diff --git a/doc/api/crypto.md b/doc/api/crypto.md index 6d1fc3a5672ff8..2cd56b8f579739 100644 --- a/doc/api/crypto.md +++ b/doc/api/crypto.md @@ -2869,6 +2869,12 @@ This property is deprecated. Please use `crypto.setFips()` and * `candidate` {ArrayBuffer|SharedArrayBuffer|TypedArray|Buffer|DataView|bigint} @@ -3547,6 +3553,12 @@ Both keys must have the same `asymmetricKeyType`, which must be one of `'dh'` * `type`: {string} The intended use of the generated secret key. Currently @@ -3592,6 +3604,11 @@ generateKey('hmac', { length: 64 }, (err, key) => { * `size` {number} The size (in bits) of the prime to generate. @@ -4118,6 +4141,12 @@ A convenient alias for [`crypto.webcrypto.getRandomValues()`][]. * `digest` {string} The digest algorithm to use. @@ -4221,6 +4250,11 @@ console.log(Buffer.from(derivedKey).toString('hex')); // '24156e2...5391653' * `min` {integer} Start of random range (inclusive). **Default:** `0`. @@ -5021,6 +5071,11 @@ cryptographic pseudorandom number generator. + +Type: End-of-Life + +This error code was removed due to adding more confusion to +the errors used for value type validation. + [Legacy URL API]: url.md#legacy-url-api [NIST SP 800-38D]: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf [RFC 6066]: https://tools.ietf.org/html/rfc6066#section-3 diff --git a/doc/api/dns.md b/doc/api/dns.md index c1089f2b244e28..e5a1b5e3ff82c6 100644 --- a/doc/api/dns.md +++ b/doc/api/dns.md @@ -179,6 +179,11 @@ section if a custom port is used. * `address` {string} @@ -315,6 +326,12 @@ If this method is invoked as its [`util.promisify()`][]ed version, it returns a * `hostname` {string} Host name to resolve. @@ -351,6 +368,11 @@ On error, `err` is an [`Error`][] object, where `err.code` is one of the + * `hostname` {string} * `callback` {Function} * `err` {Error} @@ -451,6 +487,12 @@ queries. It may be better to call individual methods like [`dns.resolve4()`][], * `hostname` {string} @@ -469,6 +511,12 @@ will contain an array of canonical name records available for the `hostname` added: - v15.0.0 - v14.17.0 +changes: + - version: REPLACEME + pr-url: https://github.com/nodejs/node/pull/41678 + description: Passing an invalid callback to the `callback` argument + now throws `ERR_INVALID_ARG_TYPE` instead of + `ERR_INVALID_CALLBACK`. --> * `hostname` {string} @@ -486,6 +534,12 @@ available for the `hostname` (e.g. `[{critical: 0, iodef: * `hostname` {string} @@ -502,6 +556,12 @@ property (e.g. `[{priority: 10, exchange: 'mx.example.com'}, ...]`). * `hostname` {string} @@ -537,6 +597,12 @@ function will contain an array of objects with the following properties: * `hostname` {string} @@ -553,6 +619,12 @@ contain an array of name server records available for `hostname` * `hostname` {string} @@ -568,6 +640,12 @@ be an array of strings containing the reply records. * `hostname` {string} @@ -605,6 +683,12 @@ be an object with the following properties: * `hostname` {string} @@ -636,6 +720,12 @@ be an array of objects with the following properties: diff --git a/doc/api/errors.md b/doc/api/errors.md index 37e0e9f922bbda..da08930f4a401b 100644 --- a/doc/api/errors.md +++ b/doc/api/errors.md @@ -1833,12 +1833,6 @@ less than -1 should never happen. A swap was performed on a `Buffer` but its size was not compatible with the operation. - - -### `ERR_INVALID_CALLBACK` - -A callback function was required but was not been provided to a Node.js