-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: implement RFC 3553 to add SBOM support #13709
base: master
Are you sure you want to change the base?
Conversation
Thanks for the pull request, and welcome! The Rust team is excited to review your changes, and you should hear from @ehuss (or someone else) some time within the next two weeks. Please see the contribution instructions for more information. Namely, in order to ensure the minimum review times lag, PR authors and assigned reviewers should ensure that the review label (
|
74dafa0
to
190682e
Compare
Much respect for your contribution. From my kind reminders, it seems appropriate to modify the documentation of the corresponding sections, e.g. Configuration, Environment Variables. |
Thanks for the reminder, @heisen-li. Would love to see a doc update, though we should probably focus on the design discussion first, as the location of the configuration is not yet decided. (See rust-lang/rfcs#3553 (comment)). |
One approach for the docs (if this is looking to be merged) is to put the env and config documentation fragments in the Unstable docs. |
190682e
to
ae0881c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just note that I reviewed this as-is, didn't really think too much for the design itself. Thank you for working on this!
☔ The latest upstream changes (presumably #13571) made this pull request unmergeable. Please resolve the merge conflicts. |
1cfd71a
to
376fe1e
Compare
67332d6
to
0aa10e9
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Now I like the idea of having this PR to explore SBOM format. I'll post back issues we've found so far to the RFC. Thank you :)
c8e1bc8
to
8d5fa4d
Compare
☔ The latest upstream changes (presumably #14576) made this pull request unmergeable. Please resolve the merge conflicts. |
bc95299
to
848cc32
Compare
#[derive(Serialize, Clone, Debug, Copy)] | ||
#[serde(rename_all = "kebab-case")] | ||
enum SbomBuildType { | ||
/// A package dependency | ||
Normal, | ||
/// A build script dependency | ||
Build, | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we be consistent with cargo metadata
wrt th schema for this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've renamed this to SbomDependencyKind
. It still has Normal
and Build
options, but they have somewhat different meaning to cargo metadata
. It the current iteration I'm about to push, build
means a build-time dependency (proc-macro or build script).
The metadata format has kind: ['custom-build']
and kind: null
. It's possible we could use the same format here, but it feels a bit awkward.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As for the use of the name normal
, we use it today in
seems like there is enough precedence for this.
We should probably make sure this information gets reflected in the RFC
#[derive(Serialize, Clone, Debug)] | ||
struct SbomProfile { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No case is put on this. Is snake_case
intentional? Looks like thats what we use for cargo metadata
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll explicitly mark them all as snake_case
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When I wrote up our schema docs, I said to be kebab-case
. I don't remember what all led to that (focusing on Cargo.toml
?)
However, looking at our code, we never explicitly state snake_case
, only kebab-case
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did snake_case
for consistency with cargo_metadata
, but if there's a reason for switching to snake-case
for some of these, let me know.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it's called kebab-case btw 😛
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oops, typo!
|
||
/// Describes a package dependency | ||
#[derive(Serialize, Clone, Debug)] | ||
struct SbomPackage { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did we decide whether the sbom will track packages instead of crates?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Currently packages, since the crates within the package should have the same dependency set & profile if compiled in the same invocation. The existing algorithm is merging units within the same package.
If there's a reason to move to crates instead and have more nodes in the graph, I'm open to that, but I currently don't see one.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suspect artifact dependencies could make things interesting
Note that we do call the field in the format crates
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I haven't tried artifact deps. I can add a test and we can revisit.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've the PR to address most of the feedback from @epage. Thanks!
I re-wrote the algorithm for building the sbom graph and made changes to the format. There's also now documentation for the format in unstable.md
that should help reviewers understand what it's looking like.
Before merging, I still want to add more test coverage for additional cases.
