2018-12-13 09:46:01 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
module RuboCop
|
|
|
|
module Cop
|
2020-05-25 23:08:02 -04:00
|
|
|
# Cop that blacklists the injecting of EE specific modules before any lines which are not already injecting another module.
|
|
|
|
# It allows multiple module injections as long as they're all at the end.
|
2018-12-13 09:46:01 -05:00
|
|
|
class InjectEnterpriseEditionModule < RuboCop::Cop::Cop
|
2019-07-26 08:52:18 -04:00
|
|
|
INVALID_LINE = 'Injecting EE modules must be done on the last line of this file' \
|
|
|
|
', outside of any class or module definitions'
|
2018-12-13 09:46:01 -05:00
|
|
|
|
2019-07-26 08:52:18 -04:00
|
|
|
DISALLOWED_METHOD =
|
|
|
|
'EE modules must be injected using `include_if_ee`, `extend_if_ee`, or `prepend_if_ee`'
|
|
|
|
|
|
|
|
INVALID_ARGUMENT = 'EE modules to inject must be specified as a String'
|
|
|
|
|
|
|
|
CHECK_LINE_METHODS =
|
|
|
|
Set.new(%i[include_if_ee extend_if_ee prepend_if_ee]).freeze
|
|
|
|
|
|
|
|
DISALLOW_METHODS = Set.new(%i[include extend prepend]).freeze
|
2018-12-13 09:46:01 -05:00
|
|
|
|
2020-05-25 23:08:02 -04:00
|
|
|
COMMENT_OR_EMPTY_LINE = /^\s*(#.*|$)/.freeze
|
|
|
|
|
|
|
|
CHECK_LINE_METHODS_REGEXP = Regexp.union((CHECK_LINE_METHODS + DISALLOW_METHODS).map(&:to_s) + [COMMENT_OR_EMPTY_LINE]).freeze
|
|
|
|
|
2019-01-16 09:21:50 -05:00
|
|
|
def ee_const?(node)
|
|
|
|
line = node.location.expression.source_line
|
|
|
|
|
|
|
|
# We use `match?` here instead of RuboCop's AST matching, as this makes
|
|
|
|
# it far easier to handle nested constants such as `EE::Foo::Bar::Baz`.
|
2019-08-28 11:20:06 -04:00
|
|
|
line.match?(/(\s|\()('|")?(::)?(QA::)?EE::/)
|
2019-01-16 09:21:50 -05:00
|
|
|
end
|
2018-12-13 09:46:01 -05:00
|
|
|
|
|
|
|
def on_send(node)
|
2019-07-26 08:52:18 -04:00
|
|
|
return unless check_method?(node)
|
2018-12-13 09:46:01 -05:00
|
|
|
|
2019-07-26 08:52:18 -04:00
|
|
|
if DISALLOW_METHODS.include?(node.children[1])
|
|
|
|
add_offense(node, message: DISALLOWED_METHOD)
|
|
|
|
else
|
|
|
|
verify_line_number(node)
|
|
|
|
verify_argument_type(node)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def verify_line_number(node)
|
2018-12-13 09:46:01 -05:00
|
|
|
line = node.location.line
|
|
|
|
buffer = node.location.expression.source_buffer
|
|
|
|
last_line = buffer.last_line
|
2020-05-25 23:08:02 -04:00
|
|
|
lines = buffer.source.split("\n")
|
|
|
|
# We allow multiple includes, extends and prepends as long as they're all at the end.
|
|
|
|
allowed_line = (line...last_line).all? { |i| CHECK_LINE_METHODS_REGEXP.match?(lines[i - 1]) }
|
2018-12-13 09:46:01 -05:00
|
|
|
|
2020-05-25 23:08:02 -04:00
|
|
|
if allowed_line
|
2020-05-12 11:10:33 -04:00
|
|
|
ignore_node(node)
|
|
|
|
elsif line < last_line
|
|
|
|
add_offense(node, message: INVALID_LINE)
|
|
|
|
end
|
2019-07-26 08:52:18 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
def verify_argument_type(node)
|
|
|
|
argument = node.children[2]
|
|
|
|
|
|
|
|
return if argument.str_type?
|
|
|
|
|
|
|
|
add_offense(argument, message: INVALID_ARGUMENT)
|
|
|
|
end
|
|
|
|
|
|
|
|
def check_method?(node)
|
|
|
|
name = node.children[1]
|
|
|
|
|
|
|
|
if CHECK_LINE_METHODS.include?(name) || DISALLOW_METHODS.include?(name)
|
|
|
|
ee_const?(node.children[2])
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
2018-12-13 09:46:01 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
# Automatically correcting these offenses is not always possible, as
|
|
|
|
# sometimes code needs to be refactored to make this work. As such, we
|
|
|
|
# only allow developers to easily blacklist existing offenses.
|
|
|
|
def autocorrect(node)
|
|
|
|
lambda do |corrector|
|
|
|
|
corrector.insert_after(
|
|
|
|
node.source_range,
|
|
|
|
" # rubocop: disable #{cop_name}"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|