debian-mirror-gitlab/rubocop/cop/inject_enterprise_edition_module.rb

95 lines
3.1 KiB
Ruby
Raw Normal View History

2019-02-15 15:39:39 +05:30
# frozen_string_literal: true
module RuboCop
module Cop
2021-06-08 01:23:25 +05:30
# Cop that blacklists the injecting of extension specific modules before any lines which are not already injecting another module.
2020-06-23 00:09:42 +05:30
# It allows multiple module injections as long as they're all at the end.
2022-10-11 01:57:18 +05:30
class InjectEnterpriseEditionModule < RuboCop::Cop::Base
extend RuboCop::Cop::AutoCorrector
2021-06-08 01:23:25 +05:30
INVALID_LINE = 'Injecting extension modules must be done on the last line of this file' \
2019-10-12 21:52:04 +05:30
', outside of any class or module definitions'
2019-02-15 15:39:39 +05:30
2019-10-12 21:52:04 +05:30
DISALLOWED_METHOD =
2021-06-08 01:23:25 +05:30
'EE modules must be injected using `include_mod_with`, `extend_mod_with`, or `prepend_mod_with`'
2019-10-12 21:52:04 +05:30
2021-06-08 01:23:25 +05:30
INVALID_ARGUMENT = 'extension modules to inject must be specified as a String'
2019-10-12 21:52:04 +05:30
CHECK_LINE_METHODS =
2021-06-08 01:23:25 +05:30
Set.new(%i[include_mod_with extend_mod_with prepend_mod_with]).freeze
2019-10-12 21:52:04 +05:30
DISALLOW_METHODS = Set.new(%i[include extend prepend]).freeze
2019-02-15 15:39:39 +05:30
2020-06-23 00:09:42 +05:30
COMMENT_OR_EMPTY_LINE = /^\s*(#.*|$)/.freeze
CHECK_LINE_METHODS_REGEXP = Regexp.union((CHECK_LINE_METHODS + DISALLOW_METHODS).map(&:to_s) + [COMMENT_OR_EMPTY_LINE]).freeze
2019-03-02 22:35:43 +05:30
def ee_const?(node)
line = node.location.expression.source_line
# We use `match?` here instead of RuboCop's AST matching, as this makes
# it far easier to handle nested constants such as `EE::Foo::Bar::Baz`.
2019-12-04 20:38:33 +05:30
line.match?(/(\s|\()('|")?(::)?(QA::)?EE::/)
2019-03-02 22:35:43 +05:30
end
2019-02-15 15:39:39 +05:30
def on_send(node)
2019-10-12 21:52:04 +05:30
return unless check_method?(node)
2019-02-15 15:39:39 +05:30
2019-10-12 21:52:04 +05:30
if DISALLOW_METHODS.include?(node.children[1])
2022-10-11 01:57:18 +05:30
add_offense(node, message: DISALLOWED_METHOD, &corrector(node))
2019-10-12 21:52:04 +05:30
else
verify_line_number(node)
verify_argument_type(node)
end
end
def verify_line_number(node)
2019-02-15 15:39:39 +05:30
line = node.location.line
buffer = node.location.expression.source_buffer
last_line = buffer.last_line
2020-06-23 00:09:42 +05:30
lines = buffer.source.split("\n")
# We allow multiple includes, extends and prepends as long as they're all at the end.
allowed_line = (line...last_line).all? { |i| CHECK_LINE_METHODS_REGEXP.match?(lines[i - 1]) }
2019-02-15 15:39:39 +05:30
2020-06-23 00:09:42 +05:30
if allowed_line
2020-05-24 23:13:21 +05:30
ignore_node(node)
elsif line < last_line
2022-10-11 01:57:18 +05:30
add_offense(node, message: INVALID_LINE, &corrector(node))
2020-05-24 23:13:21 +05:30
end
2019-10-12 21:52:04 +05:30
end
def verify_argument_type(node)
argument = node.children[2]
return if argument.str_type?
2022-10-11 01:57:18 +05:30
add_offense(argument, message: INVALID_ARGUMENT, &corrector(argument))
2019-10-12 21:52:04 +05:30
end
def check_method?(node)
name = node.children[1]
2021-06-08 01:23:25 +05:30
if DISALLOW_METHODS.include?(name)
2019-10-12 21:52:04 +05:30
ee_const?(node.children[2])
else
2021-06-08 01:23:25 +05:30
CHECK_LINE_METHODS.include?(name)
2019-10-12 21:52:04 +05:30
end
2019-02-15 15:39:39 +05:30
end
2022-10-11 01:57:18 +05:30
private
2019-02-15 15:39:39 +05:30
# Automatically correcting these offenses is not always possible, as
# sometimes code needs to be refactored to make this work. As such, we
# only allow developers to easily blacklist existing offenses.
2022-10-11 01:57:18 +05:30
def corrector(node)
2019-02-15 15:39:39 +05:30
lambda do |corrector|
corrector.insert_after(
node.source_range,
" # rubocop: disable #{cop_name}"
)
end
end
end
end
end