use crate::derivation::OutputError; use crate::nixhash::CAHash; use crate::store_path::StorePath; use serde::{Deserialize, Serialize}; use serde_json::Map; #[derive(Clone, Debug, Default, Eq, PartialEq, Serialize)] pub struct Output { pub path: String, #[serde(flatten)] pub ca_hash: Option<CAHash>, // we can only represent a subset here. } impl<'de> Deserialize<'de> for Output { fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: serde::Deserializer<'de>, { let fields = Map::deserialize(deserializer)?; Ok(Self { path: fields .get("path") .ok_or(serde::de::Error::missing_field( "`path` is missing but required for outputs", ))? .as_str() .ok_or(serde::de::Error::invalid_type( serde::de::Unexpected::Other("certainly not a string"), &"a string", ))? .to_owned(), ca_hash: CAHash::from_map::<D>(&fields)?, }) } } impl Output { pub fn is_fixed(&self) -> bool { self.ca_hash.is_some() } pub fn validate(&self, validate_output_paths: bool) -> Result<(), OutputError> { if let Some(fixed_output_hash) = &self.ca_hash { match fixed_output_hash { CAHash::Flat(_) | CAHash::Nar(_) => { // all hashes allowed for Flat, and Nar. } _ => return Err(OutputError::InvalidCAHash(fixed_output_hash.clone())), } } if validate_output_paths { if let Err(e) = StorePath::from_absolute_path(self.path.as_bytes()) { return Err(OutputError::InvalidOutputPath(self.path.to_string(), e)); } } Ok(()) } } /// This ensures that a potentially valid input addressed /// output is deserialized as a non-fixed output. #[test] fn deserialize_valid_input_addressed_output() { let json_bytes = r#" { "path": "/nix/store/blablabla" }"#; let output: Output = serde_json::from_str(json_bytes).expect("must parse"); assert!(!output.is_fixed()); } /// This ensures that a potentially valid fixed output /// output deserializes fine as a fixed output. #[test] fn deserialize_valid_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", "hashAlgo": "r:sha256" }"#; let output: Output = serde_json::from_str(json_bytes).expect("must parse"); assert!(output.is_fixed()); } /// This ensures that parsing an input with the invalid hash encoding /// will result in a parsing failure. #[test] fn deserialize_with_error_invalid_hash_encoding_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "IAMNOTVALIDNIXBASE32", "hashAlgo": "r:sha256" }"#; let output: Result<Output, _> = serde_json::from_str(json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the wrong hash algo /// will result in a parsing failure. #[test] fn deserialize_with_error_invalid_hash_algo_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", "hashAlgo": "r:sha1024" }"#; let output: Result<Output, _> = serde_json::from_str(json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the missing hash algo but present hash will result in a /// parsing failure. #[test] fn deserialize_with_error_missing_hash_algo_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hash": "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba", }"#; let output: Result<Output, _> = serde_json::from_str(json_bytes); assert!(output.is_err()); } /// This ensures that parsing an input with the missing hash but present hash algo will result in a /// parsing failure. #[test] fn deserialize_with_error_missing_hash_fixed_output() { let json_bytes = r#" { "path": "/nix/store/blablablabla", "hashAlgo": "r:sha1024" }"#; let output: Result<Output, _> = serde_json::from_str(json_bytes); assert!(output.is_err()); }