Skip to content

marvin-hansen/bazel_rust_cross_llvm

Repository files navigation

Cross Compilation

Pure LLVM setup. No MUSL.

For cross compilation, you have to specify a custom platform to let Bazel know that you are compiling for a different platform than the default host platform.

The example code is setup to cross compile from the following hosts to the the following targets:

  • {linux, x86_64} -> {linux, aarch64}
  • {linux, aarch64} -> {linux, x86_64}
  • {darwin, aarch64 (Apple Silicon)} -> {linux, x86_64}
  • {darwin, aarch64 (Apple Silicon)} -> {linux, aarch64}

MacOS on x86_64 (Intel) may work, but has not been tested.

You cross-compile by calling the target for each platform:

bazel build //:hello_world_x86_64

or

bazel build //:hello_world_aarch64

You can also build all targets at once:

bazel build //...

And you can run all test with:

bazel test //...

If you want to apply full release mode optimization, please run Bazel with the -c opt flag.

bazel build -c opt //...

bazel test -c opt //...

This may take a while because three binaries with all dependencies are built and optimized.

Cross compilation

The actual cross compilation is handled by the platform_transition_binary from the Aspect rule. For example, when targeting linux on Arm, you would add the following to your BUILD file:

platform_transition_binary(
    name = "hello_world_aarch64",
    binary = ":hello_world_host",
    target_platform = "//build/platforms:linux-aarch64",
)

Here, hello_world_host is a regular Rust binary.

Release Mode Optimization

By default, Bazel compiles everything in debug mode unless the -c opt flag is passed on the command line. However, to enable compiler optimization for Rust binaries, a dedicated configuration is required otherwise the -c opt flag will not be passed on to the Rust compiler. This repo defines the compiler optimization in the build/binary.bzl file. Specifically, the following options are set for release mode:

  • "-Clto=true",
  • "-Ccodegen-units=1",
  • "-Cpanic=abort",
  • "-Copt-level=3",
  • "-Cstrip=symbols",

All optimizations have been wrapped in a custom Rust binary rule that serves as a drop in replace for the conventional rust_binary rule:

load("//:build/binary.bzl", "build_binary_opt")

build_binary_opt(
    name = "hello_world_host",
    srcs = ["src/main.rs"],
    deps = [
        # External crates
        "//thirdparty/crates:mimalloc",
        "//thirdparty/crates:lz4-sys",
        "//thirdparty/crates:diesel",
        "//thirdparty/crates:tokio",
    ],
)

Note, the compiler optimization is only applied when you pass the -c opt flag on the command line.

Sysroot

The example comes already pre-configured with a generic sysroot for Linux on Intel and ARM that should cover the most common uses cases. See the LLVM section in MODULE.bazel for details.

If you need a custom sysroot i.e. to cross compile system dependencies such as openssl or similar, read through the excellent tutorial by Steven Casagrande:

https://steven.casagrande.io/posts/2024/sysroot-generation-toolchains-llvm/

Small LLVM

This repository comes with two additional branches:

  • small-clang: Replaces the full LLVM toolchain with a smaller version that only contains CLang and a few tools.
  • llvm_musl: Only declares a small host clang toolchain and uses MUSL to cross compile all other targets.

The motivation for small-clang is that it is a much smaller toolchain, about 10% the size of the full llvm toolchain and therefore reduces download times especially on clean CI builds.

The motivation for llvm_musl is that MUSL simply compiles significantly faster than the full llvm toolchain. Ideally, MUSL could also be used as host toolchain, but that has been proven complex to configure due to how rules_rules identify the host toolchain on Linux. On MacOS, MUSL works as host toolchain, on Linux (X86_64) it does not, hence the need for llvm as host toolchain.

Secure Chainguard Base Image

Chainguard pioneered the un-distro wolfi and with it the secure base image. Unlike Distroless, the Chainguard base image does not have Linux Kernel (one less to patch) and is updated within 24 hours whenever one of its dependencies receives an update. Rules Apko take the idea one step further and, instead of pulling in an external base image, the base image is updated and build with every bazel build thus ensuring the Chainguard base image always comes with the latest libc and all available security patches.

That means you just build and release with Bazel knowing the latest security patches have already been applied to all of your containers.

This demo repo has already configured, built and tested the Chainguard base image for the following target platforms:

  • linux-x86_64,
  • linux-aarch64

The relevant configuration is stored in the images/base_image/ folder. If you want to customize the base image i.e. adding sys libraries or packages, please refer to the official documentation, edit the apko.yaml file and re-generate the lockfile, as shown below.

However, if you ever encounter a build hiccup related to the base image, just regenerate the lock file with the following command:

command bazel run @rules_apko//apko lock images/base_image/apko.yaml

OCI Multiarch Image

This example contains a multiarch image derived from the host binary using aspects platform transitions. For that, a custom rule build_multi_arch_image is defined in build/container.bzl. Using this rule means, you define the Rust binary only once for the host platform and this rule does all the heavy lifting for you to create a new binary for each platform and packages them all into a multi-arch OCI image ready to upload to an image registry.

Sortable OCI image tags

Image tagging comes in two flavors:

  • tag_with_sha265
  • tag_with_commit_and_timestamp

The first one generates a tag with the sha256 hash of the binary. The second one generates a tag with the current (head) git commit and the timestamp of the build. The example configuration the second one, with git hash and timestamp, to support continuous delivery systems that require unique and sortable image tags.

Rust Dependencies

Rust dependencies are vendored in the thirdparty directory.

When you want to add or update dependencies, add them to the thirdparty directory and then run:

bazel run //thirdparty:crates_vendor

I've added a number of example dependencies already, among others:

  • libpq (postgres)
  • lz4-sys
  • diesel
  • tokio

Notice, none of these crates actually need a sysroot to build so you can cross compile all of them with either LLVM, MUSL or the Zig C compiler a.k.a the hermetic C toolchain. The sysroot is only there to showcase how configure one and to ensure that most dependencies you add over time
work out of the box on all supported platforms.

Conventionally, postgres would require a sysroot, but the pg-sys module vendors and patches libpq 16.4 so that it can be statically linked and cross compiled with any recent C compiler. See the libpq repo for details.

About

Rust / C Cross Compilation with Bazel

Resources

License

Stars

Watchers

Forks