Use thiserror in id-validation, add more detail to mxc-uri errors

This commit is contained in:
Jonathan de Jong 2021-08-17 14:48:10 +02:00 committed by Jonas Platte
parent b0e6b22ffe
commit c33920d8ae
No known key found for this signature in database
GPG Key ID: CC154DE0E30B7C67
11 changed files with 91 additions and 70 deletions

View File

@ -34,7 +34,7 @@ ruma-identifiers = { version = "0.20.0", path = "../ruma-identifiers" }
ruma-serde = { version = "0.5.0", path = "../ruma-serde" } ruma-serde = { version = "0.5.0", path = "../ruma-serde" }
serde = { version = "1.0.118", features = ["derive"] } serde = { version = "1.0.118", features = ["derive"] }
serde_json = "1.0.61" serde_json = "1.0.61"
thiserror = "1.0.23" thiserror = "1.0.26"
[dev-dependencies] [dev-dependencies]
ruma-events = { version = "0.24.5", path = "../ruma-events" } ruma-events = { version = "0.24.5", path = "../ruma-events" }

View File

@ -60,11 +60,9 @@ impl<'a> Request<'a> {
/// Creates a new `Request` with the given url. /// Creates a new `Request` with the given url.
pub fn from_url(url: &'a MxcUri) -> Result<Self, Error> { pub fn from_url(url: &'a MxcUri) -> Result<Self, Error> {
if let Some((server_name, media_id)) = url.parts() { let (server_name, media_id) = url.parts()?;
Ok(Self { media_id, server_name, allow_remote: true }) Ok(Self { media_id, server_name, allow_remote: true })
} else {
Err(Error::InvalidMxcUri)
}
} }
} }

View File

@ -65,11 +65,9 @@ impl<'a> Request<'a> {
/// Creates a new `Request` with the given url and filename. /// Creates a new `Request` with the given url and filename.
pub fn from_url(url: &'a MxcUri, filename: &'a str) -> Result<Self, Error> { pub fn from_url(url: &'a MxcUri, filename: &'a str) -> Result<Self, Error> {
if let Some((server_name, media_id)) = url.parts() { let (server_name, media_id) = url.parts()?;
Ok(Self { media_id, server_name, filename, allow_remote: true }) Ok(Self { media_id, server_name, filename, allow_remote: true })
} else {
Err(Error::InvalidMxcUri)
}
} }
} }

View File

@ -70,11 +70,9 @@ impl<'a> Request<'a> {
/// Creates a new `Request` with the given url, desired thumbnail width and /// Creates a new `Request` with the given url, desired thumbnail width and
/// desired thumbnail height. /// desired thumbnail height.
pub fn from_url(url: &'a MxcUri, width: UInt, height: UInt) -> Result<Self, Error> { pub fn from_url(url: &'a MxcUri, width: UInt, height: UInt) -> Result<Self, Error> {
if let Some((server_name, media_id)) = url.parts() { let (server_name, media_id) = url.parts()?;
Ok(Self { media_id, server_name, method: None, width, height, allow_remote: true }) Ok(Self { media_id, server_name, method: None, width, height, allow_remote: true })
} else {
Err(Error::InvalidMxcUri)
}
} }
} }

View File

@ -33,7 +33,7 @@ ruma-identifiers = { version = "0.20.0", path = "../ruma-identifiers", features
ruma-serde = { version = "0.5.0", path = "../ruma-serde" } ruma-serde = { version = "0.5.0", path = "../ruma-serde" }
serde = { version = "1.0.118", features = ["derive"] } serde = { version = "1.0.118", features = ["derive"] }
serde_json = { version = "1.0.60", features = ["raw_value"] } serde_json = { version = "1.0.60", features = ["raw_value"] }
thiserror = "1.0.25" thiserror = "1.0.26"
[dev-dependencies] [dev-dependencies]
assign = "1.1.1" assign = "1.1.1"

View File

@ -16,3 +16,6 @@ all-features = true
[features] [features]
compat = [] compat = []
[dependencies]
thiserror = "1.0.26"

