .and_then(|c| c.as_os_str().to_str())
+ .map(|c| c.starts_with("10.") && dir.join("ucrt").is_dir())
+ .unwrap_or(false)
+ })
+ .max()?;
+ let version = max_libdir.components().last().unwrap();
+ let version = version.as_os_str().to_str().unwrap().to_string();
+ Some((root.into(), version))
+ }
+
+ // Vcvars finds the correct version of the Windows 10 SDK by looking
+ // for the include `um\Windows.h` because sometimes a given version will
+ // only have UCRT bits without the rest of the SDK. Since we only care about
+ // libraries and not includes, we instead look for `um\x64\kernel32.lib`.
+ // Since the 32-bit and 64-bit libraries are always installed together we
+ // only need to bother checking x64, making this code a tiny bit simpler.
+ // Like we do for the Universal CRT, we sort the possibilities
+ // asciibetically to find the newest one as that is what vcvars does.
+ // Before doing that, we check the "WindowsSdkDir" and "WindowsSDKVersion"
+ // environment variables set by vcvars to use the environment sdk version
+ // if one is already configured.
+ fn get_sdk10_dir(env_getter: &dyn EnvGetter) -> Option<(PathBuf, String)> {
+ if let (Some(root), Some(version)) = (
+ env_getter.get_env("WindowsSdkDir"),
+ env_getter
+ .get_env("WindowsSDKVersion")
+ .as_ref()
+ .and_then(|version| version.as_ref().to_str()),
+ ) {
+ return Some((
+ PathBuf::from(root),
+ version.trim_end_matches('\\').to_string(),
+ ));
+ }
+
+ let key = r"SOFTWARE\Microsoft\Microsoft SDKs\Windows\v10.0";
+ let key = LOCAL_MACHINE.open(key.as_ref()).ok()?;
+ let root = key.query_str("InstallationFolder").ok()?;
+ let readdir = Path::new(&root).join("lib").read_dir().ok()?;
+ let mut dirs = readdir
+ .filter_map(|dir| dir.ok())
+ .map(|dir| dir.path())
+ .collect::<Vec<_>>();
+ dirs.sort();
+ let dir = dirs
+ .into_iter()
+ .rev()
+ .find(|dir| dir.join("um").join("x64").join("kernel32.lib").is_file())?;
+ let version = dir.components().last().unwrap();
+ let version = version.as_os_str().to_str().unwrap().to_string();
+ Some((root.into(), version))
+ }
+
+ // Interestingly there are several subdirectories, `win7` `win8` and
+ // `winv6.3`. Vcvars seems to only care about `winv6.3` though, so the same
+ // applies to us. Note that if we were targeting kernel mode drivers
+ // instead of user mode applications, we would care.
+ fn get_sdk81_dir() -> Option<PathBuf> {
+ let key = r"SOFTWARE\Microsoft\Microsoft SDKs\Windows\v8.1";
+ let key = LOCAL_MACHINE.open(key.as_ref()).ok()?;
+ let root = key.query_str("InstallationFolder").ok()?;
+ Some(root.into())
+ }
+
+ const PROCESSOR_ARCHITECTURE_INTEL: u16 = 0;
+ const PROCESSOR_ARCHITECTURE_AMD64: u16 = 9;
+ const PROCESSOR_ARCHITECTURE_ARM64: u16 = 12;
+ const X86: u16 = PROCESSOR_ARCHITECTURE_INTEL;
+ const X86_64: u16 = PROCESSOR_ARCHITECTURE_AMD64;
+ const AARCH64: u16 = PROCESSOR_ARCHITECTURE_ARM64;
+
+ // When choosing the tool to use, we have to choose the one which matches
+ // the target architecture. Otherwise we end up in situations where someone
+ // on 32-bit Windows is trying to cross compile to 64-bit and it tries to
+ // invoke the native 64-bit compiler which won't work.
+ //
+ // For the return value of this function, the first member of the tuple is
+ // the folder of the tool we will be invoking, while the second member is
+ // the folder of the host toolchain for that tool which is essential when
+ // using a cross linker. We return a Vec since on x64 there are often two
+ // linkers that can target the architecture we desire. The 64-bit host
+ // linker is preferred, and hence first, due to 64-bit allowing it more
+ // address space to work with and potentially being faster.
+ fn bin_subdir(target: TargetArch) -> Vec<(&'static str, &'static str)> {
+ match (target, host_arch()) {
+ (TargetArch::X86, X86) => vec![("", "")],
+ (TargetArch::X86, X86_64) => vec![("amd64_x86", "amd64"), ("", "")],
+ (TargetArch::X64, X86) => vec![("x86_amd64", "")],
+ (TargetArch::X64, X86_64) => vec![("amd64", "amd64"), ("x86_amd64", "")],
+ (TargetArch::Arm, X86) => vec![("x86_arm", "")],
+ (TargetArch::Arm, X86_64) => vec![("amd64_arm", "amd64"), ("x86_arm", "")],
+ _ => vec![],
+ }
+ }
+
+ // MSVC's x86 libraries are not in a subfolder
+ fn vc_lib_subdir(target: TargetArch) -> &'static str {
+ match target {
+ TargetArch::X86 => "",
+ TargetArch::X64 => "amd64",
+ TargetArch::Arm => "arm",
+ TargetArch::Arm64 | TargetArch::Arm64ec => "arm64",
+ }
+ }
+
+ #[allow(bad_style)]
+ fn host_arch() -> u16 {
+ type DWORD = u32;
+ type WORD = u16;
+ type LPVOID = *mut u8;
+ type DWORD_PTR = usize;
+
+ #[repr(C)]
+ struct SYSTEM_INFO {
+ wProcessorArchitecture: WORD,
+ _wReserved: WORD,
+ _dwPageSize: DWORD,
+ _lpMinimumApplicationAddress: LPVOID,
+ _lpMaximumApplicationAddress: LPVOID,
+ _dwActiveProcessorMask: DWORD_PTR,
+ _dwNumberOfProcessors: DWORD,
+ _dwProcessorType: DWORD,
+ _dwAllocationGranularity: DWORD,
+ _wProcessorLevel: WORD,
+ _wProcessorRevision: WORD,
+ }
+
+ extern "system" {
+ fn GetNativeSystemInfo(lpSystemInfo: *mut SYSTEM_INFO);
+ }
+
+ unsafe {
+ let mut info = mem::zeroed();
+ GetNativeSystemInfo(&mut info);
+ info.wProcessorArchitecture
+ }
+ }
+
+ // Given a registry key, look at all the sub keys and find the one which has
+ // the maximal numeric value.
+ //
+ // Returns the name of the maximal key as well as the opened maximal key.
