2025-01-22 23:17:22 +00:00
|
|
|
# typed: strict
|
2023-03-04 22:23:32 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2024-06-17 19:11:26 +02:00
|
|
|
require "rubocops/shared/url_helper"
|
|
|
|
|
2023-03-04 22:23:32 +00:00
|
|
|
module RuboCop
|
|
|
|
module Cop
|
|
|
|
module Cask
|
|
|
|
# This cop checks that a cask's `url` stanza is formatted correctly.
|
|
|
|
#
|
2024-04-26 20:55:51 +02:00
|
|
|
# ### Example
|
2023-03-04 22:23:32 +00:00
|
|
|
#
|
2024-04-26 20:55:51 +02:00
|
|
|
# ```ruby
|
|
|
|
# # bad
|
|
|
|
# url "https://example.com/download/foo.dmg",
|
|
|
|
# verified: "https://example.com/download"
|
2023-03-04 22:23:32 +00:00
|
|
|
#
|
2024-04-26 20:55:51 +02:00
|
|
|
# # good
|
|
|
|
# url "https://example.com/download/foo.dmg",
|
|
|
|
# verified: "example.com/download/"
|
|
|
|
# ```
|
2023-03-04 22:23:32 +00:00
|
|
|
class Url < Base
|
|
|
|
extend AutoCorrector
|
|
|
|
include OnUrlStanza
|
2024-06-17 19:11:26 +02:00
|
|
|
include UrlHelper
|
2023-03-04 22:23:32 +00:00
|
|
|
|
2025-01-22 23:17:22 +00:00
|
|
|
sig { params(stanza: RuboCop::Cask::AST::Stanza).void }
|
2023-03-04 22:23:32 +00:00
|
|
|
def on_url_stanza(stanza)
|
2024-09-24 22:45:00 -04:00
|
|
|
if stanza.stanza_node.block_type?
|
|
|
|
if cask_tap == "homebrew-cask"
|
|
|
|
add_offense(stanza.stanza_node, message: 'Do not use `url "..." do` blocks in Homebrew/homebrew-cask.')
|
|
|
|
end
|
|
|
|
return
|
|
|
|
end
|
2023-03-04 22:23:32 +00:00
|
|
|
|
2025-01-25 21:35:21 +00:00
|
|
|
stanza_node = T.cast(stanza.stanza_node, RuboCop::AST::SendNode)
|
|
|
|
url_stanza = stanza_node.first_argument
|
|
|
|
hash_node = stanza_node.last_argument
|
2024-06-17 19:11:26 +02:00
|
|
|
|
|
|
|
audit_url(:cask, [stanza.stanza_node], [], livecheck_url: false)
|
|
|
|
|
2023-03-04 22:23:32 +00:00
|
|
|
return unless hash_node.hash_type?
|
|
|
|
|
2025-06-05 10:36:19 -04:00
|
|
|
unless stanza_node.source.match?(/",\n *\w+:/)
|
|
|
|
add_offense(
|
|
|
|
stanza_node.source_range,
|
|
|
|
message: "Keyword URL parameter should be on a new indented line.",
|
|
|
|
) do |corrector|
|
|
|
|
corrector.replace(stanza_node.source_range, stanza_node.source.gsub(/",\s*/, "\",\n "))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-03-04 22:23:32 +00:00
|
|
|
hash_node.each_pair do |key_node, value_node|
|
2023-04-18 15:06:50 -07:00
|
|
|
next if key_node.source != "verified"
|
2023-03-04 22:23:32 +00:00
|
|
|
next unless value_node.str_type?
|
2023-04-02 15:29:17 +01:00
|
|
|
|
|
|
|
if value_node.source.start_with?(%r{^"https?://})
|
|
|
|
add_offense(
|
|
|
|
value_node.source_range,
|
2023-04-02 22:43:52 +01:00
|
|
|
message: "Verified URL parameter value should not contain a URL scheme.",
|
2023-04-02 15:29:17 +01:00
|
|
|
) do |corrector|
|
|
|
|
corrector.replace(value_node.source_range, value_node.source.gsub(%r{^"https?://}, "\""))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-04-02 19:39:23 +01:00
|
|
|
# Skip if the URL and the verified value are the same.
|
2023-04-02 23:00:14 +01:00
|
|
|
next if value_node.source == url_stanza.source.gsub(%r{^"https?://}, "\"")
|
2024-04-30 11:10:23 +02:00
|
|
|
# Skip if the URL has two path components, e.g. `https://github.com/google/fonts.git`.
|
2023-04-04 16:11:44 +01:00
|
|
|
next if url_stanza.source.gsub(%r{^"https?://}, "\"").count("/") == 2
|
2023-04-02 19:39:23 +01:00
|
|
|
# Skip if the verified value ends with a slash.
|
2023-04-02 15:29:17 +01:00
|
|
|
next if value_node.str_content.end_with?("/")
|
2023-03-04 22:23:32 +00:00
|
|
|
|
|
|
|
add_offense(
|
|
|
|
value_node.source_range,
|
2023-04-02 15:29:17 +01:00
|
|
|
message: "Verified URL parameter value should end with a /.",
|
2023-03-04 22:23:32 +00:00
|
|
|
) do |corrector|
|
2023-04-02 15:29:17 +01:00
|
|
|
corrector.replace(value_node.source_range, value_node.source.gsub(/"$/, "/\""))
|
2023-03-04 22:23:32 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|