Skip to main content

rustc_build_sysroot/
lib.rs

1//! Offers an easy way to build a rustc sysroot from source.
2#![warn(missing_docs)]
3// We prefer to always borrow rather than having to figure out whether we can move or borrow (which
4// depends on whether the variable is used again later).
5#![allow(clippy::needless_borrows_for_generic_args)]
6
7use std::collections::hash_map::DefaultHasher;
8use std::env;
9use std::ffi::{OsStr, OsString};
10use std::fs;
11use std::hash::{Hash, Hasher};
12use std::path::{Path, PathBuf};
13use std::process::Command;
14
15use anyhow::{bail, Context, Result};
16use tempfile::TempDir;
17use toml::{Table, Value};
18use walkdir::WalkDir;
19
20/// The name of the profile used for buliding the sysroot.
21const DEFAULT_SYSROOT_PROFILE: &str = "custom_sysroot";
22
23fn rustc_sysroot_dir(mut rustc: Command) -> Result<PathBuf> {
24    let output = rustc
25        .args(["--print", "sysroot"])
26        .output()
27        .context("failed to determine sysroot")?;
28    if !output.status.success() {
29        bail!(
30            "failed to determine sysroot; rustc said:\n{}",
31            String::from_utf8_lossy(&output.stderr).trim_end()
32        );
33    }
34    let sysroot =
35        std::str::from_utf8(&output.stdout).context("sysroot folder is not valid UTF-8")?;
36    let sysroot = PathBuf::from(sysroot.trim_end_matches('\n'));
37    if !sysroot.is_dir() {
38        bail!(
39            "sysroot directory `{}` is not a directory",
40            sysroot.display()
41        );
42    }
43    Ok(sysroot)
44}
45
46/// Returns where the given rustc stores its sysroot source code.
47pub fn rustc_sysroot_src(rustc: Command) -> Result<PathBuf> {
48    let sysroot = rustc_sysroot_dir(rustc)?;
49    let rustc_src = sysroot
50        .join("lib")
51        .join("rustlib")
52        .join("src")
53        .join("rust")
54        .join("library");
55    // There could be symlinks here, so better canonicalize to avoid busting the cache due to path
56    // changes.
57    let rustc_src = rustc_src.canonicalize().unwrap_or(rustc_src);
58    Ok(rustc_src)
59}
60
61/// Encode a list of rustflags for use in CARGO_ENCODED_RUSTFLAGS.
62pub fn encode_rustflags(flags: &[OsString]) -> OsString {
63    let mut res = OsString::new();
64    for flag in flags {
65        if !res.is_empty() {
66            res.push(OsStr::new("\x1f"));
67        }
68        // Cargo ignores this env var if it's not UTF-8.
69        let flag = flag.to_str().expect("rustflags must be valid UTF-8");
70        if flag.contains('\x1f') {
71            panic!("rustflags must not contain `\\x1f` separator");
72        }
73        res.push(flag);
74    }
75    res
76}
77
78/// Make a file writeable.
79#[cfg(unix)]
80fn make_writeable(p: &Path) -> Result<()> {
81    // On Unix we avoid `set_readonly(false)`, see
82    // <https://rust-lang.github.io/rust-clippy/master/index.html#permissions_set_readonly_false>.
83    use std::fs::Permissions;
84    use std::os::unix::fs::PermissionsExt;
85
86    let perms = fs::metadata(p)?.permissions();
87    let perms = Permissions::from_mode(perms.mode() | 0o600); // read/write for owner
88    fs::set_permissions(p, perms).context("cannot set permissions")?;
89    Ok(())
90}
91
92/// Make a file writeable.
93#[cfg(not(unix))]
94fn make_writeable(p: &Path) -> Result<()> {
95    let mut perms = fs::metadata(p)?.permissions();
96    perms.set_readonly(false);
97    fs::set_permissions(p, perms).context("cannot set permissions")?;
98    Ok(())
99}
100
101/// Hash the metadata and size of every file in a directory, recursively.
