We use test_resources and globbing for some of the test cases, so adding additional files in there will also create new test cases, which we don't always want. Move it down one level to make some more space. Change-Id: I619867dc80a4ced59d45096d0703678663b559cd Reviewed-on: https://cl.tvl.fyi/c/depot/+/9729 Autosubmit: flokli <flokli@flokli.de> Reviewed-by: Connor Brewster <cbrewster@hey.com> Tested-by: BuildkiteCI
418 lines
16 KiB
Rust
418 lines
16 KiB
Rust
use crate::derivation::output::Output;
|
|
use crate::derivation::Derivation;
|
|
use crate::store_path::StorePath;
|
|
use bstr::{BStr, BString};
|
|
use std::collections::{BTreeMap, BTreeSet};
|
|
use std::fs::File;
|
|
use std::io::Read;
|
|
use std::path::Path;
|
|
use std::str::FromStr;
|
|
use test_case::test_case;
|
|
use test_generator::test_resources;
|
|
|
|
const RESOURCES_PATHS: &str = "src/derivation/tests/derivation_tests";
|
|
|
|
fn read_file(path: &str) -> BString {
|
|
let path = Path::new(path);
|
|
let mut file = File::open(path).unwrap();
|
|
let mut file_contents = Vec::new();
|
|
|
|
file.read_to_end(&mut file_contents).unwrap();
|
|
|
|
file_contents.into()
|
|
}
|
|
|
|
#[test_resources("src/derivation/tests/derivation_tests/ok/*.drv")]
|
|
fn check_serialization(path_to_drv_file: &str) {
|
|
// skip JSON files known to fail parsing
|
|
if path_to_drv_file.ends_with("cp1252.drv") || path_to_drv_file.ends_with("latin1.drv") {
|
|
return;
|
|
}
|
|
let json_bytes = read_file(&format!("{}.json", path_to_drv_file));
|
|
let derivation: Derivation =
|
|
serde_json::from_slice(&json_bytes).expect("JSON was not well-formatted");
|
|
|
|
let mut serialized_derivation = Vec::new();
|
|
derivation.serialize(&mut serialized_derivation).unwrap();
|
|
|
|
let expected = read_file(path_to_drv_file);
|
|
|
|
assert_eq!(expected, BStr::new(&serialized_derivation));
|
|
}
|
|
|
|
#[test_resources("src/derivation/tests/derivation_tests/ok/*.drv")]
|
|
fn validate(path_to_drv_file: &str) {
|
|
// skip JSON files known to fail parsing
|
|
if path_to_drv_file.ends_with("cp1252.drv") || path_to_drv_file.ends_with("latin1.drv") {
|
|
return;
|
|
}
|
|
let json_bytes = read_file(&format!("{}.json", path_to_drv_file));
|
|
let derivation: Derivation =
|
|
serde_json::from_slice(&json_bytes).expect("JSON was not well-formatted");
|
|
|
|
derivation
|
|
.validate(true)
|
|
.expect("derivation failed to validate")
|
|
}
|
|
|
|
#[test_resources("src/derivation/tests/derivation_tests/ok/*.drv")]
|
|
fn check_to_aterm_bytes(path_to_drv_file: &str) {
|
|
// skip JSON files known to fail parsing
|
|
if path_to_drv_file.ends_with("cp1252.drv") || path_to_drv_file.ends_with("latin1.drv") {
|
|
return;
|
|
}
|
|
let json_bytes = read_file(&format!("{}.json", path_to_drv_file));
|
|
let derivation: Derivation =
|
|
serde_json::from_slice(&json_bytes).expect("JSON was not well-formatted");
|
|
|
|
let expected = read_file(path_to_drv_file);
|
|
|
|
assert_eq!(expected, BStr::new(&derivation.to_aterm_bytes()));
|
|
}
|
|
|
|
#[test_case("bar","0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv"; "fixed_sha256")]
|
|
#[test_case("foo", "4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv"; "simple-sha256")]
|
|
#[test_case("bar", "ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv"; "fixed-sha1")]
|
|
#[test_case("foo", "ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv"; "simple-sha1")]
|
|
#[test_case("has-multi-out", "h32dahq0bx5rp1krcdx3a53asj21jvhk-has-multi-out.drv"; "multiple-outputs")]
|
|
#[test_case("structured-attrs", "9lj1lkjm2ag622mh4h9rpy6j607an8g2-structured-attrs.drv"; "structured-attrs")]
|
|
#[test_case("unicode", "52a9id8hx688hvlnz4d1n25ml1jdykz0-unicode.drv"; "unicode")]
|
|
fn derivation_path(name: &str, expected_path: &str) {
|
|
let json_bytes = read_file(&format!("{}/ok/{}.json", RESOURCES_PATHS, expected_path));
|
|
let derivation: Derivation =
|
|
serde_json::from_slice(&json_bytes).expect("JSON was not well-formatted");
|
|
|
|
assert_eq!(
|
|
derivation.calculate_derivation_path(name).unwrap(),
|
|
StorePath::from_str(expected_path).unwrap()
|
|
);
|
|
}
|
|
|
|
/// This trims all output paths from a Derivation struct,
|
|
/// by setting outputs[$outputName].path and environment[$outputName] to the empty string.
