Use 16 hexits for git describe to avoid nondeterminism
[ldk-c-bindings] / genbindings.sh
1 #!/usr/bin/env bash
2
3 set -e
4 set -x
5
6 if [ ! -d "$1/lightning" -o "$2" != "true" -a "$2" != "false" ]; then
7         echo "USAGE: $0 path-to-rust-lightning allow-std"
8         echo "allow-std must be either 'true' or 'false' to indicate if we should be built relying on time and pthread support"
9         exit 1
10 fi
11
12 export LC_ALL=C
13
14 # On reasonable systems, we can use realpath here, but OSX is a diva with 20-year-old software.
15 ORIG_PWD="$(pwd)"
16 cd "$1"
17 LIGHTNING_PATH="$(pwd)"
18 LIGHTNING_GIT="$(git describe --tag --dirty --abbrev=16)"
19 cd "$ORIG_PWD"
20
21 # Generate (and reasonably test) C bindings
22
23 # First build the latest c-bindings-gen binary
24 cd c-bindings-gen && cargo build --release && cd ..
25
26 # Then wipe all the existing C bindings (because we're being run in the right directory)
27 # note that we keep the few manually-generated files first:
28 mv lightning-c-bindings/src/c_types/mod.rs ./
29 mv lightning-c-bindings/src/bitcoin ./
30
31 # Before we try to sed the Cargo.toml, generate version define tags
32 # (ignoring any files that we're about to generate)
33
34 git checkout lightning-c-bindings/src
35 git checkout lightning-c-bindings/include
36 BINDINGS_GIT="$(git describe --tag --dirty --abbrev=16)"
37 echo -e "#ifndef _LDK_HEADER_VER" > lightning-c-bindings/include/ldk_ver.h
38 echo -e "static inline int _ldk_strncmp(const char *s1, const char *s2, uint64_t n) {" >> lightning-c-bindings/include/ldk_ver.h
39 echo -e "\tif (n && *s1 != *s2) return 1;" >> lightning-c-bindings/include/ldk_ver.h
40 echo -e "\twhile (n && *s1 != 0 && *s2 != 0) {" >> lightning-c-bindings/include/ldk_ver.h
41 echo -e "\t\ts1++; s2++; n--;" >> lightning-c-bindings/include/ldk_ver.h
42 echo -e "\t\tif (n && *s1 != *s2) return 1;" >> lightning-c-bindings/include/ldk_ver.h
43 echo -e "\t}" >> lightning-c-bindings/include/ldk_ver.h
44 echo -e "\treturn 0;" >> lightning-c-bindings/include/ldk_ver.h
45 echo -e "}" >> lightning-c-bindings/include/ldk_ver.h
46 echo -e "" >> lightning-c-bindings/include/ldk_ver.h
47 echo -e "#define _LDK_HEADER_VER \"$LIGHTNING_GIT\"" >> lightning-c-bindings/include/ldk_ver.h
48 echo -e "#define _LDK_C_BINDINGS_HEADER_VER \"$BINDINGS_GIT\"" >> lightning-c-bindings/include/ldk_ver.h
49 echo -e "static inline const char* check_get_ldk_version() {" >> lightning-c-bindings/include/ldk_ver.h
50 echo -e "\tLDKStr bin_ver = _ldk_get_compiled_version();" >> lightning-c-bindings/include/ldk_ver.h
51 echo -e "\tif (_ldk_strncmp(_LDK_HEADER_VER, (const char*)bin_ver.chars, bin_ver.len) != 0) {" >> lightning-c-bindings/include/ldk_ver.h
52 echo -e "\t// Version mismatch, we don't know what we're running!" >> lightning-c-bindings/include/ldk_ver.h
53 echo -e "\t\treturn 0;" >> lightning-c-bindings/include/ldk_ver.h
54 echo -e "\t}" >> lightning-c-bindings/include/ldk_ver.h
55 echo -e "\treturn _LDK_HEADER_VER;" >> lightning-c-bindings/include/ldk_ver.h
