2020-10-10 14:16:11 +02:00
|
|
|
# typed: false
|
2019-04-19 15:38:03 +09:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-10-26 19:41:14 +01:00
|
|
|
require "rubocops/extend/formula"
|
2017-07-19 01:14:14 +05:30
|
|
|
|
|
|
|
module RuboCop
|
|
|
|
module Cop
|
|
|
|
module FormulaAudit
|
2020-11-05 17:17:03 -05:00
|
|
|
# This cop audits `url`s and `mirror`s in formulae.
|
2020-08-26 03:00:56 +02:00
|
|
|
#
|
|
|
|
# @api private
|
2017-07-19 01:14:14 +05:30
|
|
|
class Urls < FormulaCop
|
|
|
|
def audit_formula(_node, _class_node, _parent_class_node, body_node)
|
2018-04-10 03:22:28 +05:30
|
|
|
urls = find_every_func_call_by_name(body_node, :url)
|
|
|
|
mirrors = find_every_func_call_by_name(body_node, :mirror)
|
2017-07-19 01:14:14 +05:30
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Identify livecheck URLs, to skip some checks for them
|
2020-05-22 15:18:01 +05:30
|
|
|
livecheck_url = if (livecheck = find_every_func_call_by_name(body_node, :livecheck).first) &&
|
|
|
|
(livecheck_url = find_every_func_call_by_name(livecheck.parent, :url).first)
|
|
|
|
string_content(parameters(livecheck_url).first)
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# GNU URLs; doesn't apply to mirrors
|
2017-07-19 01:14:14 +05:30
|
|
|
gnu_pattern = %r{^(?:https?|ftp)://ftpmirror.gnu.org/(.*)}
|
|
|
|
audit_urls(urls, gnu_pattern) do |match, url|
|
|
|
|
problem "Please use \"https://ftp.gnu.org/gnu/#{match[1]}\" instead of #{url}."
|
|
|
|
end
|
|
|
|
|
|
|
|
# Fossies upstream requests they aren't used as primary URLs
|
|
|
|
# https://github.com/Homebrew/homebrew-core/issues/14486#issuecomment-307753234
|
|
|
|
fossies_pattern = %r{^https?://fossies\.org/}
|
|
|
|
audit_urls(urls, fossies_pattern) do
|
|
|
|
problem "Please don't use fossies.org in the url (using as a mirror is fine)"
|
|
|
|
end
|
|
|
|
|
2020-02-19 11:48:54 -05:00
|
|
|
apache_pattern = %r{^https?://(?:[^/]*\.)?apache\.org/(?:dyn/closer\.cgi\?path=/?|dist/)(.*)}i
|
|
|
|
audit_urls(urls, apache_pattern) do |match, url|
|
2020-05-22 15:18:01 +05:30
|
|
|
next if url == livecheck_url
|
|
|
|
|
2020-02-19 11:48:54 -05:00
|
|
|
problem "#{url} should be `https://www.apache.org/dyn/closer.lua?path=#{match[1]}`"
|
|
|
|
end
|
|
|
|
|
2020-05-20 17:22:39 -05:00
|
|
|
version_control_pattern = %r{^(cvs|bzr|hg|fossil)://}
|
|
|
|
audit_urls(urls, version_control_pattern) do |match, _|
|
|
|
|
problem "Use of the #{match[1]}:// scheme is deprecated, pass `:using => :#{match[1]}` instead"
|
|
|
|
end
|
|
|
|
|
|
|
|
svn_pattern = %r{^svn\+http://}
|
|
|
|
audit_urls(urls, svn_pattern) do |_, _|
|
|
|
|
problem "Use of the svn+http:// scheme is deprecated, pass `:using => :svn` instead"
|
|
|
|
end
|
|
|
|
|
2017-07-19 01:14:14 +05:30
|
|
|
audit_urls(mirrors, /.*/) do |_, mirror|
|
|
|
|
urls.each do |url|
|
|
|
|
url_string = string_content(parameters(url).first)
|
|
|
|
next unless url_string.eql?(mirror)
|
2018-09-17 02:45:00 +02:00
|
|
|
|
2017-07-19 01:14:14 +05:30
|
|
|
problem "URL should not be duplicated as a mirror: #{url_string}"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