|
|
fn derivation_with_trimmed_output_paths(derivation: &Derivation) -> Derivation {
|
|
let mut trimmed_env = derivation.environment.clone();
|
|
let mut trimmed_outputs = derivation.outputs.clone();
|
|
|
|
for (output_name, output) in &derivation.outputs {
|
|
trimmed_env.insert(output_name.clone(), "".into());
|
|
assert!(trimmed_outputs.contains_key(output_name));
|
|
trimmed_outputs.insert(
|
|
output_name.to_string(),
|
|
Output {
|
|
path: "".to_string(),
|
|
..output.clone()
|
|
},
|
|
);
|
|
}
|
|
|
|
// replace environment and outputs with the trimmed variants
|
|
Derivation {
|
|
environment: trimmed_env,
|
|
outputs: trimmed_outputs,
|
|
..derivation.clone()
|
|
}
|
|
}
|
|
|
|
#[test_case("0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv", "sha256:724f3e3634fce4cbbbd3483287b8798588e80280660b9a63fd13a1bc90485b33"; "fixed_sha256")]
|
|
#[test_case("ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv", "sha256:c79aebd0ce3269393d4a1fde2cbd1d975d879b40f0bf40a48f550edc107fd5df";"fixed-sha1")]
|
|
fn derivation_or_fod_hash(drv_path: &str, expected_nix_hash_string: &str) {
|
|
// read in the fixture
|
|
let json_bytes = read_file(&format!("{}/ok/{}.json", RESOURCES_PATHS, drv_path));
|
|
let drv: Derivation = serde_json::from_slice(&json_bytes).expect("must deserialize");
|
|
|
|
let actual = drv.derivation_or_fod_hash(|_| panic!("must not be called"));
|
|
|
|
assert_eq!(expected_nix_hash_string, actual.to_nix_hash_string());
|
|
}
|
|
|
|
#[test_case("bar","0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv"; "fixed_sha256")]
|
|
#[test_case("foo", "4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv"; "simple-sha256")]
|
|
#[test_case("bar", "ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv"; "fixed-sha1")]
|
|
#[test_case("foo", "ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv"; "simple-sha1")]
|
|
#[test_case("has-multi-out", "h32dahq0bx5rp1krcdx3a53asj21jvhk-has-multi-out.drv"; "multiple-outputs")]
|
|
#[test_case("structured-attrs", "9lj1lkjm2ag622mh4h9rpy6j607an8g2-structured-attrs.drv"; "structured-attrs")]
|
|
#[test_case("unicode", "52a9id8hx688hvlnz4d1n25ml1jdykz0-unicode.drv"; "unicode")]
|
|
fn output_paths(name: &str, drv_path: &str) {
|
|
// read in the fixture
|
|
let json_bytes = read_file(&format!("{}/ok/{}.json", RESOURCES_PATHS, drv_path));
|
|
let expected_derivation: Derivation =
|
|
serde_json::from_slice(&json_bytes).expect("must deserialize");
|
|
|
|
let mut derivation = derivation_with_trimmed_output_paths(&expected_derivation);
|
|
|
|
// calculate the derivation_or_fod_hash of derivation
|
|
// We don't expect the lookup function to be called for most derivations.