View File

@ -1,66 +1,77 @@
//! Error conditions. //! Error conditions.
use std::fmt;
/// An error encountered when trying to parse an invalid ID string. /// An error encountered when trying to parse an invalid ID string.
#[derive(Copy, Clone, Debug, Eq, Hash, PartialEq)] #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq, thiserror::Error)]
#[non_exhaustive] #[non_exhaustive]
pub enum Error { pub enum Error {
/// The client secret is empty. /// The client secret is empty.
#[error("client secret is empty")]
EmptyClientSecret, EmptyClientSecret,
/// The room name is empty. /// The room name is empty.
#[error("room name is empty")]
EmptyRoomName, EmptyRoomName,
/// The room version ID is empty. /// The room version ID is empty.
#[error("room version ID is empty")]
EmptyRoomVersionId, EmptyRoomVersionId,
/// The ID's localpart contains invalid characters. /// The ID's localpart contains invalid characters.
/// ///
/// Only relevant for user IDs. /// Only relevant for user IDs.
#[error("localpart contains invalid characters")]
InvalidCharacters, InvalidCharacters,
/// The key algorithm is invalid (e.g. empty). /// The key algorithm is invalid (e.g. empty).
#[error("invalid key algorithm specified")]
InvalidKeyAlgorithm, InvalidKeyAlgorithm,
/// The key version contains outside of [a-zA-Z0-9_]. /// The key version contains outside of [a-zA-Z0-9_].
#[error("key ID version contains invalid characters")]
InvalidKeyVersion, InvalidKeyVersion,
/// The mxc:// isn't a valid Matrix Content URI. /// The mxc:// isn't a valid Matrix Content URI.
InvalidMxcUri, #[error("invalid Matrix Content URI: {0}")]
InvalidMxcUri(#[from] MxcUriError),
/// The server name part of the the ID string is not a valid server name. /// The server name part of the the ID string is not a valid server name.
#[error("server name is not a valid IP address or domain name")]
InvalidServerName, InvalidServerName,
/// The ID exceeds 255 bytes (or 32 codepoints for a room version ID). /// The ID exceeds 255 bytes (or 32 codepoints for a room version ID).
#[error("ID exceeds 255 bytes")]
MaximumLengthExceeded, MaximumLengthExceeded,
/// The ID is missing the colon delimiter between localpart and server name, or between key /// The ID is missing the colon delimiter between localpart and server name, or between key
/// algorithm and key name / version. /// algorithm and key name / version.
#[error("required colon is missing")]
MissingDelimiter, MissingDelimiter,
/// The ID is missing the correct leading sigil. /// The ID is missing the correct leading sigil.
#[error("leading sigil is incorrect or missing")]
MissingLeadingSigil, MissingLeadingSigil,
} }
impl fmt::Display for Error { /// An error occurred while validating an MXC URI.
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { #[derive(Copy, Clone, Debug, Eq, Hash, PartialEq, thiserror::Error)]
let message = match self { #[non_exhaustive]
Error::EmptyClientSecret => "client secret is empty", pub enum MxcUriError {
Error::EmptyRoomName => "room name is empty", /// MXC URI did not start with `mxc://`.
Error::EmptyRoomVersionId => "room version ID is empty", #[error("MXC URI schema was not mxc://")]
Error::InvalidCharacters => "localpart contains invalid characters", WrongSchema,
Error::InvalidKeyAlgorithm => "invalid key algorithm specified",
Error::InvalidKeyVersion => "key ID version contains invalid characters",
Error::InvalidMxcUri => "the mxc:// isn't a valid Matrix Content URI",
Error::InvalidServerName => "server name is not a valid IP address or domain name",
Error::MaximumLengthExceeded => "ID exceeds 255 bytes",
Error::MissingDelimiter => "required colon is missing",
Error::MissingLeadingSigil => "leading sigil is incorrect or missing",
};
write!(f, "{}", message) /// MXC URI did not have first slash, required for `server.name/media_id`.
} #[error("MXC URI does not have first slash")]
} MissingSlash,
impl std::error::Error for Error {} /// Media identifier malformed due to invalid characters detected.
///
/// Valid characters are (in regex notation) `[A-Za-z0-9_-]+`.
/// See [here](https://matrix.org/docs/spec/client_server/r0.6.1#id408) for more details.
#[error("Media Identifier malformed, invalid characters")]
MediaIdMalformed,
/// Server identifier malformed: invalid IP or domain name.
#[error("invalid Server Name")]
ServerNameMalformed,
}