API. - ### `ERR_INVALID_CHAR` diff --git a/doc/api/fs.md b/doc/api/fs.md index 0bf5e115687fee..f0a9c9291e0603 100644 --- a/doc/api/fs.md +++ b/doc/api/fs.md @@ -1597,6 +1597,11 @@ concurrent modifications on the same file or data corruption may occur. > Stability: 1 - Experimental @@ -2307,6 +2343,11 @@ If `options` is a string, then it specifies the encoding. added: v0.0.2 deprecated: v1.0.0 changes: + - version: REPLACEME + pr-url: https://github.com/nodejs/node/pull/41678 + description: Passing an invalid callback to the `callback` argument + now throws `ERR_INVALID_ARG_TYPE` instead of + `ERR_INVALID_CALLBACK`. - version: v7.6.0 pr-url: https://github.com/nodejs/node/pull/10739 description: The `path` parameter can be a WHATWG `URL` object using @@ -2452,6 +2493,11 @@ process. * `path` {string|Buffer|URL} @@ -2753,6 +2845,11 @@ callback. * `fd` {integer} @@ -3374,6 +3522,11 @@ a promise for an `Object` with `bytesRead` and `buffers` properties. * `path` {string|Buffer|URL} @@ -3464,6 +3623,11 @@ this restriction. * `fd` {integer} @@ -5647,6 +5857,12 @@ closed. * `callback` {Function} diff --git a/doc/api/http2.md b/doc/api/http2.md index 6932742ca7d944..5b50edda674a58 100644 --- a/doc/api/http2.md +++ b/doc/api/http2.md @@ -496,6 +496,12 @@ frames have been acknowledged. * `payload` {Buffer|TypedArray|DataView} Optional ping payload. @@ -581,6 +587,12 @@ server.on('connect', (session) => { * `msecs` {number} @@ -644,6 +656,12 @@ An object describing the current status of this `Http2Session`. * `settings` {HTTP/2 Settings Object} @@ -1166,6 +1184,12 @@ See [`net.Socket.bufferSize`][] for details. * `code` {number} Unsigned 32-bit integer identifying the error code. @@ -1311,6 +1335,12 @@ value will be `undefined` after the `Http2Stream` instance is destroyed. * `msecs` {number} @@ -1506,6 +1536,12 @@ accepts push streams, `false` otherwise. Settings are the same for every * `headers` {HTTP/2 Headers Object} @@ -1985,6 +2021,11 @@ closed, although the server has already stopped allowing new sessions. See * `msecs` {number} **Default:** `120000` (2 minutes) @@ -2217,7 +2264,7 @@ on the `Http2SecureServer` after `msecs` milliseconds. The given callback is registered as a listener on the `'timeout'` event. -In case if `callback` is not a function, a new `ERR_INVALID_CALLBACK` +In case if `callback` is not a function, a new `ERR_INVALID_ARG_TYPE` error will be thrown. #### `server.timeout` @@ -3497,6 +3544,12 @@ See [`response.socket`][]. * `headers` {HTTP/2 Headers Object} An object describing the headers diff --git a/doc/api/inspector.md b/doc/api/inspector.md index 9dcd7431b29e9b..ea31db782d0b0f 100644 --- a/doc/api/inspector.md +++ b/doc/api/inspector.md @@ -169,6 +169,12 @@ enabled agents or configured breakpoints. * `method` {string} diff --git a/doc/api/net.md b/doc/api/net.md index f8bcb8dfc9db2e..99864eeb9fa2a2 100644 --- a/doc/api/net.md +++ b/doc/api/net.md @@ -1136,6 +1136,12 @@ algorithm. * `timeout` {number} diff --git a/doc/api/perf_hooks.md b/doc/api/perf_hooks.md index fd7c2bbcd68729..37d0d628cfddbe 100644 --- a/doc/api/perf_hooks.md +++ b/doc/api/perf_hooks.md @@ -568,6 +568,12 @@ initialized. * `callback` {Function} diff --git a/doc/api/process.md b/doc/api/process.md index 61d48dfb1d61f8..a3bd6563ded757 100644 --- a/doc/api/process.md +++ b/doc/api/process.md @@ -2353,6 +2353,11 @@ console.log(memoryUsage.rss()); * `callback` {Function} The