use crate::derivation::OutputError; use crate::nixhash::{HashAlgo, NixHashWithMode}; use crate::store_path::StorePath; use serde::{Deserialize, Serialize}; use serde_json::Map; #[derive(Clone, Debug, Default, Eq, PartialEq, Serialize)] pub struct Output { pub path: String, #[serde(flatten)] pub hash_with_mode: Option<NixHashWithMode>, } impl<'de> Deserialize<'de> for Output { fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: serde::Deserializer<'de>, { let fields = Map::deserialize(deserializer)?; Ok(Self { path: fields .get("path") .ok_or(serde::de::Error::missing_field( &"`path` is missing but required for outputs", ))? .as_str() .ok_or(serde::de::Error::invalid_type( serde::de::Unexpected::Other(&"certainly not a string"), &"a string", ))? .to_owned(), hash_with_mode: NixHashWithMode::from_map::<D>(&fields)?, }) } } impl Output { pub fn is_fixed(&self) -> bool { self.hash_with_mode.is_some() } pub fn validate(&self, validate_output_paths: bool) -> Result<(), OutputError> { if let Some(hash) = &self.hash_with_mode { match hash { NixHashWithMode::Flat(h) | NixHashWithMode::Recursive(h) => { if h.algo != HashAlgo::Sha1 || h.algo != HashAlgo::Sha256 { return Err(OutputError::InvalidHashAlgo(h.algo.to_string())); } } } } if validate_output_paths { if let Err(e) = StorePath::from_absolute_path(self.path.as_bytes()) { return Err(OutputError::InvalidOutputPath(self.path.to_string(), e)); } } Ok(()) } } /// This ensures that a potentially valid input addressed /// output is deserialized as a non-fixed output. #[test] fn deserialize_valid_input_addressed_output() { let json_bytes = r#" { "path": "/nix/store/blablabla" }"#; let output: Output = serde_json::from_str(&json_bytes).expect("must parse"); assert!(!output.is_fixed()); } /// This ensures that a potentially valid fixed output /// output deserializes fine as a fixed output. #[test] fn deserialize_valid_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", "hashAlgo": "r:sha256" }"#; let output: Output = serde_json::from_str(&json_bytes).expect("must parse"); assert!(output.is_fixed()); } /// This ensures that parsing an input with the invalid hash encoding /// will result in a parsing failure. #[test] fn deserialize_with_error_invalid_hash_encoding_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "IAMNOTVALIDNIXBASE32", "hashAlgo": "r:sha256" }"#; let output: Result<Output, _> = serde_json::from_str(&json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the wrong hash algo /// will result in a parsing failure. #[test] fn deserialize_with_error_invalid_hash_algo_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", "hashAlgo": "r:sha1024" }"#; let output: Result<Output, _> = serde_json::from_str(&json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the missing hash algo but present hash will result in a /// parsing failure. #[test] fn deserialize_with_error_missing_hash_algo_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", }"#; let output: Result<Output, _> = serde_json::from_str(&json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the missing hash but present hash algo will result in a /// parsing failure. #[test] fn deserialize_with_error_missing_hash_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hashAlgo": "r:sha1024" }"#; let output: Result<Output, _> = serde_json::from_str(&json_bytes); assert!(output.is_err()); }