|
|
let calculated_derivation_or_fod_hash = derivation.derivation_or_fod_hash(|parent_drv_path| {
|
|
// 4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv may lookup /nix/store/0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv
|
|
// ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv may lookup /nix/store/ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv
|
|
if name == "foo"
|
|
&& ((drv_path == "4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv"
|
|
&& parent_drv_path == "/nix/store/0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv")
|
|
|| (drv_path == "ch49594n9avinrf8ip0aslidkc4lxkqv-foo.drv"
|
|
&& parent_drv_path == "/nix/store/ss2p4wmxijn652haqyd7dckxwl4c7hxx-bar.drv"))
|
|
{
|
|
// do the lookup, by reading in the fixture of the requested
|
|
// drv_name, and calculating its drv replacement (on the non-stripped version)
|
|
// In a real-world scenario you would have already done this during construction.
|
|
|
|
let json_bytes = read_file(&format!(
|
|
"{}/ok/{}.json",
|
|
RESOURCES_PATHS,
|
|
Path::new(parent_drv_path)
|
|
.file_name()
|
|
.unwrap()
|
|
.to_string_lossy()
|
|
));
|
|
|
|
let drv: Derivation = serde_json::from_slice(&json_bytes).expect("must deserialize");
|
|
|
|
// calculate derivation_or_fod_hash for each parent.
|
|
// This may not trigger subsequent requests, as both parents are FOD.
|
|
drv.derivation_or_fod_hash(|_| panic!("must not lookup"))
|
|
} else {
|
|
// we only expect this to be called in the "foo" testcase, for the "bar derivations"
|
|
panic!("may only be called for foo testcase on bar derivations");
|
|
}
|
|
});
|
|
|
|
derivation
|
|
.calculate_output_paths(name, &calculated_derivation_or_fod_hash)
|
|
.unwrap();
|
|
|
|
// The derivation should now look like it was before
|
|
assert_eq!(expected_derivation, derivation);
|
|
}
|
|
|
|
/// Exercises the output path calculation functions like a constructing client
|
|
/// (an implementation of builtins.derivation) would do:
|
|
///
|
|
/// ```nix
|
|
/// rec {
|
|
/// bar = builtins.derivation {
|
|
/// name = "bar";
|
|
/// builder = ":";
|
|
/// system = ":";
|
|
/// outputHash = "08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba";
|
|
/// outputHashAlgo = "sha256";
|
|
/// outputHashMode = "recursive";
|
|
/// };
|
|
///
|
|
/// foo = builtins.derivation {
|
|
/// name = "foo";
|
|
/// builder = ":";
|
|
/// system = ":";
|
|
/// inherit bar;
|
|
/// };
|
|
/// }
|
|
/// ```
|
|
/// It first assembles the bar derivation, does the output path calculation on
|
|
/// it, then continues with the foo derivation.
|
|
///
|
|
/// The code ensures the resulting Derivations match our fixtures.