function to call at the end of this turn of @@ -197,6 +203,12 @@ This method has a custom variant for promises that is available using * `callback` {Function} The function to call when the timer elapses. @@ -219,6 +231,12 @@ This method has a custom variant for promises that is available using * `callback` {Function} The function to call when the timer elapses. diff --git a/doc/api/tls.md b/doc/api/tls.md index c0412cf1eafbb5..f7aeee4c0e2b41 100644 --- a/doc/api/tls.md +++ b/doc/api/tls.md @@ -1404,6 +1404,12 @@ Returns the numeric representation of the remote port. For example, `443`. * `options` {Object} diff --git a/doc/api/url.md b/doc/api/url.md index 1dbf336d66f319..3fa589397f77d6 100644 --- a/doc/api/url.md +++ b/doc/api/url.md @@ -851,6 +851,15 @@ Alias for [`urlSearchParams[@@iterator]()`][`urlSearchParams@@iterator()`]. #### `urlSearchParams.forEach(fn[, thisArg])` + + * `fn` {Function} Invoked for each name-value pair in the query * `thisArg` {Object} To be used as `this` value for when `fn` is called diff --git a/lib/_tls_wrap.js b/lib/_tls_wrap.js index 57399c602a10bb..cb91d57c16ddd0 100644 --- a/lib/_tls_wrap.js +++ b/lib/_tls_wrap.js @@ -86,7 +86,6 @@ const { const { validateBoolean, validateBuffer, - validateCallback, validateFunction, validateInt32, validateNumber, @@ -826,7 +825,7 @@ TLSSocket.prototype._init = function(socket, wrap) { TLSSocket.prototype.renegotiate = function(options, callback) { validateObject(options, 'options'); if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } debug('%s renegotiate()', diff --git a/lib/dns.js b/lib/dns.js index 58492be9ba288a..d795e8e09045c4 100644 --- a/lib/dns.js +++ b/lib/dns.js @@ -51,7 +51,7 @@ const { ERR_MISSING_ARGS, } = errors.codes; const { - validateCallback, + validateFunction, validatePort, validateString, validateOneOf, @@ -110,7 +110,7 @@ function lookup(hostname, options, callback) { callback = options; family = 0; } else { - validateCallback(callback); + validateFunction(callback, 'callback'); if (options !== null && typeof options === 'object') { if (options.hints != null && typeof options.hints !== 'number') { @@ -200,7 +200,7 @@ function lookupService(address, port, callback) { validatePort(port); - validateCallback(callback); + validateFunction(callback, 'callback'); port = +port; @@ -239,7 +239,7 @@ function resolver(bindingName) { } validateString(name, 'name'); - validateCallback(callback); + validateFunction(callback, 'callback'); const req = new QueryReqWrap(); req.bindingName = bindingName; diff --git a/lib/fs.js b/lib/fs.js index 3f99d6b7b74739..b1300d0a7095e6 100644 --- a/lib/fs.js +++ b/lib/fs.js @@ -132,7 +132,6 @@ const { parseFileMode, validateBoolean, validateBuffer, - validateCallback, validateEncoding, validateFunction, validateInteger, @@ -174,7 +173,7 @@ function showTruncateDeprecation() { } function maybeCallback(cb) { - validateCallback(cb); + validateFunction(cb, 'cb'); return cb; } @@ -183,7 +182,7 @@ function maybeCallback(cb) { // for callbacks that are passed to the binding layer, callbacks that are // invoked from JS already run in the proper scope. function makeCallback(cb) { - validateCallback(cb); + validateFunction(cb, 'cb'); return (...args) => ReflectApply(cb, this, args); } @@ -192,7 +191,7 @@ function makeCallback(cb) { // an optimization, since the data passed back to the callback needs to be // transformed anyway. function