56 echo -e "}" >> lightning-c-bindings/include/ldk_ver.h
57 echo -e "static inline const char* check_get_ldk_bindings_version() {" >> lightning-c-bindings/include/ldk_ver.h
58 echo -e "\tLDKStr bin_ver = _ldk_c_bindings_get_compiled_version();" >> lightning-c-bindings/include/ldk_ver.h
59 echo -e "\tif (_ldk_strncmp(_LDK_C_BINDINGS_HEADER_VER, (const char*)bin_ver.chars, bin_ver.len) != 0) {" >> lightning-c-bindings/include/ldk_ver.h
60 echo -e "\t// Version mismatch, we don't know what we're running!" >> lightning-c-bindings/include/ldk_ver.h
61 echo -e "\t\treturn 0;" >> lightning-c-bindings/include/ldk_ver.h
62 echo -e "\t}" >> lightning-c-bindings/include/ldk_ver.h
63 echo -e "\treturn _LDK_C_BINDINGS_HEADER_VER;" >> lightning-c-bindings/include/ldk_ver.h
64 echo -e "}" >> lightning-c-bindings/include/ldk_ver.h
65 echo -e "#endif /* _LDK_HEADER_VER */" >> lightning-c-bindings/include/ldk_ver.h
66
67 rm -rf lightning-c-bindings/src
68
69 mkdir -p lightning-c-bindings/src/{c_types,lightning}
70 mv ./mod.rs lightning-c-bindings/src/c_types/
71 mv ./bitcoin lightning-c-bindings/src/
72
73 # Finally, run the c-bindings-gen binary, building fresh bindings.
74 OUT="$(pwd)/lightning-c-bindings/src"
75 OUT_TEMPL="$(pwd)/lightning-c-bindings/src/c_types/derived.rs"
76 OUT_F="$(pwd)/lightning-c-bindings/include/ldk_rust_types.h"
77 OUT_CPP="$(pwd)/lightning-c-bindings/include/lightningpp.hpp"
78 BIN="$(pwd)/c-bindings-gen/target/release/c-bindings-gen"
79
80 HOST_PLATFORM="$(rustc --version --verbose | grep "host:")"
81
82 function add_crate() {
83         pushd "$LIGHTNING_PATH/$1"
84         RUSTC_BOOTSTRAP=1 cargo rustc --profile=check $3 -- -Zunstable-options --pretty=expanded > /tmp/$1-crate-source.txt
85         popd
86         if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
87                 sed -i".original" "1i\\
88 pub mod $2 {
89 " /tmp/$1-crate-source.txt
90         else
91                 sed -i "1ipub mod $2 {\n" /tmp/$1-crate-source.txt
92         fi
93         echo "}" >> /tmp/$1-crate-source.txt
94         cat /tmp/$1-crate-source.txt >> /tmp/crate-source.txt
95         rm /tmp/$1-crate-source.txt
96         if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
97                 # OSX sed is for some reason not compatible with GNU sed
98                 sed -E -i '' 's|#?'$1' = \{ .*|'$1' = \{ path = "'"$LIGHTNING_PATH"'/'$1'" '"$4"' }|' lightning-c-bindings/Cargo.toml
99         else
100                 sed -E -i 's|#?'$1' = \{ .*|'$1' = \{ path = "'"$LIGHTNING_PATH"'/'$1'" '"$4"' }|' lightning-c-bindings/Cargo.toml
101         fi
102 }
103
104 function drop_crate() {
105         if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
106                 # OSX sed is for some reason not compatible with GNU sed
107                 sed -E -i '' 's|'$1' = \{ (.*)|#'$1' = \{ \1|' lightning-c-bindings/Cargo.toml
108         else
109                 sed -E -i 's|'$1' = \{ (.*)|#'$1' = \{ \1|' lightning-c-bindings/Cargo.toml
110         fi
111 }
112
113 echo > /tmp/crate-source.txt
114 if [ "$2" = "true" ]; then