urls += mirrors
|
|
|
|
|
|
|
|
# Check a variety of SSL/TLS URLs that don't consistently auto-redirect
|
|
|
|
# or are overly common errors that need to be reduced & fixed over time.
|
|
|
|
http_to_https_patterns = Regexp.union([%r{^http://ftp\.gnu\.org/},
|
|
|
|
%r{^http://ftpmirror\.gnu\.org/},
|
|
|
|
%r{^http://download\.savannah\.gnu\.org/},
|
|
|
|
%r{^http://download-mirror\.savannah\.gnu\.org/},
|
2020-02-19 11:48:54 -05:00
|
|
|
%r{^http://(?:[^/]*\.)?apache\.org/},
|
2017-07-19 01:14:14 +05:30
|
|
|
%r{^http://code\.google\.com/},
|
|
|
|
%r{^http://fossies\.org/},
|
|
|
|
%r{^http://mirrors\.kernel\.org/},
|
2018-10-23 12:26:58 +00:00
|
|
|
%r{^http://mirrors\.ocf\.berkeley\.edu/},
|
2017-07-19 01:14:14 +05:30
|
|
|
%r{^http://(?:[^/]*\.)?bintray\.com/},
|
|
|
|
%r{^http://tools\.ietf\.org/},
|
|
|
|
%r{^http://launchpad\.net/},
|
|
|
|
%r{^http://github\.com/},
|
|
|
|
%r{^http://bitbucket\.org/},
|
|
|
|
%r{^http://anonscm\.debian\.org/},
|
|
|
|
%r{^http://cpan\.metacpan\.org/},
|
|
|
|
%r{^http://hackage\.haskell\.org/},
|
|
|
|
%r{^http://(?:[^/]*\.)?archive\.org},
|
|
|
|
%r{^http://(?:[^/]*\.)?freedesktop\.org},
|
|
|
|
%r{^http://(?:[^/]*\.)?mirrorservice\.org/}])
|
2021-10-01 13:42:05 +01:00
|
|
|
audit_urls(urls, http_to_https_patterns) do |_, url, index|
|
|
|
|
# It's fine to have a plain HTTP mirror further down the mirror list.
|
|
|
|
https_url = url.dup.insert(4, "s")
|
|
|
|
https_index = nil
|
|
|
|
audit_urls(urls, https_url) do |_, _, found_https_index|
|
|
|
|
https_index = found_https_index
|
|
|
|
end
|
|
|
|
problem "Please use https:// for #{url}" if !https_index || https_index > index
|
2017-07-19 01:14:14 +05:30
|
|
|
end
|
|
|
|
|
2020-02-19 11:48:54 -05:00
|
|
|
apache_mirror_pattern = %r{^https?://(?:[^/]*\.)?apache\.org/dyn/closer\.(?:cgi|lua)\?path=/?(.*)}i
|
|
|
|
audit_urls(mirrors, apache_mirror_pattern) do |match, mirror|
|
|
|
|
problem "Please use `https://archive.apache.org/dist/#{match[1]}` as a mirror instead of #{mirror}."
|
|
|
|
end
|
|
|
|
|
2017-07-19 01:14:14 +05:30
|
|
|
cpan_pattern = %r{^http://search\.mcpan\.org/CPAN/(.*)}i
|
|
|
|
audit_urls(urls, cpan_pattern) do |match, url|
|
|
|
|
problem "#{url} should be `https://cpan.metacpan.org/#{match[1]}`"
|
|
|
|
end
|
|
|
|
|
|
|
|
gnome_pattern = %r{^(http|ftp)://ftp\.gnome\.org/pub/gnome/(.*)}i
|
|
|
|
audit_urls(urls, gnome_pattern) do |match, url|
|
|
|
|
problem "#{url} should be `https://download.gnome.org/#{match[2]}`"
|
|
|
|
end
|
|
|
|
|
|
|
|
debian_pattern = %r{^git://anonscm\.debian\.org/users/(.*)}i
|
|
|
|
audit_urls(urls, debian_pattern) do |match, url|
|
|
|
|
problem "#{url} should be `https://anonscm.debian.org/git/users/#{match[1]}`"