+ fn max_version(key: &RegistryKey) -> Option<(OsString, RegistryKey)> {
+ let mut max_vers = 0;
+ let mut max_key = None;
+ for subkey in key.iter().filter_map(|k| k.ok()) {
+ let val = subkey
+ .to_str()
+ .and_then(|s| s.trim_start_matches('v').replace('.', "").parse().ok());
+ let val = match val {
+ Some(s) => s,
+ None => continue,
+ };
+ if val > max_vers {
+ if let Ok(k) = key.open(&subkey) {
+ max_vers = val;
+ max_key = Some((subkey, k));
+ }
+ }
+ }
+ max_key
+ }
+
+ #[inline(always)]
+ pub(super) fn has_msbuild_version(version: &str, env_getter: &dyn EnvGetter) -> bool {
+ match version {
+ "17.0" => {
+ find_msbuild_vs17(TargetArch::X64, env_getter).is_some()
+ || find_msbuild_vs17(TargetArch::X86, env_getter).is_some()
+ || find_msbuild_vs17(TargetArch::Arm64, env_getter).is_some()
+ }
+ "16.0" => {
+ find_msbuild_vs16(TargetArch::X64, env_getter).is_some()
+ || find_msbuild_vs16(TargetArch::X86, env_getter).is_some()
+ || find_msbuild_vs16(TargetArch::Arm64, env_getter).is_some()
+ }
+ "15.0" => {
+ find_msbuild_vs15(TargetArch::X64, env_getter).is_some()
+ || find_msbuild_vs15(TargetArch::X86, env_getter).is_some()
+ || find_msbuild_vs15(TargetArch::Arm64, env_getter).is_some()
+ }
+ "14.0" => LOCAL_MACHINE
+ .open(&OsString::from(format!(
+ "SOFTWARE\\Microsoft\\MSBuild\\ToolsVersions\\{}",
+ version
+ )))
+ .is_ok(),
+ _ => false,
+ }
+ }
+
+ pub(super) fn find_devenv(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ find_devenv_vs15(target, env_getter)
+ }
+
+ fn find_devenv_vs15(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ find_tool_in_vs15_path(r"Common7\IDE\devenv.exe", target, env_getter)
+ }
+
+ // see http://stackoverflow.com/questions/328017/path-to-msbuild
+ pub(super) fn find_msbuild(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ // VS 15 (2017) changed how to locate msbuild
+ if let Some(r) = find_msbuild_vs17(target, env_getter) {
+ Some(r)
+ } else if let Some(r) = find_msbuild_vs16(target, env_getter) {
+ return Some(r);
+ } else if let Some(r) = find_msbuild_vs15(target, env_getter) {
+ return Some(r);
+ } else {
+ find_old_msbuild(target)
+ }
+ }
+
+ fn find_msbuild_vs15(target: TargetArch, env_getter: &dyn EnvGetter) -> Option<Tool> {
+ find_tool_in_vs15_path(r"MSBuild\15.0\Bin\MSBuild.exe", target, env_getter)
+ }
+
+ fn find_old_msbuild(target: TargetArch) -> Option<Tool> {
+ let key = r"SOFTWARE\Microsoft\MSBuild\ToolsVersions";
+ LOCAL_MACHINE
+ .open(key.as_ref())
+ .ok()
+ .and_then(|key| {
+ max_version(&key).and_then(|(_vers, key)| key.query_str("MSBuildToolsPath").ok())
+ })
+ .map(|path| {
+ let mut path = PathBuf::from(path);
+ path.push("MSBuild.exe");
+ let mut tool = Tool::with_family(path, MSVC_FAMILY);
+ if target == TargetArch::X64 {
+ tool.env.push(("Platform".into(), "X64".into()));
+ }
+ tool
+ })
+ }
+}
+
+/// Non-Windows Implementation.
+#[cfg(not(windows))]
+mod impl_ {
+ use std::{env, ffi::OsStr};
+
+ use super::{EnvGetter, TargetArch, MSVC_FAMILY};
+ use crate::Tool;
+
+ /// Finding msbuild.exe tool under unix system is not currently supported.
+ /// Maybe can check it using an environment variable looks like `MSBUILD_BIN`.
+ #[inline(always)]
+ pub(super) fn find_msbuild(_target: TargetArch, _: &dyn EnvGetter) -> Option<Tool> {
+ None
+ }
+
+ // Finding devenv.exe tool under unix system is not currently supported.
+ // Maybe can check it using an environment variable looks like `DEVENV_BIN`.
+ #[inline(always)]
+ pub(super) fn find_devenv(_target: TargetArch, _: &dyn EnvGetter) -> Option<Tool> {
+ None
+ }
+
+ /// Attempt to find the tool using environment variables set by vcvars.
+ pub(super) fn find_msvc_environment(
+ tool: &str,
+ _target: TargetArch,
+ env_getter: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ // Early return if the environment doesn't contain a VC install.
+ let vc_install_dir = env_getter.get_env("VCINSTALLDIR")?;
+ let vs_install_dir = env_getter.get_env("VSINSTALLDIR")?;
+
+ let get_tool = |install_dir: &OsStr| {
+ env::split_paths(install_dir)
+ .map(|p| p.join(tool))
+ .find(|p| p.exists())
+ .map(|path| Tool::with_family(path, MSVC_FAMILY))
+ };
+
+ // Take the path of tool for the vc install directory.
+ get_tool(vc_install_dir.as_ref())
+ // Take the path of tool for the vs install directory.
+ .or_else(|| get_tool(vs_install_dir.as_ref()))
+ // Take the path of tool for the current path environment.
+ .or_else(|| {
+ env_getter
+ .get_env("PATH")
+ .as_ref()
+ .map(|path| path.as_ref())
+ .and_then(get_tool)
+ })
+ }
+
+ #[inline(always)]
+ pub(super) fn find_msvc_15plus(
+ _tool: &str,
+ _target: TargetArch,
+ _: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ None
+ }
+
+ // For MSVC 14 we need to find the Universal CRT as well as either
+ // the Windows 10 SDK or Windows 8.1 SDK.
+ #[inline(always)]
+ pub(super) fn find_msvc_14(
+ _tool: &str,
+ _target: TargetArch,
+ _: &dyn EnvGetter,
+ ) -> Option<Tool> {
+ None
+ }
+
+ #[inline(always)]
+ pub(super) fn has_msbuild_version(_version: &str, _: &dyn EnvGetter) -> bool {
+ false
+ }
+}
diff --git a/vendor/cc/src/windows/mod.rs b/vendor/cc/src/windows/mod.rs
new file mode 100644
index 00000000..07b3e7b1
--- /dev/null
+++ b/vendor/cc/src/windows/mod.rs
@@ -0,0 +1,22 @@
+//! These modules are all glue to support reading the MSVC version from
+//! the registry and from COM interfaces.
+
+// This is used in the crate's public API, so don't use #[cfg(windows)]
+pub mod find_tools;
+
+#[cfg(windows)]
+mod windows_link;
+#[cfg(windows)]
+pub(crate) mod windows_sys;
+
+#[cfg(windows)]
+mod registry;
+#[cfg(windows)]
+#[macro_use]
+mod winapi;
+#[cfg(windows)]
+mod com;
+#[cfg(windows)]
+mod setup_config;
+#[cfg(windows)]
+mod vs_instances;
diff --git a/vendor/cc/src/windows/registry.rs b/vendor/cc/src/windows/registry.rs
new file mode 100644
index 00000000..83983032
--- /dev/null
+++ b/vendor/cc/src/windows/registry.rs
@@ -0,0 +1,191 @@
+// Copyright 2015 The Rust Project Developers. See the COPYRIGHT
+// file at the top-level directory of this distribution and at
+// http://rust-lang.org/COPYRIGHT.