115         add_crate lightning lightning --features=allow_wallclock_use ', features = ["allow_wallclock_use"]'
116         add_crate "lightning-persister" "lightning_persister"
117         add_crate "lightning-background-processor" "lightning_background_processor"
118 else
119         add_crate lightning lightning
120         drop_crate "lightning-persister"
121         drop_crate "lightning-background-processor"
122 fi
123 add_crate "lightning-invoice" "lightning_invoice"
124
125 cat /tmp/crate-source.txt | RUST_BACKTRACE=1 "$BIN" "$OUT/" "$OUT_TEMPL" "$OUT_F" "$OUT_CPP"
126
127 echo -e '#[no_mangle]' >> lightning-c-bindings/src/version.rs
128 echo -e 'pub extern "C" fn _ldk_get_compiled_version() -> crate::c_types::Str {' >> lightning-c-bindings/src/version.rs
129 echo -e '\t"'"$LIGHTNING_GIT"'".into()' >> lightning-c-bindings/src/version.rs
130 echo -e '}' >> lightning-c-bindings/src/version.rs
131 echo -e '#[no_mangle]' >> lightning-c-bindings/src/version.rs
132 echo -e 'pub extern "C" fn _ldk_c_bindings_get_compiled_version() -> crate::c_types::Str {' >> lightning-c-bindings/src/version.rs
133 echo -e '\t"'"$BINDINGS_GIT"'".into()' >> lightning-c-bindings/src/version.rs
134 echo -e '}' >> lightning-c-bindings/src/version.rs
135
136 # Set path to include our rustc wrapper as well as cbindgen
137 PATH="$(pwd)/deterministic-build-wrappers:$PATH:~/.cargo/bin"
138 # Now cd to lightning-c-bindings, build the generated bindings, and call cbindgen to build a C header file
139 cd lightning-c-bindings
140
141 # Remap paths so that our builds are deterministic
142 export RUSTFLAGS="--remap-path-prefix $LIGHTNING_PATH=rust-lightning --remap-path-prefix $(pwd)=ldk-c-bindings --remap-path-prefix $HOME/.cargo= -C target-cpu=sandybridge"
143
144 # If the C compiler supports it, also set -ffile-prefix-map
145 echo "int main() {}" > genbindings_path_map_test_file.c
146 clang -o /dev/null -ffile-prefix-map=$HOME/.cargo= genbindings_path_map_test_file.c > /dev/null 2>&1 &&
147 # Now that we've done our last non-LTO build, turn on LTO in CFLAGS as well
148 export BASE_CFLAGS="-ffile-prefix-map=$HOME/.cargo= -frandom-seed=42"
149 ENV_TARGET=$(rustc --version --verbose | grep host | awk '{ print $2 }' | sed 's/-/_/g')
150 export CFLAGS_$ENV_TARGET="$BASE_CFLAGS -march=sandybridge -mcpu=sandybridge -mtune=sandybridge"
151 rm genbindings_path_map_test_file.c
152
153 cargo build
154 cbindgen -v --config cbindgen.toml -o include/lightning.h >/dev/null 2>&1
155
156 # cbindgen is relatively braindead when exporting typedefs -
157 # it happily exports all our typedefs for private types, even with the
158 # generics we specified in C mode! So we drop all those types manually here.
159 if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
160         # OSX sed is for some reason not compatible with GNU sed
161         sed -i '' 's/typedef LDKnative.*Import.*LDKnative.*;//g' include/lightning.h
162
163         # stdlib.h doesn't exist in clang's wasm sysroot, and cbindgen
164         # doesn't actually use it anyway, so drop the import.
