summaryrefslogtreecommitdiff
path: root/tools/eslint-rules/crypto-check.js
diff options
context:
space:
mode:
authorDaniel Bevenius <daniel.bevenius@gmail.com>2017-06-20 08:30:47 +0200
committerRuben Bridgewater <ruben@bridgewater.de>2017-08-30 18:02:58 -0300
commit50ebac112429c4a8cf9438dac9d832530465d2bb (patch)
tree6f635f9d7c97251a16dd49afcfbc44fe214c6788 /tools/eslint-rules/crypto-check.js
parented1ba4580b4abdc38047f4f74ab79ba0b71f3da4 (diff)
downloadandroid-node-v8-50ebac112429c4a8cf9438dac9d832530465d2bb.tar.gz
android-node-v8-50ebac112429c4a8cf9438dac9d832530465d2bb.tar.bz2
android-node-v8-50ebac112429c4a8cf9438dac9d832530465d2bb.zip
tools: add eslint rule for hasCrypto checking
The motivation for this commit is to pick up early on missing checks for crypto support (when Node is built --without-ssl). There are currently usages of common.hasCrypto which are not just for detecting if crypto support is available and then skip the test in question. For these case we still want to have a lint error generated which can then be disabled using an ESLint comment. PR-URL: https://github.com/nodejs/node/pull/13813 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Teddy Katz <teddy.katz@gmail.com>
Diffstat (limited to 'tools/eslint-rules/crypto-check.js')
-rw-r--r--tools/eslint-rules/crypto-check.js83
1 files changed, 83 insertions, 0 deletions
diff --git a/tools/eslint-rules/crypto-check.js b/tools/eslint-rules/crypto-check.js
new file mode 100644
index 0000000000..b1b2a03f50
--- /dev/null
+++ b/tools/eslint-rules/crypto-check.js
@@ -0,0 +1,83 @@
+/**
+ * @fileoverview Check that common.hasCrypto is used if crypto, tls,
+ * https, or http2 modules are required.
+ *
+ * This rule can be ignored using // eslint-disable-line crypto-check
+ *
+ * @author Daniel Bevenius <daniel.bevenius@gmail.com>
+ */
+'use strict';
+
+const utils = require('./rules-utils.js');
+
+//------------------------------------------------------------------------------
+// Rule Definition
+//------------------------------------------------------------------------------
+const msg = 'Please add a hasCrypto check to allow this test to be skipped ' +
+ 'when Node is built "--without-ssl".';
+
+module.exports = function(context) {
+ const missingCheckNodes = [];
+ const requireNodes = [];
+ var hasSkipCall = false;
+
+ function testCryptoUsage(node) {
+ if (utils.isRequired(node, ['crypto', 'tls', 'https', 'http2'])) {
+ requireNodes.push(node);
+ }
+ }
+
+ function testIfStatement(node) {
+ if (node.test.argument === undefined) {
+ return;
+ }
+ if (isCryptoCheck(node.test.argument)) {
+ checkCryptoCall(node);
+ }
+ }
+
+ function isCryptoCheck(node) {
+ return utils.usesCommonProperty(node, ['hasCrypto', 'hasFipsCrypto']);
+ }
+
+ function checkCryptoCall(node) {
+ if (utils.inSkipBlock(node)) {
+ hasSkipCall = true;
+ } else {
+ missingCheckNodes.push(node);
+ }
+ }
+
+ function testMemberExpression(node) {
+ if (isCryptoCheck(node)) {
+ checkCryptoCall(node);
+ }
+ }
+
+ function reportIfMissingCheck(node) {
+ if (hasSkipCall) {
+ return;
+ }
+
+ if (requireNodes.length > 0) {
+ if (missingCheckNodes.length > 0) {
+ report(missingCheckNodes);
+ } else {
+ report(requireNodes);
+ }
+ }
+ }
+
+ function report(nodes) {
+ nodes.forEach((node) => {
+ context.report(node, msg);
+ });
+ }
+
+ return {
+ 'CallExpression': (node) => testCryptoUsage(node),
+ 'IfStatement:exit': (node) => testIfStatement(node),
+ 'MemberExpression:exit': (node) => testMemberExpression(node),
+ 'Program:exit': (node) => reportIfMissingCheck(node)
+ };
+};