|
|
|
|
end
|
2017-07-20 01:51:43 +05:30
|
|
|
|
|
|
|
# Prefer HTTP/S when possible over FTP protocol due to possible firewalls.
|
|
|
|
mirror_service_pattern = %r{^ftp://ftp\.mirrorservice\.org}
|
|
|
|
audit_urls(urls, mirror_service_pattern) do |_, url|
|
|
|
|
problem "Please use https:// for #{url}"
|
|
|
|
end
|
|
|
|
|
|
|
|
cpan_ftp_pattern = %r{^ftp://ftp\.cpan\.org/pub/CPAN(.*)}i
|
|
|
|
audit_urls(urls, cpan_ftp_pattern) do |match_obj, url|
|
|
|
|
problem "#{url} should be `http://search.cpan.org/CPAN#{match_obj[1]}`"
|
|
|
|
end
|
|
|
|
|
|
|
|
# SourceForge url patterns
|
|
|
|
sourceforge_patterns = %r{^https?://.*\b(sourceforge|sf)\.(com|net)}
|
|
|
|
audit_urls(urls, sourceforge_patterns) do |_, url|
|
|
|
|
# Skip if the URL looks like a SVN repo
|
|
|
|
next if url.include? "/svnroot/"
|
|
|
|
next if url.include? "svn.sourceforge"
|
|
|
|
next if url.include? "/p/"
|
|
|
|
|
|
|
|
if url =~ /(\?|&)use_mirror=/
|
|
|
|
problem "Don't use #{Regexp.last_match(1)}use_mirror in SourceForge urls (url is #{url})."
|
|
|
|
end
|
|
|
|
|
2019-02-19 13:11:32 +00:00
|
|
|
problem "Don't use /download in SourceForge urls (url is #{url})." if url.end_with?("/download")
|
2017-07-20 01:51:43 +05:30
|
|
|
|
2020-05-22 15:18:01 +05:30
|
|
|
if url.match?(%r{^https?://sourceforge\.}) && url != livecheck_url
|
2017-07-20 01:51:43 +05:30
|
|
|
problem "Use https://downloads.sourceforge.net to get geolocation (url is #{url})."
|
|
|
|
end
|
|
|
|
|
2019-10-13 19:26:39 +01:00
|
|
|
if url.match?(%r{^https?://prdownloads\.})
|
2017-10-15 02:28:32 +02:00
|
|
|
problem <<~EOS.chomp
|
2017-08-17 11:41:58 +05:30
|
|
|
Don't use prdownloads in SourceForge urls (url is #{url}).
|
|
|
|
See: http://librelist.com/browser/homebrew/2011/1/12/prdownloads-is-bad/
|
|
|
|
EOS
|
2017-07-20 01:51:43 +05:30
|
|
|
end
|
|
|
|
|
2019-10-13 19:26:39 +01:00
|
|
|
if url.match?(%r{^http://\w+\.dl\.})
|
2017-07-20 01:51:43 +05:30
|
|
|
problem "Don't use specific dl mirrors in SourceForge urls (url is #{url})."
|
|
|
|
end
|
|
|
|
|
|
|
|
problem "Please use https:// for #{url}" if url.start_with? "http://downloads"
|
|
|
|
end
|
|
|
|
|
|
|
|
# Debian has an abundance of secure mirrors. Let's not pluck the insecure
|
|
|
|
# one out of the grab bag.
|
|
|
|
unsecure_deb_pattern = %r{^http://http\.debian\.net/debian/(.*)}i
|
|
|
|
audit_urls(urls, unsecure_deb_pattern) do |match, _|
|
2017-10-15 02:28:32 +02:00
|
|
|
problem <<~EOS
|
2017-07-20 01:51:43 +05:30
|
|
|
Please use a secure mirror for Debian URLs.
