mirror of
https://github.com/Instadapp/trustwallet-assets.git
synced 2024-07-29 22:37:31 +00:00
84c4db9482
* Add Danger * Create Dangerfile * Add Gemfile * Rename danger to danger.ci * Rename danger.ci to danger.yml * Update Dangerfile * Add validate JSON * Add find * Add image and json validation * Add Payment: Paid for stale * Add validation for info.json, list.json files and check file names * Add Payment: Unpaid * Optimised images with calibre/image-actions * Add validation for whitelist and blacklist * Update helpers.ts * Update Dangerfile * Optimised images with calibre/image-actions * Update danger.yml * Remove uppercase logo Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: Mykola <kolya182@gmail.com>
109 lines
3.1 KiB
Ruby
109 lines
3.1 KiB
Ruby
require 'find'
|
|
require 'image_size'
|
|
require 'json-schema'
|
|
|
|
assets_folder = './blockchains'
|
|
allowed_extensions = ['png', 'json']
|
|
allowed_file_names = ['info', 'list', 'logo', 'whitelist', 'blacklist']
|
|
|
|
# Failures
|
|
# Do not allow files in this directory
|
|
Dir.foreach(assets_folder) \
|
|
.map { |x| File.expand_path("#{assets_folder}/#{x}") } \
|
|
.select { |x| File.file?(x) }
|
|
.map { |x|
|
|
fail("Not allowed to have files inside blockchains folder itself. You have to add them inside specific blockchain folder as blockchain/ethereum or blockchain/binance for file: " + x)
|
|
}
|
|
|
|
Find.find(assets_folder) do |file|
|
|
file_extension = File.extname(file).delete('.')
|
|
file_name = File.basename(file, File.extname(file))
|
|
|
|
# Skip if directory
|
|
if File.directory?(file)
|
|
next
|
|
end
|
|
|
|
if !allowed_extensions.include? file_extension
|
|
fail("Extension not allowed for file: " + file)
|
|
end
|
|
|
|
if !allowed_file_names.include? file_name
|
|
fail("Filename not allowed for file: " + file)
|
|
end
|
|
|
|
# Validate JSON content
|
|
if file_extension == 'json'
|
|
value = nil
|
|
begin
|
|
value = JSON.parse(File.open(file).read)
|
|
rescue JSON::ParserError, TypeError => e
|
|
fail("Wrong JSON content in file: " + file)
|
|
end
|
|
|
|
# Validate info.json
|
|
if file_name == 'info'
|
|
schema = {
|
|
"type": "object",
|
|
"required": ["name", "website", "short_description", "explorer"],
|
|
"properties": {
|
|
"name": {"type": "string"},
|
|
"website": {"type": "string"},
|
|
"short_description": {"type": "string"},
|
|
"explorer": {"type": "string"}
|
|
}
|
|
}
|
|
errors = JSON::Validator.fully_validate(schema, value)
|
|
errors.each { |error| message("#{error} in file #{file}") }
|
|
end
|
|
|
|
# Validate list.json for validators
|
|
if file_name == 'list'
|
|
schema = {
|
|
"type": "array",
|
|
"items": {
|
|
"properties": {
|
|
"id": { "type": "string" },
|
|
"name": { "type": "string" },
|
|
"description": { "type": "string" },
|
|
"website": { "type": "string" }
|
|
},
|
|
"required": ["id", "name", "description", "website"]
|
|
}
|
|
}
|
|
errors = JSON::Validator.fully_validate(schema, value)
|
|
errors.each { |error| message("#{error} in file #{file}") }
|
|
end
|
|
|
|
# Validate whitelist, blacklist files
|
|
if file_name == 'whitelist' || file_name == 'blacklist'
|
|
schema = {
|
|
"type": "array",
|
|
"items": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
errors = JSON::Validator.fully_validate(schema, value)
|
|
errors.each { |error| message("#{error} in file #{file}") }
|
|
end
|
|
|
|
end
|
|
|
|
# Validate images
|
|
if file_extension == 'png'
|
|
image_size = ImageSize.path(file)
|
|
|
|
if image_size.width > 512 || image_size.height > 512
|
|
fail("Image width or height is higher than 512px for file: " + file)
|
|
end
|
|
|
|
if image_size.format == 'png'
|
|
fail("Image should be PNG for file: " + file)
|
|
end
|
|
|
|
# Make sure file size only 100kb
|
|
if File.size(file).to_f / 1024 > 100
|
|
fail("Image should less than 100kb for file: " + file)
|
|
end
|
|
end
|
|
end |