View File

@ -1,18 +1,18 @@
use std::num::NonZeroU8; use std::num::NonZeroU8;
use crate::{server_name, Error}; use crate::{error::MxcUriError, server_name};
const PROTOCOL: &str = "mxc://"; const PROTOCOL: &str = "mxc://";
pub fn validate(uri: &str) -> Result<NonZeroU8, Error> { pub fn validate(uri: &str) -> Result<NonZeroU8, MxcUriError> {
let uri = match uri.strip_prefix(PROTOCOL) { let uri = match uri.strip_prefix(PROTOCOL) {
Some(uri) => uri, Some(uri) => uri,
None => return Err(Error::InvalidMxcUri), None => return Err(MxcUriError::WrongSchema),
}; };
let index = match uri.find('/') { let index = match uri.find('/') {
Some(index) => index, Some(index) => index,
None => return Err(Error::InvalidMxcUri), None => return Err(MxcUriError::MissingSlash),
}; };
let server_name = &uri[..index]; let server_name = &uri[..index];
@ -21,9 +21,11 @@ pub fn validate(uri: &str) -> Result<NonZeroU8, Error> {
let media_id_is_valid = let media_id_is_valid =
media_id.bytes().all(|b| matches!(b, b'0'..=b'9' | b'a'..=b'z' | b'A'..=b'Z' | b'-' )); media_id.bytes().all(|b| matches!(b, b'0'..=b'9' | b'a'..=b'z' | b'A'..=b'Z' | b'-' ));
if media_id_is_valid && server_name::validate(server_name).is_ok() { if !media_id_is_valid {
Ok(NonZeroU8::new((index + 6) as u8).unwrap()) Err(MxcUriError::MediaIdMalformed)
} else if server_name::validate(server_name).is_err() {
Err(MxcUriError::ServerNameMalformed)
} else { } else {
Err(Error::InvalidMxcUri) Ok(NonZeroU8::new((index + 6) as u8).unwrap())
} }
} }