|
|
|
|
We recommend:
|
2018-10-23 12:26:58 +00:00
|
|
|
https://deb.debian.org/debian/#{match[1]}
|
2017-07-20 01:51:43 +05:30
|
|
|
EOS
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check to use canonical URLs for Debian packages
|
2018-10-23 12:26:58 +00:00
|
|
|
noncanon_deb_pattern =
|
|
|
|
Regexp.union([%r{^https://mirrors\.kernel\.org/debian/},
|
|
|
|
%r{^https://mirrors\.ocf\.berkeley\.edu/debian/},
|
|
|
|
%r{^https://(?:[^/]*\.)?mirrorservice\.org/sites/ftp\.debian\.org/debian/}])
|
|
|
|
audit_urls(urls, noncanon_deb_pattern) do |_, url|
|
|
|
|
problem "Please use https://deb.debian.org/debian/ for #{url}"
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check for new-url Google Code download URLs, https:// is preferred
|
2017-07-20 01:51:43 +05:30
|
|
|
google_code_pattern = Regexp.union([%r{^http://.*\.googlecode\.com/files.*},
|
|
|
|
%r{^http://code\.google\.com/}])
|
|
|
|
audit_urls(urls, google_code_pattern) do |_, url|
|
|
|
|
problem "Please use https:// for #{url}"
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check for git:// GitHub repo URLs, https:// is preferred.
|
2017-07-20 01:51:43 +05:30
|
|
|
git_gh_pattern = %r{^git://[^/]*github\.com/}
|
|
|
|
audit_urls(urls, git_gh_pattern) do |_, url|
|
|
|
|
problem "Please use https:// for #{url}"
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check for git:// Gitorious repo URLs, https:// is preferred.
|
2017-07-20 01:51:43 +05:30
|
|
|
git_gitorious_pattern = %r{^git://[^/]*gitorious\.org/}
|
|
|
|
audit_urls(urls, git_gitorious_pattern) do |_, url|
|
|
|
|
problem "Please use https:// for #{url}"
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check for http:// GitHub repo URLs, https:// is preferred.
|
2017-07-20 01:51:43 +05:30
|
|
|
gh_pattern = %r{^http://github\.com/.*\.git$}
|
|
|
|
audit_urls(urls, gh_pattern) do |_, url|
|
|
|
|
problem "Please use https:// for #{url}"
|
|
|
|
end
|
|
|
|
|
|
|
|
# Check for master branch GitHub archives.
|
|
|
|
tarball_gh_pattern = %r{^https://github\.com/.*archive/master\.(tar\.gz|zip)$}
|
|
|
|
audit_urls(urls, tarball_gh_pattern) do
|
|
|
|
problem "Use versioned rather than branch tarballs for stable checksums."
|
|
|
|
end
|
|
|
|
|
|
|
|
# Use new-style archive downloads
|
|
|
|
archive_gh_pattern = %r{https://.*github.*/(?:tar|zip)ball/}
|
|
|
|
audit_urls(urls, archive_gh_pattern) do |_, url|
|
2020-05-22 08:52:26 +01:00
|
|
|
next if url.end_with?(".git")
|
2018-09-17 02:45:00 +02:00
|
|
|
|
2017-07-20 01:51:43 +05:30
|
|
|
problem "Use /archive/ URLs for GitHub tarballs (url is #{url})."
|
|
|
|
end
|
|
|
|
|
|
|
|
# Don't use GitHub .zip files
|
|
|
|
zip_gh_pattern = %r{https://.*github.*/(archive|releases)/.*\.zip$}
|
|
|
|
audit_urls(urls, zip_gh_pattern) do |_, url|
|
2020-07-07 13:12:37 +01:00
|
|
|
next if url.include?("releases/download")
|
2018-09-17 02:45:00 +02:00
|
|
|
|
2017-07-20 01:51:43 +05:30
|
|
|
problem "Use GitHub tarballs rather than zipballs (url is #{url})."