+//
+// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
+// https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
+// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your
+// option. This file may not be copied, modified, or distributed
+// except according to those terms.
+
+use crate::windows::windows_sys::{
+ RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, RegQueryValueExW, ERROR_NO_MORE_ITEMS,
+ ERROR_SUCCESS, HKEY, HKEY_LOCAL_MACHINE, KEY_READ, KEY_WOW64_32KEY, REG_SZ,
+};
+use std::{
+ ffi::{OsStr, OsString},
+ io,
+ ops::RangeFrom,
+ os::windows::prelude::*,
+ ptr::null_mut,
+};
+
+/// Must never be `HKEY_PERFORMANCE_DATA`.
+pub(crate) struct RegistryKey(Repr);
+
+#[allow(clippy::upper_case_acronyms)]
+type DWORD = u32;
+
+struct OwnedKey(HKEY);
+
+/// Note: must not encode `HKEY_PERFORMANCE_DATA` or one of its subkeys.
+enum Repr {
+ /// `HKEY_LOCAL_MACHINE`.
+ LocalMachine,
+ /// A subkey of `HKEY_LOCAL_MACHINE`.
+ Owned(OwnedKey),
+}
+
+pub struct Iter<'a> {
+ idx: RangeFrom<DWORD>,
+ key: &'a RegistryKey,
+}
+
+unsafe impl Sync for Repr {}
+unsafe impl Send for Repr {}
+
+pub(crate) const LOCAL_MACHINE: RegistryKey = RegistryKey(Repr::LocalMachine);
+
+impl RegistryKey {
+ fn raw(&self) -> HKEY {
+ match self.0 {
+ Repr::LocalMachine => HKEY_LOCAL_MACHINE,
+ Repr::Owned(ref val) => val.0,
+ }
+ }
+
+ /// Open a sub-key of `self`.
+ pub fn open(&self, key: &OsStr) -> io::Result<RegistryKey> {
+ let key = key.encode_wide().chain(Some(0)).collect::<Vec<_>>();
+ let mut ret = null_mut();
+ let err = unsafe {
+ RegOpenKeyExW(
+ self.raw(),
+ key.as_ptr(),
+ 0,
+ KEY_READ | KEY_WOW64_32KEY,
+ &mut ret,
+ )
+ };
+ if err == ERROR_SUCCESS {
+ Ok(RegistryKey(Repr::Owned(OwnedKey(ret))))
+ } else {
+ Err(io::Error::from_raw_os_error(err as i32))
+ }
+ }
+
+ pub fn iter(&self) -> Iter {
+ Iter {
+ idx: 0..,
+ key: self,
+ }
+ }
+
+ pub fn query_str(&self, name: &str) -> io::Result<OsString> {
+ let name: &OsStr = name.as_ref();
+ let name = name.encode_wide().chain(Some(0)).collect::<Vec<_>>();
+ let mut len = 0;
+ let mut kind = 0;
+ unsafe {
+ let err = RegQueryValueExW(
+ self.raw(),
+ name.as_ptr(),
+ null_mut(),
+ &mut kind,
+ null_mut(),
+ &mut len,
+ );
+ if err != ERROR_SUCCESS {
+ return Err(io::Error::from_raw_os_error(err as i32));
+ }
+ if kind != REG_SZ {
+ return Err(io::Error::new(
+ io::ErrorKind::Other,
+ "registry key wasn't a string",
+ ));
+ }
+
+ // The length here is the length in bytes, but we're using wide
+ // characters so we need to be sure to halve it for the length
+ // passed in.
+ assert!(len % 2 == 0, "impossible wide string size: {} bytes", len);
+ let vlen = len as usize / 2;
+ // Defensively initialized, see comment about
+ // `HKEY_PERFORMANCE_DATA` below.
+ let mut v = vec![0u16; vlen];
+ let err = RegQueryValueExW(
+ self.raw(),
+ name.as_ptr(),
+ null_mut(),
+ null_mut(),
+ v.as_mut_ptr() as *mut _,
+ &mut len,
+ );
+ // We don't check for `ERROR_MORE_DATA` (which would if the value
+ // grew between the first and second call to `RegQueryValueExW`),
+ // both because it's extremely unlikely, and this is a bit more
+ // defensive more defensive against weird types of registry keys.
+ if err != ERROR_SUCCESS {
+ return Err(io::Error::from_raw_os_error(err as i32));
+ }
+ // The length is allowed to change, but should still be even, as
+ // well as smaller.
+ assert!(len % 2 == 0, "impossible wide string size: {} bytes", len);
+ // If the length grew but returned a success code, it *probably*
+ // indicates we're `HKEY_PERFORMANCE_DATA` or a subkey(?). We
+ // consider this UB, since those keys write "undefined" or
+ // "unpredictable" values to len, and need to use a completely
+ // different loop structure. This should be impossible (and enforce
+ // it in the API to the best of our ability), but to mitigate the
+ // damage we do some smoke-checks on the len, and ensure `v` has
+ // been fully initialized (rather than trusting the result of
+ // `RegQueryValueExW`).
+ let actual_len = len as usize / 2;
+ assert!(actual_len <= v.len());
+ v.truncate(actual_len);
+ // Some registry keys may have a terminating nul character, but
+ // we're not interested in that, so chop it off if it's there.
+ if !v.is_empty() && v[v.len() - 1] == 0 {
+ v.pop();
+ }
+ Ok(OsString::from_wide(&v))
+ }
+ }
+}
+
+impl Drop for OwnedKey {
+ fn drop(&mut self) {
+ unsafe {
+ RegCloseKey(self.0);
+ }
+ }
+}
+
+impl<'a> Iterator for Iter<'a> {
+ type Item = io::Result<OsString>;
+
+ fn next(&mut self) -> Option<io::Result<OsString>> {
+ self.idx.next().and_then(|i| unsafe {
+ let mut v = Vec::with_capacity(256);
+ let mut len = v.capacity() as DWORD;
+ let ret = RegEnumKeyExW(
+ self.key.raw(),
+ i,
+ v.as_mut_ptr(),
+ &mut len,
+ null_mut(),
+ null_mut(),
+ null_mut(),
+ null_mut(),
+ );
+ if ret == ERROR_NO_MORE_ITEMS {
+ None
+ } else if ret != ERROR_SUCCESS {
+ Some(Err(io::Error::from_raw_os_error(ret as i32)))
+ } else {
+ v.set_len(len as usize);
+ Some(Ok(OsString::from_wide(&v)))
+ }
+ })
+ }
+}
diff --git a/vendor/cc/src/windows/setup_config.rs b/vendor/cc/src/windows/setup_config.rs
new file mode 100644
index 00000000..5739ecf7
--- /dev/null
+++ b/vendor/cc/src/windows/setup_config.rs
@@ -0,0 +1,283 @@
+// Copyright © 2017 winapi-rs developers
+// Licensed under the Apache License, Version 2.0
+// <LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
+// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your option.