102fn hash_recursive(path: &Path, hasher: &mut DefaultHasher) -> Result<()> {
103    // We sort the entries to ensure a stable hash.
104    for entry in WalkDir::new(path)
105        .follow_links(true)
106        .sort_by_file_name()
107        .into_iter()
108    {
109        let entry = entry?;
110        // WalkDir yields the directories as well, and File::open will succeed on them. The
111        // reliable way to distinguish directories here is to check explicitly.
112        if entry.file_type().is_dir() {
113            continue;
114        }
115        let meta = entry.metadata()?;
116        // Hashing the mtime and file size should catch basically all mutations,
117        // and is faster than hashing the file contents.
118        meta.modified()?.hash(hasher);
119        meta.len().hash(hasher);
120    }
121    Ok(())
122}
123
124/// The build mode to use for this sysroot.
125#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash)]
126pub enum BuildMode {
127    /// Do a full sysroot build. Suited for all purposes (like the regular sysroot), but only works
128    /// for the host or for targets that have suitable development tools installed.
129    Build,
130    /// Do a check-only sysroot build. This is only suited for check-only builds of crates, but on
131    /// the plus side it works for *arbitrary* targets without having any special tools installed.
132    Check,
133}
134
135impl BuildMode {
136    /// Returns a string with the cargo command matching this build mode.
137    pub fn as_str(&self) -> &str {
138        use BuildMode::*;
139        match self {
140            Build => "build",
141            Check => "check",
142        }
143    }
144}
145
146/// Settings controlling how the sysroot will be built.
147#[derive(Clone, Debug, PartialEq, Eq, Hash)]
148pub enum SysrootConfig {
149    /// Build a no-std (only core and alloc) sysroot.
150    NoStd,
151    /// Build a full sysroot with the `std` and `test` crates.
152    WithStd {
153        /// Features to enable for the `std` crate.
154        std_features: Vec<String>,
155    },
156}
157
158/// Information about a to-be-created sysroot.
159pub struct SysrootBuilder<'a> {
160    sysroot_dir: PathBuf,
161    target: OsString,
162    config: SysrootConfig,
163    mode: BuildMode,
164    rustflags: Vec<OsString>,
165    cargo: Option<Command>,
166    rustc_version: Option<rustc_version::VersionMeta>,
167    when_build_required: Option<Box<dyn FnOnce() + 'a>>,
168}
169
170/// Whether a successful [`SysrootBuilder::build_from_source`] call found a cached sysroot or
171/// built a fresh one.
172#[derive(Clone, Copy, Debug, PartialEq, Eq, Hash)]
173pub enum SysrootStatus {
174    /// The required sysroot is already cached.
175    AlreadyCached,
176    /// A fresh sysroot was just compiled.
177    SysrootBuilt,
178}
179
180/// Hash file name (in target/lib directory).
181const HASH_FILE_NAME: &str = ".rustc-build-sysroot-hash";
182
183impl<'a> SysrootBuilder<'a> {
184    /// Prepare to create a new sysroot in the given folder (that folder should later be passed to
185    /// rustc via `--sysroot`), for the given target.
186    pub fn new(sysroot_dir: &Path, target: impl Into<OsString>) -> Self {
187        let default_flags = &[
188            // This is usually set by bootstrap via `RUSTC_FORCE_UNSTABLE`.
189            "-Zforce-unstable-if-unmarked",
190            // We allow `unexpected_cfgs` as the sysroot has tons of custom `cfg` that rustc does not know about.
191            "-Aunexpected_cfgs",
192        ];
193        SysrootBuilder {
194            sysroot_dir: sysroot_dir.to_owned(),
195            target: target.into(),
196            config: SysrootConfig::WithStd {
197                std_features: vec![],
198            },
199            mode: BuildMode::Build,
200            rustflags: default_flags.iter().map(Into::into).collect(),
201            cargo: None,
202            rustc_version: None,
203            when_build_required: None,
204        }
205    }
206
207    /// Sets the build mode (regular build vs check-only build).