#[derive(Serialize, Clone, Debug, Copy)] | ||
#[serde(rename_all = "kebab-case")] | ||
enum SbomBuildType { | ||
/// A package dependency | ||
Normal, | ||
/// A build script dependency | ||
Build, | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've renamed this to SbomDependencyKind
. It still has Normal
and Build
options, but they have somewhat different meaning to cargo metadata
. It the current iteration I'm about to push, build
means a build-time dependency (proc-macro or build script).
The metadata format has kind: ['custom-build']
and kind: null
. It's possible we could use the same format here, but it feels a bit awkward.
#[derive(Serialize, Clone, Debug)] | ||
struct SbomProfile { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll explicitly mark them all as snake_case
|
||
/// Describes a package dependency | ||
#[derive(Serialize, Clone, Debug)] | ||
struct SbomPackage { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Currently packages, since the crates within the package should have the same dependency set & profile if compiled in the same invocation. The existing algorithm is merging units within the same package.
If there's a reason to move to crates instead and have more nodes in the graph, I'm open to that, but I currently don't see one.
src/cargo/core/features.rs
Outdated
"sbom" => self.sbom = parse_empty(k, v)?, | ||
"script" => self.script = parse_empty(k, v)?, | ||
"separate-nightlies" => self.separate_nightlies = parse_empty(k, v)?, | ||
"checksum-freshness" => self.checksum_freshness = parse_empty(k, v)?, | ||
"skip-rustdoc-fingerprint" => self.skip_rustdoc_fingerprint = parse_empty(k, v)?, | ||
"script" => self.script = parse_empty(k, v)?, | ||
"target-applies-to-host" => self.target_applies_to_host = parse_empty(k, v)?, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why was this moved? I believe we generally try to be sorted here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It was inadvertently moved in the 1st commit when merging. The 2nd commit fixes it.
If you prefer, I can squash the two commits together. I was hoping it would be easier to review only the changes since last time, so I added a commit rather than rewriting the 1st one.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've done enough of a pass; let's squash
let sbom = super::build_sbom(&mut self, unit)?; | ||
for sbom_output_file in self.sbom_output_files(unit)? { | ||
let outfile = BufWriter::new(paths::create(sbom_output_file)?); | ||
serde_json::to_writer(outfile, &sbom)?; | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We are outputting the same sbom for each output.
If we're package focused, that makes sense. If we're create focused, then that doesn't quite work.
Is there anything specific about each root artifact that we'd want to call out?
|
||
if gctx.cli_unstable().sbom && build_runner.bcx.build_config.sbom { | ||
let file_list = std::env::join_paths(build_runner.sbom_output_files(unit)?)?; | ||
base.env("CARGO_SBOM_PATH", file_list); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you document this in the unstable docs like it will be when moved to the stable docs?
I want to make sure we call out that it can be multiple files
/// Returns the list of SBOM output file paths for a given [`Unit`]. | ||
/// | ||
/// Only call this function when `sbom` is active. | ||
pub fn sbom_output_files(&self, unit: &Unit) -> CargoResult<Vec<PathBuf>> { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do these need to be calculated in prepare_units
and added to files
?
