summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorcjihrig <cjihrig@gmail.com>2019-08-17 11:50:43 -0400
committercjihrig <cjihrig@gmail.com>2019-08-19 11:55:22 -0400
commit3238232fc46f6a8cc0dc1323aba762247c464e5e (patch)
tree428f6636855f08a5224204c319ec2d2f89ee4ae4 /lib
parent37321a9e11f2198d03a525cddca20827636b786c (diff)
downloadandroid-node-v8-3238232fc46f6a8cc0dc1323aba762247c464e5e.tar.gz
android-node-v8-3238232fc46f6a8cc0dc1323aba762247c464e5e.tar.bz2
android-node-v8-3238232fc46f6a8cc0dc1323aba762247c464e5e.zip
lib: rename validateSafeInteger to validateInteger
validateInteger() was renamed to validateSafeInteger() in https://github.com/nodejs/node/pull/26572. However, this function also works with unsafe integers. This commit restores the old name, and adds some basic tests. PR-URL: https://github.com/nodejs/node/pull/29184 Refs: https://github.com/nodejs/node/pull/26572 Reviewed-By: Rich Trott <rtrott@gmail.com> Reviewed-By: Luigi Pinca <luigipinca@gmail.com> Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Yongsheng Zhang <zyszys98@gmail.com> Reviewed-By: Trivikram Kamat <trivikr.dev@gmail.com>
Diffstat (limited to 'lib')
-rw-r--r--lib/fs.js16
-rw-r--r--lib/internal/crypto/scrypt.js4
-rw-r--r--lib/internal/fs/promises.js8
-rw-r--r--lib/internal/validators.js4
4 files changed, 16 insertions, 16 deletions
diff --git a/lib/fs.js b/lib/fs.js
index c8edc59046..87c1e28c54 100644
--- a/lib/fs.js
+++ b/lib/fs.js
@@ -85,7 +85,7 @@ const {
isUint32,
parseMode,
validateBuffer,
- validateSafeInteger,
+ validateInteger,
validateInt32,
validateUint32
} = require('internal/validators');
@@ -469,7 +469,7 @@ function read(fd, buffer, offset, length, position, callback) {
if (offset == null) {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
length |= 0;
@@ -511,7 +511,7 @@ function readSync(fd, buffer, offset, length, position) {
if (offset == null) {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
length |= 0;
@@ -557,7 +557,7 @@ function write(fd, buffer, offset, length, position, callback) {
if (offset == null || typeof offset === 'function') {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
if (typeof length !== 'number')
length = buffer.length - offset;
@@ -599,7 +599,7 @@ function writeSync(fd, buffer, offset, length, position) {
if (offset == null) {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
if (typeof length !== 'number')
length = buffer.byteLength - offset;
@@ -698,7 +698,7 @@ function truncate(path, len, callback) {
len = 0;
}
- validateSafeInteger(len, 'len');
+ validateInteger(len, 'len');
callback = maybeCallback(callback);
fs.open(path, 'r+', (er, fd) => {
if (er) return callback(er);
@@ -739,7 +739,7 @@ function ftruncate(fd, len = 0, callback) {
len = 0;
}
validateInt32(fd, 'fd', 0);
- validateSafeInteger(len, 'len');
+ validateInteger(len, 'len');
len = Math.max(0, len);
const req = new FSReqCallback();
req.oncomplete = makeCallback(callback);
@@ -748,7 +748,7 @@ function ftruncate(fd, len = 0, callback) {
function ftruncateSync(fd, len = 0) {
validateInt32(fd, 'fd', 0);
- validateSafeInteger(len, 'len');
+ validateInteger(len, 'len');
len = Math.max(0, len);
const ctx = {};
binding.ftruncate(fd, len, undefined, ctx);
diff --git a/lib/internal/crypto/scrypt.js b/lib/internal/crypto/scrypt.js
index 19a742c85c..e2751f8fa5 100644
--- a/lib/internal/crypto/scrypt.js
+++ b/lib/internal/crypto/scrypt.js
@@ -3,7 +3,7 @@
const { AsyncWrap, Providers } = internalBinding('async_wrap');
const { Buffer } = require('buffer');
const { scrypt: _scrypt } = internalBinding('crypto');
-const { validateSafeInteger, validateUint32 } = require('internal/validators');
+const { validateInteger, validateUint32 } = require('internal/validators');
const {
ERR_CRYPTO_SCRYPT_INVALID_PARAMETER,
ERR_CRYPTO_SCRYPT_NOT_SUPPORTED,
@@ -108,7 +108,7 @@ function check(password, salt, keylen, options) {
}
if (options.maxmem !== undefined) {
maxmem = options.maxmem;
- validateSafeInteger(maxmem, 'maxmem', 0);
+ validateInteger(maxmem, 'maxmem', 0);
}
if (N === 0) N = defaults.N;
if (r === 0) r = defaults.r;
diff --git a/lib/internal/fs/promises.js b/lib/internal/fs/promises.js
index 6364fb6e9d..e796520b26 100644
--- a/lib/internal/fs/promises.js
+++ b/lib/internal/fs/promises.js
@@ -36,7 +36,7 @@ const {
const {
parseMode,
validateBuffer,
- validateSafeInteger,
+ validateInteger,
validateUint32
} = require('internal/validators');
const pathModule = require('path');
@@ -209,7 +209,7 @@ async function read(handle, buffer, offset, length, position) {
if (offset == null) {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
length |= 0;
@@ -243,7 +243,7 @@ async function write(handle, buffer, offset, length, position) {
if (offset == null) {
offset = 0;
} else {
- validateSafeInteger(offset, 'offset');
+ validateInteger(offset, 'offset');
}
if (typeof length !== 'number')
length = buffer.length - offset;
@@ -278,7 +278,7 @@ async function truncate(path, len = 0) {
async function ftruncate(handle, len = 0) {
validateFileHandle(handle);
- validateSafeInteger(len, 'len');
+ validateInteger(len, 'len');
len = Math.max(0, len);
return binding.ftruncate(handle.fd, len, kUsePromises);
}
diff --git a/lib/internal/validators.js b/lib/internal/validators.js
index 88d1d0a42c..f74338ebcb 100644
--- a/lib/internal/validators.js
+++ b/lib/internal/validators.js
@@ -62,7 +62,7 @@ function parseMode(value, name, def) {
throw new ERR_INVALID_ARG_VALUE(name, value, modeDesc);
}
-const validateSafeInteger = hideStackFrames(
+const validateInteger = hideStackFrames(
(value, name, min = MIN_SAFE_INTEGER, max = MAX_SAFE_INTEGER) => {
if (typeof value !== 'number')
throw new ERR_INVALID_ARG_TYPE(name, 'number', value);
@@ -161,7 +161,7 @@ module.exports = {
parseMode,
validateBuffer,
validateEncoding,
- validateSafeInteger,
+ validateInteger,
validateInt32,
validateUint32,
validateString,