208    pub fn build_mode(mut self, build_mode: BuildMode) -> Self {
209        self.mode = build_mode;
210        self
211    }
212
213    /// Sets the sysroot configuration (which parts of the sysroot to build and with which features).
214    pub fn sysroot_config(mut self, sysroot_config: SysrootConfig) -> Self {
215        self.config = sysroot_config;
216        self
217    }
218
219    /// Appends the given flag.
220    pub fn rustflag(mut self, rustflag: impl Into<OsString>) -> Self {
221        self.rustflags.push(rustflag.into());
222        self
223    }
224
225    /// Appends the given flags.
226    pub fn rustflags(mut self, rustflags: impl IntoIterator<Item = impl Into<OsString>>) -> Self {
227        self.rustflags.extend(rustflags.into_iter().map(Into::into));
228        self
229    }
230
231    /// Sets the cargo command to call.
232    ///
233    /// This will be invoked with `output()`, so if stdout/stderr should be inherited
234    /// then that needs to be set explicitly.
235    pub fn cargo(mut self, cargo: Command) -> Self {
236        self.cargo = Some(cargo);
237        self
238    }
239
240    /// Sets the rustc version information (in case the user has that available).
241    pub fn rustc_version(mut self, rustc_version: rustc_version::VersionMeta) -> Self {
242        self.rustc_version = Some(rustc_version);
243        self
244    }
245
246    /// Sets the hook that will be called if we don't have a cached sysroot available and a new one
247    /// will be compiled.
248    pub fn when_build_required(mut self, when_build_required: impl FnOnce() + 'a) -> Self {
249        self.when_build_required = Some(Box::new(when_build_required));
250        self
251    }
252
253    /// Our configured target can be either a built-in target name, or a path to a target file.
254    /// We use the same logic as rustc to tell which is which:
255    /// https://github.com/rust-lang/rust/blob/8d39ec1825024f3014e1f847942ac5bbfcf055b0/compiler/rustc_session/src/config.rs#L2252-L2263
256    fn target_name(&self) -> &OsStr {
257        let path = Path::new(&self.target);
258        if path.extension().and_then(OsStr::to_str) == Some("json") {
259            // Path::file_stem and Path::extension are the last component of the path split on the
260            // rightmost '.' so if we have an extension we must have a file_stem.
261            path.file_stem().unwrap()
262        } else {
263            // The configured target doesn't end in ".json", so we assume that this is a builtin
264            // target.
265            &self.target
266        }
267    }
268
269    fn sysroot_target_dir(&self) -> PathBuf {
270        self.sysroot_dir
271            .join("lib")
272            .join("rustlib")
273            .join(self.target_name())
274    }
275
276    /// Computes the hash for the sysroot, so that we know whether we have to rebuild.
277    fn sysroot_compute_hash(
278        &self,
279        src_dir: &Path,
280        rustc_version: &rustc_version::VersionMeta,
281    ) -> Result<u64> {
282        let mut hasher = DefaultHasher::new();
283
284        src_dir.hash(&mut hasher);
285        hash_recursive(src_dir, &mut hasher)?;
286        self.config.hash(&mut hasher);
287        self.mode.hash(&mut hasher);
288        self.rustflags.hash(&mut hasher);
289        rustc_version.hash(&mut hasher);
290
291        Ok(hasher.finish())
292    }
293
294    fn sysroot_read_hash(&self) -> Option<u64> {
295        let hash_file = self.sysroot_target_dir().join(HASH_FILE_NAME);
296        let hash = fs::read_to_string(&hash_file).ok()?;
297        hash.parse().ok()
298    }
299
300    /// Generate the contents of the manifest file for the sysroot build.
