about summary refs log tree commit diff
path: root/tvix/store/protos/pathinfo_test.go
diff options
context:
space:
mode:
authorFlorian Klink <flokli@flokli.de>2023-10-17T12·42+0100
committerflokli <flokli@flokli.de>2023-10-17T19·51+0000
commit1b26bf21e3305232b9bbdc928a063da9be9eaee0 (patch)
treed5ee335a6c76cc54095266ec685e4a8dae515a2e /tvix/store/protos/pathinfo_test.go
parente38733a955f6f6fc8962cf0e669d9cf4696bc14d (diff)
chore(tvix): move store golang bindings to tvix/store-go r/6844
Similar to the castore-go CL before, this also updates the store-go
bindings to the new layout.

Change-Id: Id73d7ad43f7d70171ab021728e303300c5db71f0
Reviewed-on: https://cl.tvl.fyi/c/depot/+/9788
Tested-by: BuildkiteCI
Reviewed-by: Connor Brewster <cbrewster@hey.com>
Diffstat (limited to 'tvix/store/protos/pathinfo_test.go')
-rw-r--r--tvix/store/protos/pathinfo_test.go149
1 files changed, 0 insertions, 149 deletions
diff --git a/tvix/store/protos/pathinfo_test.go b/tvix/store/protos/pathinfo_test.go
deleted file mode 100644
index 9a329f0010fc..000000000000
--- a/tvix/store/protos/pathinfo_test.go
+++ /dev/null
@@ -1,149 +0,0 @@
-package storev1_test
-
-import (
-	"path"
-	"testing"
-
-	"github.com/nix-community/go-nix/pkg/storepath"
-	"github.com/stretchr/testify/assert"
-
-	castorev1pb "code.tvl.fyi/tvix/castore/protos"
-	storev1pb "code.tvl.fyi/tvix/store/protos"
-)
-
-const (
-	EXAMPLE_STORE_PATH = "00bgd045z0d4icpbc2yyz4gx48ak44la-net-tools-1.60_p2017022118243"
-)
-
-var (
-	exampleStorePathDigest = []byte{
-		0x8a, 0x12, 0x32, 0x15, 0x22, 0xfd, 0x91, 0xef, 0xbd, 0x60, 0xeb, 0xb2, 0x48, 0x1a, 0xf8, 0x85,
-		0x80, 0xf6, 0x16, 0x00}
-)
-
-func genPathInfoSymlink() *storev1pb.PathInfo {
-	return &storev1pb.PathInfo{
-		Node: &castorev1pb.Node{
-			Node: &castorev1pb.Node_Symlink{
-				Symlink: &castorev1pb.SymlinkNode{
-					Name:   []byte("00000000000000000000000000000000-dummy"),
-					Target: []byte("/nix/store/somewhereelse"),
-				},
-			},
-		},
-		References: [][]byte{exampleStorePathDigest},
-		Narinfo: &storev1pb.NARInfo{
-			NarSize:        0,
-			NarSha256:      []byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
-			Signatures:     []*storev1pb.NARInfo_Signature{},
-			ReferenceNames: []string{EXAMPLE_STORE_PATH},
-		},
-	}
-}
-
-func genPathInfoSymlinkThin() *storev1pb.PathInfo {
-	pi := genPathInfoSymlink()
-	pi.Narinfo = nil
-
-	return pi
-}
-
-func TestValidate(t *testing.T) {
-	t.Run("happy symlink", func(t *testing.T) {
-		storePath, err := genPathInfoSymlink().Validate()
-		assert.NoError(t, err, "PathInfo must validate")
-		assert.Equal(t, "00000000000000000000000000000000-dummy", storePath.String())
-	})
-
-	t.Run("happy symlink thin", func(t *testing.T) {
-		storePath, err := genPathInfoSymlinkThin().Validate()
-		assert.NoError(t, err, "PathInfo must validate")
-		assert.Equal(t, "00000000000000000000000000000000-dummy", storePath.String())
-	})
-
-	t.Run("invalid nar_sha256", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// create broken references, where the reference digest is wrong
-		pi.Narinfo.NarSha256 = []byte{0xbe, 0xef}
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("invalid reference digest", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// create broken references, where the reference digest is wrong
-		pi.References = append(pi.References, []byte{0x00})
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("invalid reference name", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// make the reference name an invalid store path
-		pi.Narinfo.ReferenceNames[0] = "00000000000000000000000000000000-"
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("reference name digest mismatch", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// cause the digest for the reference to mismatch
-		pi.Narinfo.ReferenceNames[0] = "11111111111111111111111111111111-dummy"
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("nil root node", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		pi.Node = nil
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("invalid root node name", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// make the reference name an invalid store path - it may not be absolute
-		symlinkNode := pi.Node.GetSymlink()
-		symlinkNode.Name = []byte(path.Join(storepath.StoreDir, "00000000000000000000000000000000-dummy"))
-
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-	t.Run("happy deriver", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// add the Deriver Field.
-		pi.Deriver = &storev1pb.StorePath{
-			Digest: exampleStorePathDigest,
-			Name:   "foo",
-		}
-
-		_, err := pi.Validate()
-		assert.NoError(t, err, "must validate")
-	})
-
-	t.Run("invalid deriver", func(t *testing.T) {
-		pi := genPathInfoSymlink()
-
-		// add the Deriver Field, with a broken digest
-		pi.Deriver = &storev1pb.StorePath{
-			Digest: []byte{},
-			Name:   "foo2",
-		}
-		_, err := pi.Validate()
-		assert.Error(t, err, "must not validate")
-	})
-
-}