let sbom_enabled = match unit.target.kind() { | ||
TargetKind::Lib(crate_types) | TargetKind::ExampleLib(crate_types) => { | ||
crate_types.iter().any(|crate_type| { | ||
matches!( | ||
crate_type, | ||
CrateType::Cdylib | CrateType::Dylib | CrateType::Staticlib | ||
) | ||
}) | ||
} | ||
TargetKind::Bin | TargetKind::Test | TargetKind::Bench | TargetKind::ExampleBin => true, | ||
TargetKind::CustomBuild => false, | ||
}; | ||
if !sbom_enabled { | ||
return Ok(Vec::new()); | ||
} | ||
|
||
let files = self | ||
.outputs(unit)? | ||
.iter() | ||
.filter(|o| matches!(o.flavor, FileFlavor::Normal | FileFlavor::Linkable)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have a place to track specific points we want to have called out in the RFC? For me, when we do this is one of them
Similar to the generation of `depinfo` files, a function is called to generated SBOM precursor file named `output_sbom`. It takes the `BuildRunner` & the current `Unit`. The `sbom` flag can be specified as a cargo build option, but it's currently not configured fully. To test the generation the flag is set to `true`. * use SBOM types to serialize data Output source, profile & dependencies Trying to fetch all dependencies This ignores dependencies for custom build scripts. The output should be similar to what `cargo tree` reports. Output package dependencies This is similar to what the `cargo metadata` command outputs. Extract logic to fetch sbom output files This extracts the logic to get the list of SBOM output file paths into its own function in `BuildRunner` for a given Unit. Add test file to check sbom output * add test to check project with bin & lib * extract sbom config into helper function Add build type to dependency Add test to read JSON Still needs to check output. Guard sbom logic behind unstable feature Add test with custom build script Integrate review feedback * disable `sbom` config when `-Zsbom` is not passed as unstable option * refactor tests * add test Expand end-to-end tests This expands the tests to reflect end-to-end tests by comparing the generated JSON output files with expected strings. * add test helper to compare actual & expected JSON content * refactor setup of packages in test Add 'sbom' section to unstable features doc Append SBOM file suffix instead of replacing Instead of replacing the file extension, the `.cargo-sbom.json` suffix is appended to the output file. This is to keep existing file extensions in place. * refactor logic to set `sbom` property from build config * expand build script related test to check JSON output Integrate review feedback * use `PackageIdSpec` instead of only `PackageId` in SBOM output * change `version` of a dependency to `Option<Version>` * output `Vec<CrateType>` instead of only the first found crate type * output rustc workspace wrapper * update 'warning' string in test using `[WARNING]` * use `serde_json::to_writer` to serialize SBOM * set sbom suffix in tests explicitely, instead of using `with_extension` Output additional fields to JSON In case a unit's profile differs from the profile information on root level, it's added to the package information to the JSON output. The verbose output for `rustc -vV` is also written to the `rustc` field in the SBOM. * rename `fetch_packages` to `collect_packages` * update JSON in tests to include profile information Add test to check multiple crate types Add test to check artifact name conflict Use SbomProfile to wrap Profile type This adds the `SbomProfile` to convert the existing `Profile` into, to expose relevant fields. For now it removes the `strip` field, while serializing all other fields. It should keep the output consistent, even when fields in the `Profile` change, e.g. new field added. Document package profile * only export `profile` field in case it differs from root profile Add test to check different features The added test uses a crate with multiple features. The main crate uses the dependency in the normal build & the custom build script with different features. Refactor storing of package dependencies All dependencies for a package are indices into the `packages` list now. This sets the correct association between a dependency & its associated package. * remove `SbomDependency` struct Refactor tests to use snapbox
e93e3b0
to
7266454
Compare
What does this PR try to resolve?
This PR is an implementation of RFC 3553 to add support to generate pre-cursor SBOM files for compiled artifacts in Cargo.
How should we test and review this PR?
The RFC 3553 adds a new option to Cargo to emit SBOM pre-cursor files. A project can be configured either by the new Cargo config field
sbom
.or using the environment variable
CARGO_BUILD_SBOM=true
. Thesbom
option is an unstable feature and requires the-Zsbom
flag to enable it.Check out this branch & compile Cargo. Pick a Cargo project to test it on, then run:
All generated
*.cargo-sbom.json
files are located in thetarget
folder alongside their artifacts. To list all generated files use:then check their content. To see the current output format, see these examples.
What does the PR not solve?
The PR leaves a task(s) open that are either out of scope or should be done in a follow-up PRs.
Additional information
There are a few things that I would like to get feedback on, in particular the generated JSON format is not final. Currently it holds the information listed in the RFC 3553, but it could be further enriched with information only available during builds.
During the implementation a number of questions arose:
Thanks @arlosi, @RobJellinghaus and @lfrancke for initial guidance & feedback.