301    fn gen_manifest(&self, src_dir: &Path) -> String {
302        let crates = match &self.config {
303            SysrootConfig::NoStd => format!(
304                r#"
305                [dependencies.core]
306                path = {src_dir_core:?}
307                [dependencies.alloc]
308                path = {src_dir_alloc:?}
309                [dependencies.compiler_builtins]
310                path = {src_dir_builtins:?}
311                features = ["compiler-builtins", "mem"]
312                "#,
313                src_dir_core = src_dir.join("core"),
314                src_dir_alloc = src_dir.join("alloc"),
315                src_dir_builtins = src_dir.join("compiler-builtins").join("compiler-builtins"),
316            ),
317            SysrootConfig::WithStd { std_features } => format!(
318                r#"
319                [dependencies.std]
320                features = {std_features:?}
321                path = {src_dir_std:?}
322                [dependencies.sysroot]
323                path = {src_dir_sysroot:?}
324                "#,
325                std_features = std_features,
326                src_dir_std = src_dir.join("std"),
327                src_dir_sysroot = src_dir.join("sysroot"),
328            ),
329        };
330
331        // If we include a patch for rustc-std-workspace-std for no_std sysroot builds, we get a
332        // warning from Cargo that the patch is unused. If this patching ever breaks that lint will
333        // probably be very helpful, so it would be best to not disable it.
334        // Currently the only user of rustc-std-workspace-alloc is std_detect, which is only used
335        // by std. So we only need to patch rustc-std-workspace-core in no_std sysroot builds, or
336        // that patch also produces a warning.
337        let unneeded_patches = match &self.config {
338            SysrootConfig::NoStd => &["rustc-std-workspace-alloc", "rustc-std-workspace-std"][..],
339            SysrootConfig::WithStd { .. } => &[][..],
340        };
341
342        let mut patches = extract_patches(src_dir);
343        for (repo, repo_patches) in &mut patches {
344            let repo_patches = repo_patches
345                .as_table_mut()
346                .unwrap_or_else(|| panic!("source `{}` is not a table", repo));
347
348            // Remove any patches that we don't need
349            for krate in unneeded_patches {
350                repo_patches.remove(*krate);
351            }
352
353            // Remap paths to be relative to the source directory.
354            for (krate, patch) in repo_patches {
355                if let Some(path) = patch.get_mut("path") {
356                    let curr_path = path
357                        .as_str()
358                        .unwrap_or_else(|| panic!("`{}.path` is not a string", krate));
359
360                    *path = Value::String(src_dir.join(curr_path).display().to_string());
361                }
362            }
363        }
364
365        let mut table: Table = toml::from_str(&format!(
366            r#"
367            [package]
368            authors = ["rustc-build-sysroot"]
369            name = "custom-local-sysroot"
370            version = "0.0.0"
371            edition = "2018"
372
373            [lib]
374            # empty dummy, just so that things are being built
375            path = "lib.rs"
376
377            [profile.{DEFAULT_SYSROOT_PROFILE}]
378            # We inherit from the local release profile, but then overwrite some
379            # settings to ensure we still get a working sysroot.
380            inherits = "release"
381            panic = 'unwind'
382
383            {crates}
384            "#
385        ))
386        .expect("failed to parse toml");
387
388        table.insert("patch".to_owned(), patches.into());
389        toml::to_string(&table).expect("failed to serialize to toml")
390    }
391
392    /// Build the `self` sysroot from the given sources.
393    ///
394    /// `src_dir` must be the `library` source folder, i.e., the one that contains `std/Cargo.toml`.
395    pub fn build_from_source(mut self, src_dir: &Path) -> Result<SysrootStatus> {
396        // A bit of preparation.
