-
-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathstructure.rs
181 lines (155 loc) · 6.49 KB
/
structure.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
use std::fs::DirEntry;
use std::path::Path;
use std::sync::LazyLock;
use anyhow::Context;
use itertools::{concat, process_results};
use regex::Regex;
use relative_path::RelativePathBuf;
use crate::problem::{npv_109, npv_110, npv_111, npv_140, npv_141, npv_142, npv_143, npv_144};
use crate::references;
use crate::validation::{self, ResultIteratorExt, Validation::Success};
use crate::NixFileStore;
pub const BASE_SUBPATH: &str = "pkgs/by-name";
pub const PACKAGE_NIX_FILENAME: &str = "package.nix";
static SHARD_NAME_REGEX: LazyLock<Regex> =
LazyLock::new(|| Regex::new(r"^[a-z0-9_-]{1,2}$").unwrap());
static PACKAGE_NAME_REGEX: LazyLock<Regex> =
LazyLock::new(|| Regex::new(r"^[a-zA-Z0-9_-]+$").unwrap());
/// Deterministic file listing so that tests are reproducible.
pub fn read_dir_sorted(base_dir: &Path) -> anyhow::Result<Vec<DirEntry>> {
let ctx = || format!("Could not list directory {}", base_dir.display());
let listing = base_dir.read_dir().with_context(ctx)?;
process_results(listing, |listing| {
use itertools::Itertools;
Itertools::collect_vec(listing.sorted_by_key(DirEntry::file_name))
})
.with_context(ctx)
}
// Some utility functions for the basic structure
pub fn shard_for_package(package_name: &str) -> String {
package_name.to_lowercase().chars().take(2).collect()
}
pub fn relative_dir_for_shard(shard_name: &str) -> RelativePathBuf {
RelativePathBuf::from(format!("{BASE_SUBPATH}/{shard_name}"))
}
pub fn relative_dir_for_package(package_name: &str) -> RelativePathBuf {
relative_dir_for_shard(&shard_for_package(package_name)).join(package_name)
}
pub fn relative_file_for_package(package_name: &str) -> RelativePathBuf {
relative_dir_for_package(package_name).join(PACKAGE_NIX_FILENAME)
}
/// Check the structure of Nixpkgs, returning the attribute names that are defined in
/// `pkgs/by-name`
pub fn check_structure(
path: &Path,
nix_file_store: &mut NixFileStore,
) -> validation::Result<Vec<String>> {
let base_dir = path.join(BASE_SUBPATH);
let shard_results = read_dir_sorted(&base_dir)?
.into_iter()
.map(|shard_entry| -> validation::Result<_> {
let shard_path = shard_entry.path();
let shard_name = shard_entry.file_name().to_string_lossy().into_owned();
Ok(if shard_name == "README.md" {
// README.md is allowed to be a file and not checked
Success(vec![])
} else if !shard_path.is_dir() {
// We can't check for any other errors if it's not a directory, since there are no
// subdirectories to check.
npv_109::ByNameShardIsNotDirectory::new(shard_name).into()
} else {
let shard_name_valid = SHARD_NAME_REGEX.is_match(&shard_name);
let result = if !shard_name_valid {
npv_110::ByNameShardIsInvalid::new(shard_name.clone()).into()
} else {
Success(())
};
let entries = read_dir_sorted(&shard_path)?;
let duplicate_results = entries
.iter()
.zip(entries.iter().skip(1))
.filter(|(l, r)| l.file_name().eq_ignore_ascii_case(r.file_name()))
.map(|(l, r)| {
npv_111::ByNameShardIsCaseSensitiveDuplicate::new(
shard_name.clone(),
l.file_name(),
r.file_name(),
)
.into()
});
let result = result.and_(validation::sequence_(duplicate_results));
let package_results = entries
.into_iter()
.map(|package_entry| {
check_package(
nix_file_store,
path,
&shard_name,
shard_name_valid,
&package_entry,
)
})
.collect_vec()?;
result.and_(validation::sequence(package_results))
})
})
.collect_vec()?;
// Combine the package names contained within each shard into a longer list.
Ok(validation::sequence(shard_results).map(concat))
}
fn check_package(
nix_file_store: &mut NixFileStore,
path: &Path,
shard_name: &str,
shard_name_valid: bool,
package_entry: &DirEntry,
) -> validation::Result<String> {
let package_path = package_entry.path();
let package_name = package_entry.file_name().to_string_lossy().into_owned();
let relative_package_dir =
RelativePathBuf::from(format!("{BASE_SUBPATH}/{shard_name}/{package_name}"));
Ok(if !package_path.is_dir() {
npv_140::PackageDirectoryIsNotDirectory::new(package_name).into()
} else {
let package_name_valid = PACKAGE_NAME_REGEX.is_match(&package_name);
let result = if !package_name_valid {
npv_141::InvalidPackageDirectoryName::new(
package_name.clone(),
relative_package_dir.clone(),
)
.into()
} else {
Success(())
};
let correct_relative_package_dir = relative_dir_for_package(&package_name);
let result = result.and_(if relative_package_dir != correct_relative_package_dir {
// Only show this error if we have a valid shard and package name.
// If one of those is wrong, you should fix that first.
if shard_name_valid && package_name_valid {
npv_142::PackageInWrongShard::new(
package_name.clone(),
relative_package_dir.clone(),
)
.into()
} else {
Success(())
}
} else {
Success(())
});
let package_nix_path = package_path.join(PACKAGE_NIX_FILENAME);
let result = result.and_(if !package_nix_path.exists() {
npv_143::PackageNixMissing::new(package_name.clone()).into()
} else if !package_nix_path.is_file() {
npv_144::PackageNixIsNotFile::new(package_name.clone()).into()
} else {
Success(())
});
let result = result.and_(references::check_references(
nix_file_store,
&relative_package_dir,
&relative_package_dir.to_path(path),
)?);
result.map(|_| package_name)
})
}