+// All files in the project carrying such notice may not be copied, modified, or distributed
+// except according to those terms.
+
+#![allow(bad_style)]
+#![allow(unused)]
+
+use crate::windows::{
+ com::{BStr, ComPtr},
+ winapi::{
+ IUnknown, IUnknownVtbl, Interface, LCID, LPCOLESTR, LPCWSTR, LPFILETIME, LPSAFEARRAY,
+ PULONGLONG, ULONG,
+ },
+ windows_sys::{CoCreateInstance, BSTR, CLSCTX_ALL, HRESULT, S_FALSE},
+};
+
+use std::{
+ ffi::OsString,
+ ptr::{null, null_mut},
+};
+
+// Bindings to the Setup.Configuration stuff
+pub type InstanceState = u32;
+
+pub const eNone: InstanceState = 0;
+pub const eLocal: InstanceState = 1;
+pub const eRegistered: InstanceState = 2;
+pub const eNoRebootRequired: InstanceState = 4;
+pub const eComplete: InstanceState = -1i32 as u32;
+
+RIDL! {#[uuid(0xb41463c3, 0x8866, 0x43b5, 0xbc, 0x33, 0x2b, 0x06, 0x76, 0xf7, 0xf4, 0x2e)]
+interface ISetupInstance(ISetupInstanceVtbl): IUnknown(IUnknownVtbl) {
+ fn GetInstanceId(
+ pbstrInstanceId: *mut BSTR,
+ ) -> HRESULT,
+ fn GetInstallDate(
+ pInstallDate: LPFILETIME,
+ ) -> HRESULT,
+ fn GetInstallationName(
+ pbstrInstallationName: *mut BSTR,
+ ) -> HRESULT,
+ fn GetInstallationPath(
+ pbstrInstallationPath: *mut BSTR,
+ ) -> HRESULT,
+ fn GetInstallationVersion(
+ pbstrInstallationVersion: *mut BSTR,
+ ) -> HRESULT,
+ fn GetDisplayName(
+ lcid: LCID,
+ pbstrDisplayName: *mut BSTR,
+ ) -> HRESULT,
+ fn GetDescription(
+ lcid: LCID,
+ pbstrDescription: *mut BSTR,
+ ) -> HRESULT,
+ fn ResolvePath(
+ pwszRelativePath: LPCOLESTR,
+ pbstrAbsolutePath: *mut BSTR,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0x89143c9a, 0x05af, 0x49b0, 0xb7, 0x17, 0x72, 0xe2, 0x18, 0xa2, 0x18, 0x5c)]
+interface ISetupInstance2(ISetupInstance2Vtbl): ISetupInstance(ISetupInstanceVtbl) {
+ fn GetState(
+ pState: *mut InstanceState,
+ ) -> HRESULT,
+ fn GetPackages(
+ ppsaPackages: *mut LPSAFEARRAY,
+ ) -> HRESULT,
+ fn GetProduct(
+ ppPackage: *mut *mut ISetupPackageReference,
+ ) -> HRESULT,
+ fn GetProductPath(
+ pbstrProductPath: *mut BSTR,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0x6380bcff, 0x41d3, 0x4b2e, 0x8b, 0x2e, 0xbf, 0x8a, 0x68, 0x10, 0xc8, 0x48)]
+interface IEnumSetupInstances(IEnumSetupInstancesVtbl): IUnknown(IUnknownVtbl) {
+ fn Next(
+ celt: ULONG,
+ rgelt: *mut *mut ISetupInstance,
+ pceltFetched: *mut ULONG,
+ ) -> HRESULT,
+ fn Skip(
+ celt: ULONG,
+ ) -> HRESULT,
+ fn Reset() -> HRESULT,
+ fn Clone(
+ ppenum: *mut *mut IEnumSetupInstances,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0x42843719, 0xdb4c, 0x46c2, 0x8e, 0x7c, 0x64, 0xf1, 0x81, 0x6e, 0xfd, 0x5b)]
+interface ISetupConfiguration(ISetupConfigurationVtbl): IUnknown(IUnknownVtbl) {
+ fn EnumInstances(
+ ppEnumInstances: *mut *mut IEnumSetupInstances,
+ ) -> HRESULT,
+ fn GetInstanceForCurrentProcess(
+ ppInstance: *mut *mut ISetupInstance,
+ ) -> HRESULT,
+ fn GetInstanceForPath(
+ wzPath: LPCWSTR,
+ ppInstance: *mut *mut ISetupInstance,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0x26aab78c, 0x4a60, 0x49d6, 0xaf, 0x3b, 0x3c, 0x35, 0xbc, 0x93, 0x36, 0x5d)]
+interface ISetupConfiguration2(ISetupConfiguration2Vtbl):
+ ISetupConfiguration(ISetupConfigurationVtbl) {
+ fn EnumAllInstances(
+ ppEnumInstances: *mut *mut IEnumSetupInstances,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0xda8d8a16, 0xb2b6, 0x4487, 0xa2, 0xf1, 0x59, 0x4c, 0xcc, 0xcd, 0x6b, 0xf5)]
+interface ISetupPackageReference(ISetupPackageReferenceVtbl): IUnknown(IUnknownVtbl) {
+ fn GetId(
+ pbstrId: *mut BSTR,
+ ) -> HRESULT,
+ fn GetVersion(
+ pbstrVersion: *mut BSTR,
+ ) -> HRESULT,
+ fn GetChip(
+ pbstrChip: *mut BSTR,
+ ) -> HRESULT,
+ fn GetLanguage(
+ pbstrLanguage: *mut BSTR,
+ ) -> HRESULT,
+ fn GetBranch(
+ pbstrBranch: *mut BSTR,
+ ) -> HRESULT,
+ fn GetType(
+ pbstrType: *mut BSTR,
+ ) -> HRESULT,
+ fn GetUniqueId(
+ pbstrUniqueId: *mut BSTR,
+ ) -> HRESULT,
+}}
+
+RIDL! {#[uuid(0x42b21b78, 0x6192, 0x463e, 0x87, 0xbf, 0xd5, 0x77, 0x83, 0x8f, 0x1d, 0x5c)]
+interface ISetupHelper(ISetupHelperVtbl): IUnknown(IUnknownVtbl) {
+ fn ParseVersion(
+ pwszVersion: LPCOLESTR,
+ pullVersion: PULONGLONG,
+ ) -> HRESULT,
+ fn ParseVersionRange(
+ pwszVersionRange: LPCOLESTR,
+ pullMinVersion: PULONGLONG,
+ pullMaxVersion: PULONGLONG,
+ ) -> HRESULT,
+}}
+
+DEFINE_GUID! {CLSID_SetupConfiguration,
+0x177f0c4a, 0x1cd3, 0x4de7, 0xa3, 0x2c, 0x71, 0xdb, 0xbb, 0x9f, 0xa3, 0x6d}
+
+// Safe wrapper around the COM interfaces
+pub struct SetupConfiguration(ComPtr<ISetupConfiguration>);
+
+impl SetupConfiguration {
+ pub fn new() -> Result<SetupConfiguration, i32> {
+ let mut obj = null_mut();
+ let err = unsafe {
+ CoCreateInstance(
+ &CLSID_SetupConfiguration,
+ null_mut(),
+ CLSCTX_ALL,
+ &ISetupConfiguration::uuidof(),
+ &mut obj,
+ )
+ };
+ if err < 0 {
+ return Err(err);
+ }
+ let obj = unsafe { ComPtr::from_raw(obj as *mut ISetupConfiguration) };
+ Ok(SetupConfiguration(obj))
+ }
+ pub fn get_instance_for_current_process(&self) -> Result<SetupInstance, i32> {
+ let mut obj = null_mut();
+ let err = unsafe { self.0.GetInstanceForCurrentProcess(&mut obj) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(unsafe { SetupInstance::from_raw(obj) })
+ }
+ pub fn enum_instances(&self) -> Result<EnumSetupInstances, i32> {
+ let mut obj = null_mut();
+ let err = unsafe { self.0.EnumInstances(&mut obj) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(unsafe { EnumSetupInstances::from_raw(obj) })
+ }
+ pub fn enum_all_instances(&self) -> Result<EnumSetupInstances, i32> {
+ let mut obj = null_mut();
+ let this = self.0.cast::<ISetupConfiguration2>()?;