397        if !src_dir.join("std").join("Cargo.toml").exists() {
398            bail!(
399                "{:?} does not seem to be a rust library source folder: `std/Cargo.toml` not found",
400                src_dir
401            );
402        }
403        let sysroot_target_dir = self.sysroot_target_dir();
404        let target_name = self.target_name().to_owned();
405        let cargo = self.cargo.take().unwrap_or_else(|| {
406            Command::new(env::var_os("CARGO").unwrap_or_else(|| OsString::from("cargo")))
407        });
408        let rustc_version = match self.rustc_version.take() {
409            Some(v) => v,
410            None => rustc_version::version_meta()?,
411        };
412
413        // Check if we even need to do anything.
414        let cur_hash = self.sysroot_compute_hash(src_dir, &rustc_version)?;
415        if self.sysroot_read_hash() == Some(cur_hash) {
416            // Already done!
417            return Ok(SysrootStatus::AlreadyCached);
418        }
419
420        // A build is required, so we run the when-build-required function if one was set.
421        if let Some(when_build_required) = self.when_build_required.take() {
422            when_build_required();
423        }
424
425        // Create the *parent* directroy of what we are going to create, so that we can later move
426        // into it.
427        fs::create_dir_all(&sysroot_target_dir.parent().unwrap())
428            .context("failed to create target directory")?;
429        // Remove potentially outdated files. Do this via rename to make it atomic.
430        // We do this *before* the step that takes all the time. That means if a bunch of
431        // these builds happen concurrently, then almost certainly this cleanup will happen before
432        // any of them is done, i.e., we only delete outdated files, not new files.
433        // (The delete will happen automatically when `unstaging_dir` gets dropped.)
434        let unstaging_dir =
435            TempDir::new_in(&self.sysroot_dir).context("failed to create un-staging dir")?;
436        let _ = fs::rename(&sysroot_target_dir, &unstaging_dir); // rename may fail if the dir does not exist yet
437
438        // Prepare a workspace for cargo
439        let build_dir = TempDir::new().context("failed to create tempdir")?;
440        // Cargo.lock
441        let lock_file = build_dir.path().join("Cargo.lock");
442        let lock_file_src = {
443            // Since <https://github.com/rust-lang/rust/pull/128534>, the lock file
444            // lives inside the src_dir.
445            let new_lock_file_name = src_dir.join("Cargo.lock");
446            if new_lock_file_name.exists() {
447                new_lock_file_name
448            } else {
449                // Previously, the lock file lived one folder up.
450                src_dir
451                    .parent()
452                    .expect("src_dir must have a parent")
453                    .join("Cargo.lock")
454            }
455        };
456        fs::copy(lock_file_src, &lock_file)
457            .context("failed to copy lockfile from sysroot source")?;
458        make_writeable(&lock_file).context("failed to make lockfile writeable")?;
459        // Cargo.toml
460        let manifest_file = build_dir.path().join("Cargo.toml");
461        let manifest = self.gen_manifest(src_dir);
462        fs::write(&manifest_file, manifest.as_bytes()).context("failed to write manifest file")?;
463        // lib.rs
464        let lib_file = build_dir.path().join("lib.rs");
465        let lib = match self.config {
466            SysrootConfig::NoStd => r#"#![no_std]"#,
467            SysrootConfig::WithStd { .. } => "",
468        };
469        fs::write(&lib_file, lib.as_bytes()).context("failed to write lib file")?;
470
471        // Run cargo.
472        let mut cmd = cargo;
473        cmd.arg(self.mode.as_str());
474        cmd.arg("--profile");
475        cmd.arg(DEFAULT_SYSROOT_PROFILE);
476        cmd.arg("--manifest-path");
477        cmd.arg(&manifest_file);
478        cmd.arg("--target");
479        cmd.arg(&self.target);
480        // Set rustflags.
481        cmd.env("CARGO_ENCODED_RUSTFLAGS", encode_rustflags(&self.rustflags));
482        // Make sure the results end up where we expect them.
483        // Cargo provides multiple ways to adjust this and we need to overwrite all of them.
484        let build_target_dir = build_dir.path().join("target");
485        cmd.env("CARGO_TARGET_DIR", &build_target_dir);
486        cmd.env("CARGO_BUILD_BUILD_DIR", &build_target_dir);
487        // To avoid metadata conflicts, we need to inject some custom data into the crate hash.