|
|
|
|
end
|
|
|
|
|
|
|
|
# Don't use GitHub codeload URLs
|
|
|
|
codeload_gh_pattern = %r{https?://codeload\.github\.com/(.+)/(.+)/(?:tar\.gz|zip)/(.+)}
|
|
|
|
audit_urls(urls, codeload_gh_pattern) do |match, url|
|
2017-10-15 02:28:32 +02:00
|
|
|
problem <<~EOS
|
2017-07-20 01:51:43 +05:30
|
|
|
Use GitHub archive URLs:
|
|
|
|
https://github.com/#{match[1]}/#{match[2]}/archive/#{match[3]}.tar.gz
|
|
|
|
Rather than codeload:
|
|
|
|
#{url}
|
|
|
|
EOS
|
|
|
|
end
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check for Maven Central URLs, prefer HTTPS redirector over specific host
|
2017-07-20 01:51:43 +05:30
|
|
|
maven_pattern = %r{https?://(?:central|repo\d+)\.maven\.org/maven2/(.+)$}
|
|
|
|
audit_urls(urls, maven_pattern) do |match, url|
|
|
|
|
problem "#{url} should be `https://search.maven.org/remotecontent?filepath=#{match[1]}`"
|
|
|
|
end
|
2019-09-02 10:50:49 +01:00
|
|
|
|
|
|
|
return if formula_tap != "homebrew-core"
|
|
|
|
|
|
|
|
# Check for binary URLs
|
2020-04-02 09:32:52 +01:00
|
|
|
audit_urls(urls, /(darwin|macos|osx)/i) do |match, url|
|
|
|
|
next if @formula_name.include?(match.to_s.downcase)
|
|
|
|
next if url.match?(/.(patch|diff)(\?full_index=1)?$/)
|
2020-11-27 12:47:01 -05:00
|
|
|
next if tap_style_exception? :not_a_binary_url_prefix_allowlist
|
2020-11-27 12:36:30 -05:00
|
|
|
next if tap_style_exception? :binary_bootstrap_formula_urls_allowlist
|
2019-09-02 10:50:49 +01:00
|
|
|
|
2020-01-08 15:38:48 -05:00
|
|
|
problem "#{url} looks like a binary package, not a source archive; " \
|
|
|
|
"homebrew/core is source-only."
|
2019-09-02 10:50:49 +01:00
|
|
|
end
|
2017-07-19 01:14:14 +05:30
|
|
|
end
|
2017-07-30 12:57:57 +05:30
|
|
|
end
|
2018-04-25 07:35:26 +10:00
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# This cop makes sure that the correct format for PyPI URLs is used.
