-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix safe interpolation detection #48
Fix safe interpolation detection #48
Conversation
The rspec-collection_matchers documentation advise to require rspec-collection_matchers form `spec_helper.rb`. This fix: ``` Failure/Error: expect(problems).to have(1).problems NoMethodError: undefined method `have' for #<RSpec::ExampleGroups::CheckUnsafeInterpolations::WithFixDisabled::ExecWithUnsafeInterpolationInCommand "detects an unsafe exec command argument" (./spec/puppet-lint/plugins/check_unsafe_interpolations_spec.rb:20)> ```
We produce 2 errors in this example. We don't want to check that the first one is present twice: we want to check that each warning is present once.
These commands are supposed to be supported, but they are not tested, so add tests to demonstrate that they work as intended.
When using the `unless` parameter of an `exec` resource with unsafe string interpolation, the linter should warn about the issue. It happen that it currently doesn't because unless is also a keyword. Adjust the linter to cope with this.
72ead66
to
607323b
Compare
Any variable interpolation is currently reported as unsafe. The stdlib feature a `stdlib::shell_escape()` function (formerly `shell_escape()`) that escape the string passed as parameter. In such a case, an unsafe interpolation should not be detected. Add detection of such escaped string and do not report an error in this case. `stdlib::shell_escape()` must be the last function called in the interpolation for it to not be reported as unsafe.
607323b
to
80a991d
Compare
@smortex We are happy to merge this in, but we will not be able to add it into the default templates until such time as auto correct functionality for it has been added. Thanks for putting in the work :) |
You mean into the PDK templates? I am not sure we can reliably auto-fix these issues as what has to be done is quite different from one context to another, and shell_espacing all variables will often work but sometimes completely break the code. Yet this module is very valuable to find issues in code. Do you think we can do a new release to integrate this change? |
Any variable interpolation is currently reported as unsafe.
The stdlib feature a
stdlib::shell_escape()
function (formerlyshell_escape()
) that escape the string passed as parameter. In such a case, an unsafe interpolation should not be detected.Add detection of such escaped string and do not report an error in this case.
stdlib::shell_escape()
must be the last function called in the interpolation for it to not be reported as unsafe.Fixes #39
Also include:
unless
parameter #47