488        // bootstrap does the same at
489        // <https://github.com/rust-lang/rust/blob/c8e12cc8bf0de646234524924f39c85d9f3c7c37/src/bootstrap/builder.rs#L1613>.
490        cmd.env("__CARGO_DEFAULT_LIB_METADATA", "rustc-build-sysroot");
491
492        let output = cmd
493            .output()
494            .context("failed to execute cargo for sysroot build")?;
495        if !output.status.success() {
496            let stderr = String::from_utf8_lossy(&output.stderr);
497            if stderr.is_empty() {
498                bail!("sysroot build failed");
499            } else {
500                bail!("sysroot build failed; stderr:\n{}", stderr);
501            }
502        }
503
504        // Create a staging dir that will become the target sysroot dir (so that we can do the final
505        // installation atomically). By creating this directory inside `sysroot_dir`, we ensure that
506        // it is on the same file system (so `fs::rename`) works. This also means that the mtime of
507        // `sysroot_dir` gets updated, which rustc bootstrap relies on as a signal that a rebuild
508        // happened.
509        fs::create_dir_all(&self.sysroot_dir).context("failed to create sysroot dir")?; // TempDir expects the parent to already exist
510        let staging_dir =
511            TempDir::new_in(&self.sysroot_dir).context("failed to create staging dir")?;
512        // Copy the output to `$staging/lib`.
513        let staging_lib_dir = staging_dir.path().join("lib");
514        fs::create_dir(&staging_lib_dir).context("failed to create staging/lib dir")?;
515        let out_dir = build_target_dir
516            .join(&target_name)
517            .join(DEFAULT_SYSROOT_PROFILE);
518        if out_dir.join("deps").exists() {
519            // Old build dir layout: $out/deps
520            copy_files(&out_dir.join("deps"), &staging_lib_dir)
521                .context("failed to copy cargo out dir (old layout)")?;
522        } else {
523            // New build dir layout: $out/build/*/*/out.
524            for_each_dir(&out_dir.join("build"), |dir| {
525                for_each_dir(dir, |dir| copy_files(&dir.join("out"), &staging_lib_dir))
526            })
527            .context("failed to copy cargo out dir (new layout)")?;
528        }
529
530        // Write the hash file (into the staging dir).
531        fs::write(
532            staging_dir.path().join(HASH_FILE_NAME),
533            cur_hash.to_string().as_bytes(),
534        )
535        .context("failed to write hash file")?;
536
537        // Atomic copy to final destination via rename.
538        // The rename can fail if there was a concurrent build.
539        if fs::rename(staging_dir.path(), sysroot_target_dir).is_err() {
540            // Ensure that that build is identical to what we were going to do.
541            if self.sysroot_read_hash() != Some(cur_hash) {
542                bail!("detected a concurrent sysroot build with different settings");
543            }
544        }
545
546        Ok(SysrootStatus::SysrootBuilt)
547    }
548}
549
550/// Copy all files in `from` to `to`.
551fn copy_files(from: &Path, to: &Path) -> Result<()> {
552    for entry in fs::read_dir(from)? {
553        let entry = entry?;
554        assert!(
555            entry.file_type()?.is_file(),
556            "cargo out dir must not contain directories"
557        );
558        fs::copy(&entry.path(), to.join(entry.file_name()))?;
559    }
560    Ok(())
561}
562
563/// Invoke the closure for each directory inside `path`.
564fn for_each_dir(path: &Path, f: impl Fn(&Path) -> Result<()>) -> Result<()> {
565    for entry in fs::read_dir(path)? {
566        let entry = entry?;
567        if !entry.file_type()?.is_dir() {
568            continue;
569        }
570        f(&entry.path())?;
571    }
572    Ok(())
573}
574
575/// Collect the patches from the sysroot's workspace `Cargo.toml`.
