Package Exports
- file-freezer
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (file-freezer) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
File Freezer
Table of Contents |
---|
what
You want this if:
- you have 1 or a sequence of file(s) which must never change again once merged, and you want to guarantee this with more code and less human.
Example:
- edits to already-applied migrations slipped past code review into master, and you want to prevent this from being possible by attaching a check to PR tests.
This approach is conceptually similar to a Merkle tree or blockchain, in that it signs each file with a comment hash such that a prior change would alter subsequent signatures, raising a red flag on the next check that either file or sequence integrity was not preserved.
usage
cli
/your/project> node file-freezer --help
-f, --files [value] glob string passed to npmjs.org/glob to fetch file sequence
(defaults to "./migrations/**/*.@(js|sql)")
-h, --help Output usage information
-r, --readOnly Whether to write signatures to files or error in their absence.
Useful for tests (disabled by default)
-u, --uninstall removes all signature comments from all files found via --files
(disabled by default)
-s, --silent log nothing out (disabled by default)
api
require('file-freezer')({
// same option flags as cli above; example:
files:'./migrations/**/*.@(js|sql)'
})
how
- it fetches globbed file strings, then for each in lexical filepath sequence:
- digests to a hash the concatenation of:
- the previous token, if present
- and the current file contents string minus any
file-freezer
token hash it detects
- looks for the hash in the original source string
- if it finds it, good, it hasn't changed
- if it finds no
file-freezer
hash- and
readOnly
isfalse
, writes the hash in a comment atop the source - and
readOnly
istrue
, logs and exits with code 1
- and
- if it finds a different
file-freezer
hash, logs and exits with code 1
Attaching this to your tests with --readOnly
will catch missing signatures and errant edits to desirably immutable files / sequences even if human reviewers do not.
but
- "...how do I sign my new file(s) before commit?"
- run the check locally (without the
--readOnly
option so it defaults tofalse
and signs new files)
- run the check locally (without the
- "...I have to change the latest uncommitted files, and they're already hashed!"
- delete the hash comments atop the files and run it again, it'll update instead of alarm.
future
- js (& sql?) AST-based hashing, so non-functional changes do not alter hash?
changelog
- 2018-04-25 - altered token from
/*FILE-FREEZER:<HASH>*/
to/* FILE-FREEZER:<HASH> */
to comport with common linter rules. The matching regex was also updated, so existing signatures should still be found.