|
2020-08-26 03:00:56 +02:00
|
|
|
#
|
|
|
|
# @api private
|
2017-07-30 12:57:57 +05:30
|
|
|
class PyPiUrls < FormulaCop
|
2020-10-20 12:03:48 +02:00
|
|
|
extend T::Sig
|
|
|
|
|
2017-07-30 12:57:57 +05:30
|
|
|
def audit_formula(_node, _class_node, _parent_class_node, body_node)
|
2018-04-10 03:22:28 +05:30
|
|
|
urls = find_every_func_call_by_name(body_node, :url)
|
|
|
|
mirrors = find_every_func_call_by_name(body_node, :mirror)
|
2017-07-30 12:57:57 +05:30
|
|
|
urls += mirrors
|
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Check pypi URLs
|
2020-07-18 13:21:09 -04:00
|
|
|
pypi_pattern = %r{^https?://pypi.python.org/}
|
2020-07-18 14:22:05 -04:00
|
|
|
audit_urls(urls, pypi_pattern) do |_, url|
|
|
|
|
problem "use the `Source` url found on PyPI downloads page (`#{get_pypi_url(url)}`)"
|
2017-07-30 12:57:57 +05:30
|
|
|
end
|
2017-07-19 01:14:14 +05:30
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# Require long files.pythonhosted.org URLs
|
2020-07-18 13:21:09 -04:00
|
|
|
pythonhosted_pattern = %r{^https?://files.pythonhosted.org/packages/source/}
|
2020-07-18 14:22:05 -04:00
|
|
|
audit_urls(urls, pythonhosted_pattern) do |_, url|
|
|
|
|
problem "use the `Source` url found on PyPI downloads page (`#{get_pypi_url(url)}`)"
|
2017-07-19 01:14:14 +05:30
|
|
|
end
|
|
|
|
end
|
2020-07-18 14:22:05 -04:00
|
|
|
|
2020-10-20 12:03:48 +02:00
|
|
|
sig { params(url: String).returns(String) }
|
2020-07-18 14:22:05 -04:00
|
|
|
def get_pypi_url(url)
|
|
|
|
package_file = File.basename(url)
|
|
|
|
package_name = package_file.match(/^(.+)-[a-z0-9.]+$/)[1]
|
|
|
|
"https://pypi.org/project/#{package_name}/#files"
|
|
|
|
end
|
2017-07-19 01:14:14 +05:30
|
|
|
end
|
2020-10-03 12:27:01 -04:00
|
|
|
|
2020-11-05 17:17:03 -05:00
|
|
|
# This cop makes sure that git URLs have a `revision`.
|
2020-10-03 12:27:01 -04:00
|
|
|
#
|
|
|
|
# @api private
|
|
|
|
class GitUrls < FormulaCop
|
|
|
|
def audit_formula(_node, _class_node, _parent_class_node, body_node)
|
2020-10-03 15:51:30 -04:00
|
|
|
return unless formula_tap == "homebrew-core"
|
|
|
|
|
2020-10-03 12:27:01 -04:00
|
|
|
find_method_calls_by_name(body_node, :url).each do |url|
|
|
|
|
next unless string_content(parameters(url).first).match?(/\.git$/)
|
2020-10-03 15:51:30 -04:00
|
|
|
next if url_has_revision?(parameters(url).last)
|
|
|
|
|
|
|
|
offending_node(url)
|
2020-07-29 17:31:11 -04:00
|
|
|
problem "Formulae in homebrew/core should specify a revision for git URLs"
|
2020-10-03 15:51:30 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def_node_matcher :url_has_revision?, <<~EOS
|
|
|
|
(hash <(pair (sym :revision) str) ...>)
|
|
|
|
EOS
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
module FormulaAuditStrict
|
2020-11-05 17:17:03 -05:00
|
|
|
# This cop makes sure that git URLs have a `tag`.
|
2020-10-03 15:51:30 -04:00
|
|
|
#
|
|
|
|
# @api private
|
|
|
|
class GitUrls < FormulaCop
|
|
|
|
def audit_formula(_node, _class_node, _parent_class_node, body_node)
|
|
|
|
return unless formula_tap == "homebrew-core"
|
2020-10-03 12:27:01 -04:00
|
|
|
|
2020-10-03 15:51:30 -04:00
|
|
|
find_method_calls_by_name(body_node, :url).each do |url|
|
|
|
|
next unless string_content(parameters(url).first).match?(/\.git$/)
|
|
|
|
next if url_has_tag?(parameters(url).last)
|
2020-10-03 12:27:01 -04:00
|
|
|
|
|
|
|
offending_node(url)
|
2020-07-29 17:31:11 -04:00
|
|
|
problem "Formulae in homebrew/core should specify a tag for git URLs"
|
2020-10-03 12:27:01 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-10-03 15:51:30 -04:00
|
|
|
def_node_matcher :url_has_tag?, <<~EOS
|
|
|
|
(hash <(pair (sym :tag) str) ...>)
|
2020-10-03 12:27:01 -04:00
|
|
|
EOS
|
|
|
|
end
|
2017-07-19 01:14:14 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|