165         sed -i '' 's/#include <stdlib.h>/#include <ldk_rust_types.h>/g' include/lightning.h
166 else
167         sed -i 's/typedef LDKnative.*Import.*LDKnative.*;//g' include/lightning.h
168
169         # stdlib.h doesn't exist in clang's wasm sysroot, and cbindgen
170         # doesn't actually use it anyway, so drop the import.
171         sed -i 's/#include <stdlib.h>/#include <ldk_rust_types.h>/g' include/lightning.h
172 fi
173
174 # Finally, sanity-check the generated C and C++ bindings with demo apps:
175
176 LOCAL_CFLAGS="-Wall -Wno-nullability-completeness -pthread -Iinclude/"
177
178 # Naively run the C demo app:
179 gcc $LOCAL_CFLAGS -Wall -g -pthread demo.c target/debug/libldk.a -ldl
180 ./a.out
181
182 # And run the C++ demo app in valgrind to test memory model correctness and lack of leaks.
183 g++ $LOCAL_CFLAGS -std=c++11 -Wall -g -pthread demo.cpp -Ltarget/debug/ -lldk -ldl
184 if [ -x "`which valgrind`" ]; then
185         LD_LIBRARY_PATH=target/debug/ valgrind --error-exitcode=4 --memcheck:leak-check=full --show-leak-kinds=all ./a.out
186         echo
187 else
188         echo "WARNING: Please install valgrind for more testing"
189 fi
190
191 # Test a statically-linked C++ version, tracking the resulting binary size and runtime
192 # across debug, LTO, and cross-language LTO builds (using the same compiler each time).
193 clang++ $LOCAL_CFLAGS -std=c++11 demo.cpp target/debug/libldk.a -ldl
194 strip ./a.out
195 echo " C++ Bin size and runtime w/o optimization:"
196 ls -lha a.out
197 time ./a.out > /dev/null
198
199 # Then, check with memory sanitizer, if we're on Linux and have rustc nightly
200 if [ "$HOST_PLATFORM" = "host: x86_64-unknown-linux-gnu" ]; then
201         if cargo +nightly --version >/dev/null 2>&1; then
202                 LLVM_V=$(rustc +nightly --version --verbose | grep "LLVM version" | awk '{ print substr($3, 0, 2); }')
203                 if [ -x "$(which clang-$LLVM_V)" ]; then
204                         cargo +nightly clean
205                         cargo +nightly rustc -Zbuild-std --target x86_64-unknown-linux-gnu -v -- -Zsanitizer=memory -Zsanitizer-memory-track-origins -Cforce-frame-pointers=yes
206                         mv target/x86_64-unknown-linux-gnu/debug/libldk.* target/debug/
207
208                         # Sadly, std doesn't seem to compile into something that is memsan-safe as of Aug 2020,
209                         # so we'll always fail, not to mention we may be linking against git rustc LLVM which
210                         # may differ from clang-llvm, so just allow everything here to fail.
211                         set +e
212
213                         # First the C demo app...
214                         clang-$LLVM_V $LOCAL_CFLAGS -fsanitize=memory -fsanitize-memory-track-origins -g demo.c target/debug/libldk.a -ldl
215                         ./a.out
216
217                         # ...then the C++ demo app
218                         clang++-$LLVM_V $LOCAL_CFLAGS -std=c++11 -fsanitize=memory -fsanitize-memory-track-origins -g demo.cpp target/debug/libldk.a -ldl
219                         ./a.out >/dev/null
220
221                         # restore exit-on-failure
222                         set -e
223                 else
224                         echo "WARNING: Can't use memory sanitizer without clang-$LLVM_V"
225                 fi
226         else
227                 echo "WARNING: Can't use memory sanitizer without rustc nightly"
228         fi
229 else
230         echo "WARNING: Can't use memory sanitizer on non-Linux, non-x86 platforms"
231 fi
232
233 RUSTC_LLVM_V=$(rustc --version --verbose | grep "LLVM version" | awk '{ print substr($3, 0, 2); }' | tr -d '.')
234
235 if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
236         # Apple is special, as always, and decided that they must ensure that there is no way to identify
237         # the LLVM version used. Why? Just to make your life hard.