|
|
#[test]
|
|
fn output_path_construction() {
|
|
// create the bar derivation
|
|
let mut bar_drv = Derivation {
|
|
builder: ":".to_string(),
|
|
system: ":".to_string(),
|
|
..Default::default()
|
|
};
|
|
|
|
// assemble bar env
|
|
let bar_env = &mut bar_drv.environment;
|
|
bar_env.insert("builder".to_string(), ":".into());
|
|
bar_env.insert("name".to_string(), "bar".into());
|
|
bar_env.insert("out".to_string(), "".into()); // will be calculated
|
|
bar_env.insert(
|
|
"outputHash".to_string(),
|
|
"08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba".into(),
|
|
);
|
|
bar_env.insert("outputHashAlgo".to_string(), "sha256".into());
|
|
bar_env.insert("outputHashMode".to_string(), "recursive".into());
|
|
bar_env.insert("system".to_string(), ":".into());
|
|
|
|
// assemble bar outputs
|
|
bar_drv.outputs.insert(
|
|
"out".to_string(),
|
|
Output {
|
|
path: "".to_string(), // will be calculated
|
|
hash_with_mode: Some(crate::nixhash::NixHashWithMode::Recursive(
|
|
crate::nixhash::from_algo_and_digest(
|
|
crate::nixhash::HashAlgo::Sha256,
|
|
&data_encoding::HEXLOWER
|
|
.decode(
|
|
"08813cbee9903c62be4c5027726a418a300da4500b2d369d3af9286f4815ceba"
|
|
.as_bytes(),
|
|
)
|
|
.unwrap(),
|
|
)
|
|
.unwrap(),
|
|
)),
|
|
},
|
|
);
|
|
|
|
// calculate bar output paths
|
|
let bar_calc_result = bar_drv.calculate_output_paths(
|
|
"bar",
|
|
&bar_drv.derivation_or_fod_hash(|_| panic!("is FOD, should not lookup")),
|
|
);
|
|
assert!(bar_calc_result.is_ok());
|
|
|
|
// ensure it matches our bar fixture
|
|
let bar_json_bytes = read_file(&format!(
|
|
"{}/ok/{}.json",
|
|
RESOURCES_PATHS, "0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv"
|
|
));
|
|
let bar_drv_expected: Derivation =
|
|
serde_json::from_slice(&bar_json_bytes).expect("must deserialize");
|
|
assert_eq!(bar_drv_expected, bar_drv);
|
|
|
|
// now construct foo, which requires bar_drv
|
|
// Note how we refer to the output path, drv name and replacement_str (with calculated output paths) of bar.
|
|
let bar_output_path = &bar_drv.outputs.get("out").expect("must exist").path;
|
|
let bar_drv_derivation_or_fod_hash =
|
|
bar_drv.derivation_or_fod_hash(|_| panic!("is FOD, should not lookup"));
|
|
|
|
let bar_drv_path = bar_drv
|
|
.calculate_derivation_path("bar")
|
|
.expect("must succeed");
|
|
|
|
// create foo derivation
|
|
let mut foo_drv = Derivation {
|
|
builder: ":".to_string(),
|
|
system: ":".to_string(),
|
|
..Default::default()
|
|
};
|
|
|
|
// assemble foo env
|
|
let foo_env = &mut foo_drv.environment;
|
|
foo_env.insert("bar".to_string(), bar_output_path.to_owned().into());
|
|
foo_env.insert("builder".to_string(), ":".into());
|
|
foo_env.insert("name".to_string(), "foo".into());
|
|
foo_env.insert("out".to_string(), "".into()); // will be calculated
|
|
foo_env.insert("system".to_string(), ":".into());
|
|
|
|
// asssemble foo outputs
|
|
foo_drv.outputs.insert(
|
|
"out".to_string(),
|
|
Output {
|
|
path: "".to_string(), // will be calculated
|
|
hash_with_mode: None,
|
|
},
|
|
);
|
|
|
|
// assemble foo input_derivations
|
|
foo_drv.input_derivations.insert(
|
|
bar_drv_path.to_absolute_path(),
|
|
BTreeSet::from(["out".to_string()]),
|
|
);
|
|
|
|
// calculate foo output paths
|
|
let foo_calc_result = foo_drv.calculate_output_paths(
|
|
"foo",
|
|
&foo_drv.derivation_or_fod_hash(|drv_path| {
|
|
if drv_path != "/nix/store/0hm2f1psjpcwg8fijsmr4wwxrx59s092-bar.drv" {
|
|
panic!("lookup called with unexpected drv_path: {}", drv_path);
|
|
}
|
|
bar_drv_derivation_or_fod_hash.clone()
|
|
}),
|
|
);
|
|
assert!(foo_calc_result.is_ok());
|
|
|
|
// ensure it matches our foo fixture
|
|
let foo_json_bytes = read_file(&format!(
|
|
"{}/ok/{}.json",
|
|
RESOURCES_PATHS, "4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv",
|
|
));
|
|
let foo_drv_expected: Derivation =
|
|
serde_json::from_slice(&foo_json_bytes).expect("must deserialize");
|
|
assert_eq!(foo_drv_expected, foo_drv);
|
|
|
|
assert_eq!(
|
|
StorePath::from_str("4wvvbi4jwn0prsdxb7vs673qa5h9gr7x-foo.drv").expect("must succeed"),
|
|
foo_drv
|
|
.calculate_derivation_path("foo")
|
|
.expect("must succeed")
|
|
);
|
|
}
|
|
|
|
/// This constructs a Derivation using cp1252 encoding and ensures the
|
|
/// calculated derivation path matches the one Nix does calculate, as
|
|
/// well as the ATerm serialization.