+ let err = unsafe { this.EnumAllInstances(&mut obj) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(unsafe { EnumSetupInstances::from_raw(obj) })
+ }
+}
+
+pub struct SetupInstance(ComPtr<ISetupInstance>);
+
+impl SetupInstance {
+ pub unsafe fn from_raw(obj: *mut ISetupInstance) -> SetupInstance {
+ SetupInstance(ComPtr::from_raw(obj))
+ }
+ pub fn instance_id(&self) -> Result<OsString, i32> {
+ let mut s = null();
+ let err = unsafe { self.0.GetInstanceId(&mut s) };
+ let bstr = unsafe { BStr::from_raw(s) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(bstr.to_osstring())
+ }
+ pub fn installation_name(&self) -> Result<OsString, i32> {
+ let mut s = null();
+ let err = unsafe { self.0.GetInstallationName(&mut s) };
+ let bstr = unsafe { BStr::from_raw(s) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(bstr.to_osstring())
+ }
+ pub fn installation_path(&self) -> Result<OsString, i32> {
+ let mut s = null();
+ let err = unsafe { self.0.GetInstallationPath(&mut s) };
+ let bstr = unsafe { BStr::from_raw(s) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(bstr.to_osstring())
+ }
+ pub fn installation_version(&self) -> Result<OsString, i32> {
+ let mut s = null();
+ let err = unsafe { self.0.GetInstallationVersion(&mut s) };
+ let bstr = unsafe { BStr::from_raw(s) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(bstr.to_osstring())
+ }
+ pub fn product_path(&self) -> Result<OsString, i32> {
+ let mut s = null();
+ let this = self.0.cast::<ISetupInstance2>()?;
+ let err = unsafe { this.GetProductPath(&mut s) };
+ let bstr = unsafe { BStr::from_raw(s) };
+ if err < 0 {
+ return Err(err);
+ }
+ Ok(bstr.to_osstring())
+ }
+}
+
+pub struct EnumSetupInstances(ComPtr<IEnumSetupInstances>);
+
+impl EnumSetupInstances {
+ pub unsafe fn from_raw(obj: *mut IEnumSetupInstances) -> EnumSetupInstances {
+ EnumSetupInstances(ComPtr::from_raw(obj))
+ }
+}
+
+impl Iterator for EnumSetupInstances {
+ type Item = Result<SetupInstance, i32>;
+ fn next(&mut self) -> Option<Result<SetupInstance, i32>> {
+ let mut obj = null_mut();
+ let err = unsafe { self.0.Next(1, &mut obj, null_mut()) };
+ if err < 0 {
+ return Some(Err(err));
+ }
+ if err == S_FALSE {
+ return None;
+ }
+ Some(Ok(unsafe { SetupInstance::from_raw(obj) }))
+ }
+}
diff --git a/vendor/cc/src/windows/vs_instances.rs b/vendor/cc/src/windows/vs_instances.rs
new file mode 100644
index 00000000..3e6eeed9
--- /dev/null
+++ b/vendor/cc/src/windows/vs_instances.rs
@@ -0,0 +1,199 @@
+use std::borrow::Cow;
+use std::collections::HashMap;
+use std::convert::TryFrom;
+use std::io::BufRead;
+use std::path::PathBuf;
+
+use crate::windows::setup_config::{EnumSetupInstances, SetupInstance};
+
+pub enum VsInstance {
+ Com(SetupInstance),
+ Vswhere(VswhereInstance),
+}
+
+impl VsInstance {
+ pub fn installation_name(&self) -> Option<Cow<str>> {
+ match self {
+ VsInstance::Com(s) => s
+ .installation_name()
+ .ok()
+ .and_then(|s| s.into_string().ok())
+ .map(Cow::from),
+ VsInstance::Vswhere(v) => v.map.get("installationName").map(Cow::from),
+ }
+ }
+
+ pub fn installation_path(&self) -> Option<PathBuf> {
+ match self {
+ VsInstance::Com(s) => s.installation_path().ok().map(PathBuf::from),
+ VsInstance::Vswhere(v) => v.map.get("installationPath").map(PathBuf::from),
+ }
+ }
+
+ pub fn installation_version(&self) -> Option<Cow<str>> {
+ match self {
+ VsInstance::Com(s) => s
+ .installation_version()
+ .ok()
+ .and_then(|s| s.into_string().ok())
+ .map(Cow::from),
+ VsInstance::Vswhere(v) => v.map.get("installationVersion").map(Cow::from),
+ }
+ }
+}
+
+pub enum VsInstances {
+ ComBased(EnumSetupInstances),
+ VswhereBased(VswhereInstance),
+}
+
+impl IntoIterator for VsInstances {
+ type Item = VsInstance;
+ #[allow(bare_trait_objects)]
+ type IntoIter = Box<Iterator<Item = Self::Item>>;
+
+ fn into_iter(self) -> Self::IntoIter {
+ match self {
+ VsInstances::ComBased(e) => {
+ Box::new(e.into_iter().filter_map(Result::ok).map(VsInstance::Com))
+ }
+ VsInstances::VswhereBased(v) => Box::new(std::iter::once(VsInstance::Vswhere(v))),
+ }
+ }
+}
+
+#[derive(Debug)]
+pub struct VswhereInstance {
+ map: HashMap<String, String>,
+}
+
+impl TryFrom<&Vec<u8>> for VswhereInstance {
+ type Error = &'static str;
+
+ fn try_from(output: &Vec<u8>) -> Result<Self, Self::Error> {
+ let map: HashMap<_, _> = output
+ .lines()
+ .map_while(Result::ok)
+ .filter_map(|s| {
+ let mut splitn = s.splitn(2, ": ");
+ Some((splitn.next()?.to_owned(), splitn.next()?.to_owned()))
+ })
+ .collect();
+
+ if !map.contains_key("installationName")
+ || !map.contains_key("installationPath")
+ || !map.contains_key("installationVersion")
+ {
+ return Err("required properties not found");
+ }
+
+ Ok(Self { map })
+ }
+}
+
+#[cfg(test)]
+mod tests_ {
+ use std::borrow::Cow;
+ use std::convert::TryFrom;
+ use std::path::PathBuf;
+
+ #[test]
+ fn it_parses_vswhere_output_correctly() {
+ let output = br"instanceId: 58104422
+installDate: 21/02/2021 21:50:33
+installationName: VisualStudio/16.9.2+31112.23
+installationPath: C:\Program Files (x86)\Microsoft Visual Studio\2019\BuildTools
+installationVersion: 16.9.31112.23
+productId: Microsoft.VisualStudio.Product.BuildTools
+productPath: C:\Program Files (x86)\Microsoft Visual Studio\2019\BuildTools\Common7\Tools\LaunchDevCmd.bat
+state: 4294967295
+isComplete: 1
+isLaunchable: 1
+isPrerelease: 0
+isRebootRequired: 0
+displayName: Visual Studio Build Tools 2019
+description: The Visual Studio Build Tools allows you to build native and managed MSBuild-based applications without requiring the Visual Studio IDE. There are options to install the Visual C++ compilers and libraries, MFC, ATL, and C++/CLI support.