238         # This list is taken from https://en.wikipedia.org/wiki/Xcode
239         APPLE_CLANG_V=$(clang --version | head -n1 | awk '{ print $4 }')
240         if [ "$APPLE_CLANG_V" = "10.0.0" ]; then
241                 CLANG_LLVM_V="6"
242         elif [ "$APPLE_CLANG_V" = "10.0.1" ]; then
243                 CLANG_LLVM_V="7"
244         elif [ "$APPLE_CLANG_V" = "11.0.0" ]; then
245                 CLANG_LLVM_V="8"
246         elif [ "$APPLE_CLANG_V" = "11.0.3" ]; then
247                 CLANG_LLVM_V="9"
248         elif [ "$APPLE_CLANG_V" = "12.0.0" ]; then
249                 CLANG_LLVM_V="10"
250         else
251                 echo "WARNING: Unable to identify Apple clang LLVM version"
252                 CLANG_LLVM_V="0"
253         fi
254 else
255         CLANG_LLVM_V=$(clang --version | head -n1 | awk '{ print substr($4, 0, 2); }' | tr -d '.')
256 fi
257
258 if [ "$CLANG_LLVM_V" = "$RUSTC_LLVM_V" ]; then
259         CLANG=clang
260         CLANGPP=clang++
261 elif [ "$(which clang-$RUSTC_LLVM_V)" != "" ]; then
262         CLANG="$(which clang-$RUSTC_LLVM_V)"
263         CLANGPP="$(which clang++-$RUSTC_LLVM_V)"
264 fi
265
266 if [ "$CLANG" != "" -a "$CLANGPP" = "" ]; then
267         echo "WARNING: It appears you have a clang-$RUSTC_LLVM_V but not clang++-$RUSTC_LLVM_V. This is common, but leaves us unable to compile C++ with LLVM $RUSTC_LLVM_V"
268         echo "You should create a symlink called clang++-$RUSTC_LLVM_V pointing to $CLANG in $(dirname $CLANG)"
269 fi
270
271 # Finally, if we're on OSX or on Linux, build the final debug binary with address sanitizer (and leave it there)
272 if [ "$HOST_PLATFORM" = "host: x86_64-unknown-linux-gnu" -o "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
273         if [ "$CLANGPP" != "" ]; then
274                 if [ "$HOST_PLATFORM" = "host: x86_64-apple-darwin" ]; then
275                         # OSX sed is for some reason not compatible with GNU sed
276                         sed -i .bk 's/,"cdylib"]/]/g' Cargo.toml
277                 else
278                         sed -i.bk 's/,"cdylib"]/]/g' Cargo.toml
279                 fi
280                 RUSTC_BOOTSTRAP=1 cargo rustc -v -- -Zsanitizer=address -Cforce-frame-pointers=yes || ( mv Cargo.toml.bk Cargo.toml; exit 1)
281                 mv Cargo.toml.bk Cargo.toml
282
283                 # First the C demo app...