View File

@ -4,33 +4,35 @@
use std::{convert::TryFrom, fmt, num::NonZeroU8}; use std::{convert::TryFrom, fmt, num::NonZeroU8};
use ruma_identifiers_validation::mxc_uri::validate; use ruma_identifiers_validation::{error::MxcUriError, mxc_uri::validate};
use crate::ServerName; use crate::ServerName;
type Result<T> = std::result::Result<T, MxcUriError>;
/// A URI that should be a Matrix-spec compliant [MXC URI]. /// A URI that should be a Matrix-spec compliant [MXC URI].
/// ///
/// [MXC URI]: https://matrix.org/docs/spec/client_server/r0.6.1#mxc-uri /// [MXC URI]: https://matrix.org/docs/spec/client_server/r0.6.1#mxc-uri
#[derive(Clone, PartialEq, Eq, PartialOrd, Ord, Hash)] #[derive(Clone, PartialEq, Eq, PartialOrd, Ord, Hash)]
pub struct MxcUri { pub struct MxcUri {
full_uri: Box<str>, full_uri: Box<str>,
slash_idx: Option<NonZeroU8>,
} }
impl MxcUri { impl MxcUri {
/// If this is a valid MXC URI, returns the media ID. /// If this is a valid MXC URI, returns the media ID.
pub fn media_id(&self) -> Option<&str> { pub fn media_id(&self) -> Result<&str> {
self.parts().map(|(_, s)| s) self.parts().map(|(_, s)| s)
} }
/// If this is a valid MXC URI, returns the server name. /// If this is a valid MXC URI, returns the server name.
pub fn server_name(&self) -> Option<&ServerName> { pub fn server_name(&self) -> Result<&ServerName> {
self.parts().map(|(s, _)| s) self.parts().map(|(s, _)| s)
} }
/// If this is a valid MXC URI, returns a `(server_name, media_id)` tuple. /// If this is a valid MXC URI, returns a `(server_name, media_id)` tuple, else it returns the
pub fn parts(&self) -> Option<(&ServerName, &str)> { /// error.
self.slash_idx.map(|idx| { pub fn parts(&self) -> Result<(&ServerName, &str)> {
self.extract_slash_idx().map(|idx| {
( (
<&ServerName>::try_from(&self.full_uri[6..idx.get() as usize]).unwrap(), <&ServerName>::try_from(&self.full_uri[6..idx.get() as usize]).unwrap(),
&self.full_uri[idx.get() as usize + 1..], &self.full_uri[idx.get() as usize + 1..],
@ -38,15 +40,28 @@ impl MxcUri {
}) })
} }
/// Returns if this is a spec-compliant MXC URI. /// Validates the URI and returns an error if it failed.
pub fn validate(&self) -> Result<()> {
self.extract_slash_idx().map(|_| ())
}
/// Convenience method for `.validate().is_ok()`.
#[inline(always)]
pub fn is_valid(&self) -> bool { pub fn is_valid(&self) -> bool {
self.slash_idx.is_some() self.validate().is_ok()
} }
/// Create a string slice from this MXC URI. /// Create a string slice from this MXC URI.
#[inline(always)]
pub fn as_str(&self) -> &str { pub fn as_str(&self) -> &str {
&self.full_uri &self.full_uri
} }
// convenience method for calling validate(self)
#[inline(always)]
fn extract_slash_idx(&self) -> Result<NonZeroU8> {
validate(self.as_str())
}
} }
impl fmt::Debug for MxcUri { impl fmt::Debug for MxcUri {
@ -65,10 +80,7 @@ fn from<S>(uri: S) -> MxcUri
where where
S: AsRef<str> + Into<Box<str>>, S: AsRef<str> + Into<Box<str>>,
{ {
match validate(uri.as_ref()) { MxcUri { full_uri: uri.into() }
Ok(idx) => MxcUri { full_uri: uri.into(), slash_idx: Some(idx) },
Err(_) => MxcUri { full_uri: uri.into(), slash_idx: None },
}
} }
impl From<&str> for MxcUri { impl From<&str> for MxcUri {
@ -85,7 +97,7 @@ impl From<String> for MxcUri {
#[cfg(feature = "serde")] #[cfg(feature = "serde")]
impl<'de> serde::Deserialize<'de> for MxcUri { impl<'de> serde::Deserialize<'de> for MxcUri {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> fn deserialize<D>(deserializer: D) -> std::result::Result<Self, D::Error>
where where
D: serde::Deserializer<'de>, D: serde::Deserializer<'de>,
{ {
@ -95,7 +107,7 @@ impl<'de> serde::Deserialize<'de> for MxcUri {
#[cfg(feature = "serde")] #[cfg(feature = "serde")]
impl serde::Serialize for MxcUri { impl serde::Serialize for MxcUri {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> fn serialize<S>(&self, serializer: S) -> std::result::Result<S::Ok, S::Error>
where where
S: serde::Serializer, S: serde::Serializer,
{ {
@ -107,6 +119,8 @@ impl serde::Serialize for MxcUri {
mod tests { mod tests {
use std::convert::TryFrom; use std::convert::TryFrom;
use ruma_identifiers_validation::error::MxcUriError;
use crate::ServerName; use crate::ServerName;
use super::MxcUri; use super::MxcUri;
@ -118,7 +132,7 @@ mod tests {
assert!(mxc.is_valid()); assert!(mxc.is_valid());
assert_eq!( assert_eq!(
mxc.parts(), mxc.parts(),
Some(( Ok((
<&ServerName>::try_from("127.0.0.1").expect("Failed to create ServerName"), <&ServerName>::try_from("127.0.0.1").expect("Failed to create ServerName"),
"asd32asdfasdsd" "asd32asdfasdsd"
)) ))
@ -130,7 +144,7 @@ mod tests {
let mxc = MxcUri::from("mxc://127.0.0.1"); let mxc = MxcUri::from("mxc://127.0.0.1");
assert!(!mxc.is_valid()); assert!(!mxc.is_valid());
assert_eq!(mxc.parts(), None); assert_eq!(mxc.parts(), Err(MxcUriError::MissingSlash));
} }
#[test] #[test]
@ -158,10 +172,7 @@ mod tests {
assert!(mxc.is_valid()); assert!(mxc.is_valid());
assert_eq!( assert_eq!(
mxc.parts(), mxc.parts(),
Some(( Ok((<&ServerName>::try_from("server").expect("Failed to create ServerName"), "1234id"))
<&ServerName>::try_from("server").expect("Failed to create ServerName"),
"1234id"
))
); );
} }
} }

View File

@ -28,5 +28,5 @@ ruma-identifiers = { version = "0.20.0", path = "../ruma-identifiers" }
ruma-serde = { version = "0.5.0", path = "../ruma-serde" } ruma-serde = { version = "0.5.0", path = "../ruma-serde" }
serde_json = "1.0.60" serde_json = "1.0.60"
sha2 = "0.9.5" sha2 = "0.9.5"
thiserror = "1.0.23" thiserror = "1.0.26"
tracing = { version = "0.1.25", optional = true } tracing = { version = "0.1.25", optional = true }

View File

@ -27,7 +27,7 @@ ruma-identifiers = { version = "0.20.0", path = "../ruma-identifiers" }
ruma-serde = { version = "0.5.0", path = "../ruma-serde" } ruma-serde = { version = "0.5.0", path = "../ruma-serde" }
serde = { version = "1.0.118", features = ["derive"] } serde = { version = "1.0.118", features = ["derive"] }
serde_json = "1.0.60" serde_json = "1.0.60"
thiserror = "1.0.22" thiserror = "1.0.26"
tracing = "0.1.26" tracing = "0.1.26"
[dev-dependencies] [dev-dependencies]