+channelId: VisualStudio.16.Release
+channelUri: https://aka.ms/vs/16/release/channel
+enginePath: C:\Program Files (x86)\Microsoft Visual Studio\Installer\resources\app\ServiceHub\Services\Microsoft.VisualStudio.Setup.Service
+releaseNotes: https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.9#16.9.2
+thirdPartyNotices: https://go.microsoft.com/fwlink/?LinkId=660909
+updateDate: 2021-03-17T21:16:46.5963702Z
+catalog_buildBranch: d16.9
+catalog_buildVersion: 16.9.31112.23
+catalog_id: VisualStudio/16.9.2+31112.23
+catalog_localBuild: build-lab
+catalog_manifestName: VisualStudio
+catalog_manifestType: installer
+catalog_productDisplayVersion: 16.9.2
+catalog_productLine: Dev16
+catalog_productLineVersion: 2019
+catalog_productMilestone: RTW
+catalog_productMilestoneIsPreRelease: False
+catalog_productName: Visual Studio
+catalog_productPatchVersion: 2
+catalog_productPreReleaseMilestoneSuffix: 1.0
+catalog_productSemanticVersion: 16.9.2+31112.23
+catalog_requiredEngineVersion: 2.9.3365.38425
+properties_campaignId: 156063665.1613940062
+properties_channelManifestId: VisualStudio.16.Release/16.9.2+31112.23
+properties_nickname:
+properties_setupEngineFilePath: C:\Program Files (x86)\Microsoft Visual Studio\Installer\vs_installershell.exe
+"
+ .to_vec();
+
+ let vswhere_instance = super::VswhereInstance::try_from(&output);
+ assert!(vswhere_instance.is_ok());
+
+ let vs_instance = super::VsInstance::Vswhere(vswhere_instance.unwrap());
+ assert_eq!(
+ vs_instance.installation_name(),
+ Some(Cow::from("VisualStudio/16.9.2+31112.23"))
+ );
+ assert_eq!(
+ vs_instance.installation_path(),
+ Some(PathBuf::from(
+ r"C:\Program Files (x86)\Microsoft Visual Studio\2019\BuildTools"
+ ))
+ );
+ assert_eq!(
+ vs_instance.installation_version(),
+ Some(Cow::from("16.9.31112.23"))
+ );
+ }
+
+ #[test]
+ fn it_returns_an_error_for_empty_output() {
+ let output = b"".to_vec();
+
+ let vswhere_instance = super::VswhereInstance::try_from(&output);
+
+ assert!(vswhere_instance.is_err());
+ }
+
+ #[test]
+ fn it_returns_an_error_for_output_consisting_of_empty_lines() {
+ let output = br"
+
+"
+ .to_vec();
+
+ let vswhere_instance = super::VswhereInstance::try_from(&output);
+
+ assert!(vswhere_instance.is_err());
+ }
+
+ #[test]
+ fn it_returns_an_error_for_output_without_required_properties() {
+ let output = br"instanceId: 58104422
+installDate: 21/02/2021 21:50:33
+productId: Microsoft.VisualStudio.Product.BuildTools
+productPath: C:\Program Files (x86)\Microsoft Visual Studio\2019\BuildTools\Common7\Tools\LaunchDevCmd.bat
+"
+ .to_vec();
+
+ let vswhere_instance = super::VswhereInstance::try_from(&output);
+
+ assert!(vswhere_instance.is_err());
+ }
+}
diff --git a/vendor/cc/src/windows/winapi.rs b/vendor/cc/src/windows/winapi.rs
new file mode 100644
index 00000000..09965daa
--- /dev/null
+++ b/vendor/cc/src/windows/winapi.rs
@@ -0,0 +1,146 @@
+// Copyright © 2015-2017 winapi-rs developers
+// Licensed under the Apache License, Version 2.0
+// <LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0> or the MIT license
+// <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your option.
+// All files in the project carrying such notice may not be copied, modified, or distributed
+// except according to those terms.