284                 $CLANG $LOCAL_CFLAGS -fsanitize=address -g demo.c target/debug/libldk.a -ldl
285                 ASAN_OPTIONS='detect_leaks=1 detect_invalid_pointer_pairs=1 detect_stack_use_after_return=1' ./a.out
286
287                 # ...then the C++ demo app
288                 $CLANGPP $LOCAL_CFLAGS -std=c++11 -fsanitize=address -g demo.cpp target/debug/libldk.a -ldl
289                 ASAN_OPTIONS='detect_leaks=1 detect_invalid_pointer_pairs=1 detect_stack_use_after_return=1' ./a.out >/dev/null
290         else
291                 echo "WARNING: Please install clang-$RUSTC_LLVM_V and clang++-$RUSTC_LLVM_V to build with address sanitizer"
292         fi
293 else
294         echo "WARNING: Can't use address sanitizer on non-Linux, non-OSX non-x86 platforms"
295 fi
296
297 # Now build with LTO on on both C++ and rust, but without cross-language LTO:
298 # Clear stale release build artifacts from previous runs
299 cargo clean --release
300 CARGO_PROFILE_RELEASE_LTO=true cargo rustc -v --release -- -C lto
301 clang++ $LOCAL_CFLAGS -std=c++11 -flto -O2 demo.cpp target/release/libldk.a -ldl
302
303 strip ./a.out
304 echo "C++ Bin size and runtime with only RL (LTO) optimized:"
305 ls -lha a.out
306 time ./a.out > /dev/null
307
308 if [ "$HOST_PLATFORM" != "host: x86_64-apple-darwin" -a "$CLANGPP" != "" ]; then
309         # If we can use cross-language LTO, use it for building C dependencies (i.e. libsecp256k1) as well
310         export CC="$CLANG"
311         # The cc-rs crate tries to force -fdata-sections and -ffunction-sections on, which
312         # breaks -fembed-bitcode, so we turn off cc-rs' default flags and specify exactly
313         # what we want here.
314         export CFLAGS_$ENV_TARGET="$BASE_CFLAGS -fPIC -fembed-bitcode -march=sandybridge"
315         export CRATE_CC_NO_DEFAULTS=true
316 fi
317
318 if [ "$2" = "false" -a "$(rustc --print target-list | grep wasm32-wasi)" != "" ]; then
319         # Test to see if clang supports wasm32 as a target (which is needed to build rust-secp256k1)
320         echo "int main() {}" > genbindings_wasm_test_file.c
321         if clang -nostdlib -o /dev/null --target=wasm32-wasi -Wl,--no-entry genbindings_wasm_test_file.c > /dev/null 2>&1; then
322                 # And if it does, build a WASM binary without capturing errors
323                 export CFLAGS_wasm32_wasi="$BASE_CFLAGS -target wasm32"
324                 cargo rustc -v --target=wasm32-wasi
325                 export CFLAGS_wasm32_wasi="$BASE_CFLAGS -target wasm32 -Os"
326                 CARGO_PROFILE_RELEASE_LTO=true cargo rustc -v --release --target=wasm32-wasi -- -C embed-bitcode=yes -C opt-level=s -C linker-plugin-lto -C lto
327         else
328                 echo "Cannot build WASM lib as clang does not seem to support the wasm32-wasi target"
329         fi
330         rm genbindings_wasm_test_file.c
331 fi
332
333 if [ "$HOST_PLATFORM" != "host: x86_64-apple-darwin" -a "$CLANGPP" != "" ]; then
334         # Finally, test cross-language LTO. Note that this will fail if rustc and clang++
335         # build against different versions of LLVM (eg when rustc is installed via rustup
336         # or Ubuntu packages). This should work fine on Distros which do more involved
337         # packaging than simply shipping the rustup binaries (eg Debian should Just Work
338         # here).
339         export CFLAGS_$ENV_TARGET="$BASE_CFLAGS -O3 -fPIC -fembed-bitcode -march=sandybridge"
340         # Rust doesn't recognize CFLAGS changes, so we need to clean build artifacts
341         cargo clean --release
342         CARGO_PROFILE_RELEASE_LTO=true cargo rustc -v --release -- -C linker-plugin-lto -C lto -C link-arg=-fuse-ld=lld
343         $CLANGPP $LOCAL_CFLAGS -flto -fuse-ld=lld -O2 demo.cpp target/release/libldk.a -ldl
344         strip ./a.out
345         echo "C++ Bin size and runtime with cross-language LTO:"
346         ls -lha a.out
347         time ./a.out > /dev/null
348 else
349         echo "WARNING: Building with cross-language LTO is not avilable on OSX or without clang-$RUSTC_LLVM_V"
350 fi