576fn extract_patches(src_dir: &Path) -> Table {
577    // Assume no patch is needed if the workspace Cargo.toml doesn't exist
578    let workspace_manifest = src_dir.join("Cargo.toml");
579    let f = fs::read_to_string(&workspace_manifest).unwrap_or_else(|e| {
580        panic!(
581            "unable to read workspace manifest at `{}`: {}",
582            workspace_manifest.display(),
583            e
584        )
585    });
586    let mut t: Table = toml::from_str(&f).expect("invalid sysroot workspace Cargo.toml");
587    // We only care about the patch table.
588    t.remove("patch")
589        .map(|v| match v {
590            Value::Table(map) => map,
591            _ => panic!("`patch` is not a table"),
592        })
593        .unwrap_or_default()
594}
595
596#[cfg(test)]
597mod tests {
598    use super::*;
599
600    /// Build a manifest for inspecting, returning the manifest and a source directory.
601    fn setup_manifest_test(config: SysrootConfig) -> (Table, TempDir) {
602        let workspace_toml = r#"
603            [workspace]
604            foo = "bar"
605
606            [patch.crates-io]
607            foo = { path = "bar" }
608            rustc-std-workspace-core = { path = "core" }
609            rustc-std-workspace-alloc = { path = "alloc" }
610            rustc-std-workspace-std = { path = "std" }
611        "#;
612
613        let sysroot = tempfile::tempdir().unwrap(); // dummy sysroot dir, shouldn't be written
614        let src_dir = tempfile::tempdir().unwrap();
615        let f = src_dir.path().join("Cargo.toml");
616        fs::write(&f, workspace_toml).unwrap();
617
618        let builder = SysrootBuilder::new(sysroot.path(), "sometarget").sysroot_config(config);
619        let manifest: Table = toml::from_str(&builder.gen_manifest(src_dir.path())).unwrap();
620        (manifest, src_dir)
621    }
622
623    /// Check that a crate's patch is set to the given path, or that it doesn't exist if `None`.
624    #[track_caller]
625    fn check_patch_path(manifest: &Table, krate: &str, path: Option<&Path>) {
626        let patches = &manifest["patch"]["crates-io"];
627        match path {
628            Some(path) => assert_eq!(
629                &patches[krate]["path"].as_str().unwrap(),
630                &path.to_str().unwrap()
631            ),
632            None => assert!(patches.get(krate).is_none()),
633        }
634    }
635
636    #[test]
637    fn check_patches_no_std() {
638        let (manifest, src_dir) = setup_manifest_test(SysrootConfig::NoStd);
639
640        // Ensure that we use the manifest's paths but mapped to the source directory
641        check_patch_path(&manifest, "foo", Some(&src_dir.path().join("bar")));
642        check_patch_path(
643            &manifest,
644            "rustc-std-workspace-core",
645            Some(&src_dir.path().join("core")),
646        );
647
648        // For `NoStd`, we shouldn't get the alloc and std patches.
649        check_patch_path(&manifest, "rustc-std-workspace-alloc", None);
650        check_patch_path(&manifest, "rustc-std-workspace-std", None);
651    }
652
653    #[test]
654    fn check_patches_with_std() {
655        let (manifest, src_dir) = setup_manifest_test(SysrootConfig::WithStd {
656            std_features: Vec::new(),
657        });
658
659        // For `WithStd`, we should get all patches.
660        check_patch_path(&manifest, "foo", Some(&src_dir.path().join("bar")));
661        check_patch_path(
662            &manifest,
663            "rustc-std-workspace-core",
664            Some(&src_dir.path().join("core")),
665        );
666        check_patch_path(
667            &manifest,
668            "rustc-std-workspace-alloc",
669            Some(&src_dir.path().join("alloc")),
670        );
671        check_patch_path(
672            &manifest,
673            "rustc-std-workspace-std",
674            Some(&src_dir.path().join("std")),
675        );
676    }
677}