+
+#![allow(bad_style, clippy::upper_case_acronyms)]
+
+use std::os::raw;
+
+pub type wchar_t = u16;
+
+pub use crate::windows::windows_sys::{FILETIME, GUID, HRESULT, SAFEARRAY};
+
+pub type REFIID = *const IID;
+pub type IID = GUID;
+pub type ULONG = raw::c_ulong;
+pub type DWORD = u32;
+pub type LPFILETIME = *mut FILETIME;
+pub type OLECHAR = WCHAR;
+pub type WCHAR = wchar_t;
+pub type LPCOLESTR = *const OLECHAR;
+pub type LCID = DWORD;
+pub type LPCWSTR = *const WCHAR;
+pub type PULONGLONG = *mut ULONGLONG;
+pub type ULONGLONG = u64;
+
+pub trait Interface {
+ fn uuidof() -> GUID;
+}
+
+pub type LPSAFEARRAY = *mut SAFEARRAY;
+
+macro_rules! DEFINE_GUID {
+ (
+ $name:ident, $l:expr, $w1:expr, $w2:expr,
+ $b1:expr, $b2:expr, $b3:expr, $b4:expr, $b5:expr, $b6:expr, $b7:expr, $b8:expr
+ ) => {
+ pub const $name: $crate::windows::winapi::GUID = $crate::windows::winapi::GUID {
+ data1: $l,
+ data2: $w1,
+ data3: $w2,
+ data4: [$b1, $b2, $b3, $b4, $b5, $b6, $b7, $b8],
+ };
+ };
+}
+
+macro_rules! RIDL {
+ (#[uuid($($uuid:expr),+)]
+ interface $interface:ident ($vtbl:ident) {$(
+ fn $method:ident($($p:ident : $t:ty,)*) -> $rtr:ty,
+ )+}) => (
+ #[repr(C)]
+ pub struct $vtbl {
+ $(pub $method: unsafe extern "system" fn(
+ This: *mut $interface,
+ $($p: $t),*
+ ) -> $rtr,)+
+ }
+ #[repr(C)]
+ pub struct $interface {
+ pub lpVtbl: *const $vtbl,
+ }
+ RIDL!{@impl $interface {$(fn $method($($p: $t,)*) -> $rtr,)+}}
+ RIDL!{@uuid $interface $($uuid),+}
+ );
+ (#[uuid($($uuid:expr),+)]
+ interface $interface:ident ($vtbl:ident) : $pinterface:ident ($pvtbl:ident) {
+ }) => (
+ #[repr(C)]
+ pub struct $vtbl {
+ pub parent: $pvtbl,
+ }
+ #[repr(C)]
+ pub struct $interface {
+ pub lpVtbl: *const $vtbl,
+ }
+ RIDL!{@deref $interface $pinterface}
+ RIDL!{@uuid $interface $($uuid),+}
+ );
+ (#[uuid($($uuid:expr),+)]
+ interface $interface:ident ($vtbl:ident) : $pinterface:ident ($pvtbl:ident) {$(
+ fn $method:ident($($p:ident : $t:ty,)*) -> $rtr:ty,
+ )+}) => (
+ #[repr(C)]
+ pub struct $vtbl {
+ pub parent: $pvtbl,
+ $(pub $method: unsafe extern "system" fn(
+ This: *mut $interface,
+ $($p: $t,)*
+ ) -> $rtr,)+
+ }
+ #[repr(C)]
+ pub struct $interface {
+ pub lpVtbl: *const $vtbl,
+ }
+ RIDL!{@impl $interface {$(fn $method($($p: $t,)*) -> $rtr,)+}}
+ RIDL!{@deref $interface $pinterface}
+ RIDL!{@uuid $interface $($uuid),+}
+ );
+ (@deref $interface:ident $pinterface:ident) => (
+ impl ::std::ops::Deref for $interface {
+ type Target = $pinterface;
+ #[inline]
+ fn deref(&self) -> &$pinterface {
+ unsafe { &*(self as *const $interface as *const $pinterface) }
+ }
+ }
+ );
+ (@impl $interface:ident {$(
+ fn $method:ident($($p:ident : $t:ty,)*) -> $rtr:ty,
+ )+}) => (
+ impl $interface {
+ $(#[inline] pub unsafe fn $method(&self, $($p: $t,)*) -> $rtr {
+ ((*self.lpVtbl).$method)(self as *const _ as *mut _, $($p,)*)
+ })+
+ }
+ );
+ (@uuid $interface:ident
+ $l:expr, $w1:expr, $w2:expr,
+ $b1:expr, $b2:expr, $b3:expr, $b4:expr, $b5:expr, $b6:expr, $b7:expr, $b8:expr
+ ) => (
+ impl $crate::windows::winapi::Interface for $interface {
+ #[inline]
+ fn uuidof() -> $crate::windows::winapi::GUID {
+ $crate::windows::winapi::GUID {
+ data1: $l,
+ data2: $w1,
+ data3: $w2,
+ data4: [$b1, $b2, $b3, $b4, $b5, $b6, $b7, $b8],
+ }
+ }
+ }
+ );
+}
+
+RIDL! {#[uuid(0x00000000, 0x0000, 0x0000, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x46)]
+interface IUnknown(IUnknownVtbl) {
+ fn QueryInterface(
+ riid: REFIID,
+ ppvObject: *mut *mut raw::c_void,
+ ) -> HRESULT,
+ fn AddRef() -> ULONG,
+ fn Release() -> ULONG,
+}}
diff --git a/vendor/cc/src/windows/windows_link.rs b/vendor/cc/src/windows/windows_link.rs
new file mode 100644
index 00000000..d08affe0
--- /dev/null
+++ b/vendor/cc/src/windows/windows_link.rs
@@ -0,0 +1,19 @@
+//! Provides the `link!` macro used by the generated windows bindings.
+//!
+//! This is a simple wrapper around an `extern` block with a `#[link]` attribute.
+//! It's very roughly equivalent to the windows-targets crate.
+
+macro_rules! link_macro {
+ ($library:literal $abi:literal $($link_name:literal)? $(#[$doc:meta])? fn $($function:tt)*) => (
+ // Note: the windows-targets crate uses a pre-built Windows.lib import library which we don't
+ // have in this repo. So instead we always link kernel32.lib and add the rest of the import
+ // libraries below by using an empty extern block. This works because extern blocks are not
+ // connected to the library given in the #[link] attribute.
+ #[link(name = "kernel32")]
+ extern $abi {
+ $(#[link_name=$link_name])?
+ pub fn $($function)*;
+ }
+ )
+}
+pub(crate) use link_macro as link;
diff --git a/vendor/cc/src/windows/windows_sys.rs b/vendor/cc/src/windows/windows_sys.rs
new file mode 100644
index 00000000..c871727d
--- /dev/null
+++ b/vendor/cc/src/windows/windows_sys.rs
@@ -0,0 +1,139 @@
+// This file is autogenerated.