|
|
/// We can't add this as a test_case to `output_paths`, as the JSON parser
|
|
/// refuses to parse our JSONs.
|
|
/// It looks like more recent versions of Nix also seem to not produce these
|
|
/// JSON files anymore, however, it still happily produces the .drv files in
|
|
/// the store.
|
|
#[test_case(
|
|
"cp1252",
|
|
vec![0xc5, 0xc4, 0xd6],
|
|
"/nix/store/drr2mjp9fp9vvzsf5f9p0a80j33dxy7m-cp1252",
|
|
"m1vfixn8iprlf0v9abmlrz7mjw1xj8kp-cp1252.drv";
|
|
"cp1252"
|
|
)]
|
|
#[test_case(
|
|
"latin1",
|
|
vec![0xc5, 0xc4, 0xd6],
|
|
"/nix/store/x1f6jfq9qgb6i8jrmpifkn9c64fg4hcm-latin1",
|
|
"x6p0hg79i3wg0kkv7699935f7rrj9jf3-latin1.drv";
|
|
"latin1"
|
|
)]
|
|
fn non_unicode(name: &str, chars: Vec<u8>, exp_output_path: &str, exp_derivation_path: &str) {
|
|
// construct the Derivation
|
|
let mut outputs: BTreeMap<String, Output> = BTreeMap::new();
|
|
outputs.insert(
|
|
"out".to_string(),
|
|
Output {
|
|
path: exp_output_path.to_string(),
|
|
..Default::default()
|
|
},
|
|
);
|
|
|
|
let mut environment: BTreeMap<String, BString> = BTreeMap::new();
|
|
environment.insert("builder".to_string(), ":".into());
|
|
environment.insert("chars".to_string(), chars.into());
|
|
environment.insert("name".to_string(), name.into());
|
|
environment.insert("out".to_string(), exp_output_path.into());
|
|
environment.insert("system".to_string(), ":".into());
|
|
let derivation: Derivation = Derivation {
|
|
builder: ":".to_string(),
|
|
environment,
|
|
outputs,
|
|
system: ":".to_string(),
|
|
..Default::default()
|
|
};
|
|
|
|
// check the derivation_path matches what Nix calculated.
|
|
let actual_drv_path = derivation.calculate_derivation_path(name).unwrap();
|
|
assert_eq!(exp_derivation_path.to_string(), actual_drv_path.to_string());
|
|
|
|
// Now wipe the output path info, and ensure we calculate the same output
|
|
// path.
|
|
{
|
|
let mut derivation = derivation_with_trimmed_output_paths(&derivation);
|
|
let calculated_derivation_or_fod_hash = derivation.derivation_or_fod_hash(|_| {
|
|
panic!("No parents expected");
|
|
});
|
|
derivation
|
|
.calculate_output_paths(name, &calculated_derivation_or_fod_hash)
|
|
.unwrap();
|
|
|
|
assert_eq!(
|
|
exp_output_path.to_string(),
|
|
derivation.outputs.get("out").unwrap().path,
|
|
"expected calculated output path to match"
|
|
);
|
|
}
|
|
|
|
// Construct the ATerm representation and compare with our fixture.
|
|
{
|
|
let aterm_bytes = read_file(&format!("{}/ok/{}", RESOURCES_PATHS, exp_derivation_path));
|
|
assert_eq!(
|
|
aterm_bytes,
|
|
BStr::new(&derivation.to_aterm_bytes()),
|
|
"expected ATerm serialization to match",
|
|
);
|
|
}
|
|
}
|