+//
+// To add bindings, edit windows_sys.lst then run:
+//
+// ```
+// cd generate-windows-sys/
+// cargo run
+// ```
+// Bindings generated by `windows-bindgen` 0.62.1
+
+#![allow(
+ non_snake_case,
+ non_upper_case_globals,
+ non_camel_case_types,
+ dead_code,
+ clippy::all
+)]
+
+windows_link::link!("ole32.dll" "system" fn CoCreateInstance(rclsid : *const GUID, punkouter : * mut core::ffi::c_void, dwclscontext : CLSCTX, riid : *const GUID, ppv : *mut *mut core::ffi::c_void) -> HRESULT);
+windows_link::link!("ole32.dll" "system" fn CoInitializeEx(pvreserved : *const core::ffi::c_void, dwcoinit : u32) -> HRESULT);
+windows_link::link!("kernel32.dll" "system" fn FreeLibrary(hlibmodule : HMODULE) -> BOOL);
+windows_link::link!("kernel32.dll" "system" fn GetMachineTypeAttributes(machine : u16, machinetypeattributes : *mut MACHINE_ATTRIBUTES) -> HRESULT);
+windows_link::link!("kernel32.dll" "system" fn GetProcAddress(hmodule : HMODULE, lpprocname : PCSTR) -> FARPROC);
+windows_link::link!("kernel32.dll" "system" fn LoadLibraryA(lplibfilename : PCSTR) -> HMODULE);
+windows_link::link!("kernel32.dll" "system" fn OpenSemaphoreA(dwdesiredaccess : u32, binherithandle : BOOL, lpname : PCSTR) -> HANDLE);
+windows_link::link!("kernel32.dll" "system" fn PeekNamedPipe(hnamedpipe : HANDLE, lpbuffer : *mut core::ffi::c_void, nbuffersize : u32, lpbytesread : *mut u32, lptotalbytesavail : *mut u32, lpbytesleftthismessage : *mut u32) -> BOOL);
+windows_link::link!("advapi32.dll" "system" fn RegCloseKey(hkey : HKEY) -> WIN32_ERROR);
+windows_link::link!("advapi32.dll" "system" fn RegEnumKeyExW(hkey : HKEY, dwindex : u32, lpname : PWSTR, lpcchname : *mut u32, lpreserved : *const u32, lpclass : PWSTR, lpcchclass : *mut u32, lpftlastwritetime : *mut FILETIME) -> WIN32_ERROR);
+windows_link::link!("advapi32.dll" "system" fn RegOpenKeyExW(hkey : HKEY, lpsubkey : PCWSTR, uloptions : u32, samdesired : REG_SAM_FLAGS, phkresult : *mut HKEY) -> WIN32_ERROR);
+windows_link::link!("advapi32.dll" "system" fn RegQueryValueExW(hkey : HKEY, lpvaluename : PCWSTR, lpreserved : *const u32, lptype : *mut REG_VALUE_TYPE, lpdata : *mut u8, lpcbdata : *mut u32) -> WIN32_ERROR);
+windows_link::link!("kernel32.dll" "system" fn ReleaseSemaphore(hsemaphore : HANDLE, lreleasecount : i32, lppreviouscount : *mut i32) -> BOOL);
+windows_link::link!("oleaut32.dll" "system" fn SysFreeString(bstrstring : BSTR));
+windows_link::link!("oleaut32.dll" "system" fn SysStringLen(pbstr : BSTR) -> u32);
+windows_link::link!("kernel32.dll" "system" fn WaitForSingleObject(hhandle : HANDLE, dwmilliseconds : u32) -> WAIT_EVENT);
+pub type ADVANCED_FEATURE_FLAGS = u16;
+pub type BOOL = i32;
+pub type BSTR = *const u16;
+pub type CLSCTX = u32;
+pub const CLSCTX_ALL: CLSCTX = 23u32;
+pub type COINIT = i32;
+pub const COINIT_MULTITHREADED: COINIT = 0i32;
+pub const ERROR_NO_MORE_ITEMS: WIN32_ERROR = 259u32;
+pub const ERROR_SUCCESS: WIN32_ERROR = 0u32;
+pub const FALSE: BOOL = 0i32;
+pub type FARPROC = Option<unsafe extern "system" fn() -> isize>;
+#[repr(C)]
+#[derive(Clone, Copy, Default)]
+pub struct FILETIME {
+ pub dwLowDateTime: u32,
+ pub dwHighDateTime: u32,
+}
+pub const FILE_ATTRIBUTE_TEMPORARY: FILE_FLAGS_AND_ATTRIBUTES = 256u32;
+pub type FILE_FLAGS_AND_ATTRIBUTES = u32;
+#[repr(C)]
+#[derive(Clone, Copy)]
+pub struct GUID {
+ pub data1: u32,
+ pub data2: u16,
+ pub data3: u16,
+ pub data4: [u8; 8],
+}
+impl GUID {
+ pub const fn from_u128(uuid: u128) -> Self {
+ Self {
+ data1: (uuid >> 96) as u32,
+ data2: (uuid >> 80 & 0xffff) as u16,
+ data3: (uuid >> 64 & 0xffff) as u16,
+ data4: (uuid as u64).to_be_bytes(),
+ }
+ }
+}
+pub type HANDLE = *mut core::ffi::c_void;
+pub type HINSTANCE = *mut core::ffi::c_void;
+pub type HKEY = *mut core::ffi::c_void;
+pub const HKEY_LOCAL_MACHINE: HKEY = -2147483646i32 as _;
+pub type HMODULE = *mut core::ffi::c_void;
+pub type HRESULT = i32;
+pub type IMAGE_FILE_MACHINE = u16;
+pub const IMAGE_FILE_MACHINE_AMD64: IMAGE_FILE_MACHINE = 34404u16;
+pub const IID_IUnknown: GUID = GUID::from_u128(0x00000000_0000_0000_c000_000000000046);
+#[repr(C)]
+pub struct IUnknown_Vtbl {
+ pub QueryInterface: unsafe extern "system" fn(
+ this: *mut core::ffi::c_void,
+ iid: *const GUID,
+ interface: *mut *mut core::ffi::c_void,
+ ) -> HRESULT,
+ pub AddRef: unsafe extern "system" fn(this: *mut core::ffi::c_void) -> u32,
+ pub Release: unsafe extern "system" fn(this: *mut core::ffi::c_void) -> u32,
+}
+pub const KEY_READ: REG_SAM_FLAGS = 131097u32;
+pub const KEY_WOW64_32KEY: REG_SAM_FLAGS = 512u32;
+pub type MACHINE_ATTRIBUTES = i32;
+pub type PCSTR = *const u8;
+pub type PCWSTR = *const u16;
+pub type PWSTR = *mut u16;
+pub type REG_SAM_FLAGS = u32;
+pub const REG_SZ: REG_VALUE_TYPE = 1u32;
+pub type REG_VALUE_TYPE = u32;
+#[repr(C)]
+#[derive(Clone, Copy)]
+pub struct SAFEARRAY {
+ pub cDims: u16,
+ pub fFeatures: ADVANCED_FEATURE_FLAGS,
+ pub cbElements: u32,
+ pub cLocks: u32,
+ pub pvData: *mut core::ffi::c_void,
+ pub rgsabound: [SAFEARRAYBOUND; 1],
+}
+impl Default for SAFEARRAY {
+ fn default() -> Self {
+ unsafe { core::mem::zeroed() }
+ }
+}
+#[repr(C)]
+#[derive(Clone, Copy, Default)]
+pub struct SAFEARRAYBOUND {
+ pub cElements: u32,
+ pub lLbound: i32,
+}
+pub const SEMAPHORE_MODIFY_STATE: SYNCHRONIZATION_ACCESS_RIGHTS = 2u32;
+pub type SYNCHRONIZATION_ACCESS_RIGHTS = u32;
+pub const S_FALSE: HRESULT = 0x1_u32 as _;
+pub const S_OK: HRESULT = 0x0_u32 as _;
+pub type THREAD_ACCESS_RIGHTS = u32;
+pub const THREAD_SYNCHRONIZE: THREAD_ACCESS_RIGHTS = 1048576u32;
+pub const UserEnabled: MACHINE_ATTRIBUTES = 1i32;
+pub const WAIT_ABANDONED: WAIT_EVENT = 128u32;
+pub type WAIT_EVENT = u32;
+pub const WAIT_FAILED: WAIT_EVENT = 4294967295u32;
+pub const WAIT_OBJECT_0: WAIT_EVENT = 0u32;
+pub const WAIT_TIMEOUT: WAIT_EVENT = 258u32;
+pub type WIN32_ERROR = u32;
+
+#[link(name = "advapi32")]
+#[link(name = "ole32")]
+#[link(name = "oleaut32")]
+extern "C" {}
+use super::windows_link;