makeStatsCallback(cb) { - validateCallback(cb); + validateFunction(cb, 'cb'); return (err, stats) => { if (err) return cb(err); diff --git a/lib/inspector.js b/lib/inspector.js index 46779a0ec21dac..58d8dbe45c7213 100644 --- a/lib/inspector.js +++ b/lib/inspector.js @@ -25,7 +25,7 @@ if (!hasInspector) const EventEmitter = require('events'); const { queueMicrotask } = require('internal/process/task_queues'); const { - validateCallback, + validateFunction, validateObject, validateString, } = require('internal/validators'); @@ -119,7 +119,7 @@ class Session extends EventEmitter { validateObject(params, 'params'); } if (callback) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (!this[connectionSymbol]) { diff --git a/lib/internal/crypto/diffiehellman.js b/lib/internal/crypto/diffiehellman.js index 2efdbdd5bac9d3..598db4052b976c 100644 --- a/lib/internal/crypto/diffiehellman.js +++ b/lib/internal/crypto/diffiehellman.js @@ -35,7 +35,7 @@ const { } = require('internal/errors'); const { - validateCallback, + validateFunction, validateInt32, validateObject, validateString, @@ -334,7 +334,7 @@ function deriveBitsECDH(name, publicKey, privateKey, callback) { validateString(name, 'name'); validateObject(publicKey, 'publicKey'); validateObject(privateKey, 'privateKey'); - validateCallback(callback); + validateFunction(callback, 'callback'); const job = new ECDHBitsJob(kCryptoJobAsync, name, publicKey, privateKey); job.ondone = (error, bits) => { if (error) return FunctionPrototypeCall(callback, job, error); @@ -348,7 +348,7 @@ function deriveBitsECDH(name, publicKey, privateKey, callback) { function deriveBitsDH(publicKey, privateKey, callback) { validateObject(publicKey, 'publicKey'); validateObject(privateKey, 'privateKey'); - validateCallback(callback); + validateFunction(callback, 'callback'); const job = new DHBitsJob(kCryptoJobAsync, publicKey, privateKey); job.ondone = (error, bits) => { if (error) return FunctionPrototypeCall(callback, job, error); diff --git a/lib/internal/crypto/hkdf.js b/lib/internal/crypto/hkdf.js index 1d8251a9245b66..fd274caf0b80ce 100644 --- a/lib/internal/crypto/hkdf.js +++ b/lib/internal/crypto/hkdf.js @@ -13,7 +13,7 @@ const { } = internalBinding('crypto'); const { - validateCallback, + validateFunction, validateInteger, validateString, validateUint32, @@ -115,7 +115,7 @@ function hkdf(hash, key, salt, info, length, callback) { length, } = validateParameters(hash, key, salt, info, length)); - validateCallback(callback); + validateFunction(callback, 'callback'); const job = new HKDFJob(kCryptoJobAsync, hash, key, salt, info, length); diff --git a/lib/internal/crypto/keygen.js b/lib/internal/crypto/keygen.js index 1469a01682edda..bbbe72475bd870 100644 --- a/lib/internal/crypto/keygen.js +++ b/lib/internal/crypto/keygen.js @@ -43,7 +43,7 @@ const { customPromisifyArgs } = require('internal/util'); const { isInt32, isUint32, - validateCallback, + validateFunction, validateString, validateInteger, validateObject, @@ -76,7 +76,7 @@ function generateKeyPair(type, options, callback) { callback = options; options = undefined; } - validateCallback(callback); + validateFunction(callback, 'callback'); const job = createJob(kCryptoJobAsync, type, options); @@ -388,7 +388,7 @@ function generateKey(type, options, callback) { options = undefined; } - validateCallback(callback); + validateFunction(callback, 'callback'); const job = generateKeyJob(kCryptoJobAsync, type, options); diff --git a/lib/internal/crypto/pbkdf2.js b/lib/internal/crypto/pbkdf2.js index 753c4f2d9da597..b3a6303136f506 100644 --- a/lib/internal/crypto/pbkdf2.js +++ b/lib/internal/crypto/pbkdf2.js @@ -14,7 +14,7 @@ const { } = internalBinding('crypto'); const { - validateCallback, + validateFunction, validateInteger, validateString, validateUint32, @@ -42,7 +42,7 @@ function pbkdf2(password, salt, iterations, keylen, digest, callback) { ({ password, salt, iterations, keylen, digest } = check(password, salt, iterations, keylen, digest)); - validateCallback(callback); + validateFunction(callback, 'callback'); const job = new PBKDF2Job( kCryptoJobAsync, diff --git a/lib/internal/crypto/random.js b/lib/internal/crypto/random.js index 1423ea4295443e..fc2e19e501c405 100644 --- a/lib/internal/crypto/random.js +++ b/lib/internal/crypto/random.js @@ -42,7 +42,7 @@ const { const { validateNumber, validateBoolean, - validateCallback, + validateFunction, validateObject, validateUint32, } = require('internal/validators'); @@ -91,7 +91,7 @@ function assertSize(size, elementSize, offset, length) { function randomBytes(size, callback) { size = assertSize(size, 1, 0, Infinity); if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } const buf = new FastBuffer(size); @@ -161,7 +161,7 @@ function randomFill(buf, offset, size, callback) { callback = size; size = buf.length - offset; } else { - validateCallback(callback); + validateFunction(callback, 'callback'); } offset = assertOffset(offset, elementSize, buf.byteLength); @@ -214,7 +214,7 @@ function randomInt(min, max, callback) { const isSync = typeof callback === 'undefined'; if (!isSync) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (!NumberIsSafeInteger(min)) { throw new ERR_INVALID_ARG_TYPE('min', 'a safe integer', min); @@ -465,7 +465,7 @@ function generatePrime(size, options, callback) { callback = options; options = {}; } - validateCallback(callback); + validateFunction(callback, 'callback'); const job = createRandomPrimeJob(kCryptoJobAsync, size, options); job.ondone = (err, prime) => { @@ -525,7 +525,7 @@ function checkPrime(candidate, options = {}, callback) { callback = options; options = {}; } - validateCallback(callback); + validateFunction(callback, 'callback'); validateObject(options, 'options'); const { checks = 0, diff --git a/lib/internal/crypto/scrypt.js b/lib/internal/crypto/scrypt.js index 49e5b0624e1ae7..0d0ac1f7261e63 100644 --- a/lib/internal/crypto/scrypt.js +++ b/lib/internal/crypto/scrypt.js @@ -14,7 +14,7 @@ const { } = internalBinding('crypto'); const { - validateCallback, + validateFunction, validateInteger, validateInt32, validateUint32, @@ -54,7 +54,7 @@ function scrypt(password, salt, keylen, options, callback = defaults) { const { N, r, p, maxmem } = options; ({ password, salt, keylen } = options); - validateCallback(callback); + validateFunction(callback, 'callback'); const job = new ScryptJob( kCryptoJobAsync, password, salt, N, r, p, maxmem, keylen); diff --git a/lib/internal/crypto/sig.js b/lib/internal/crypto/sig.js index a204f35e60a15b..f68606c8655163 100644 --- a/lib/internal/crypto/sig.js +++ b/lib/internal/crypto/sig.js @@ -15,7 +15,7 @@ const { } = require('internal/errors'); const { - validateCallback, + validateFunction, validateEncoding, validateString, } = require('internal/validators'); @@ -143,7 +143,7 @@ function signOneShot(algorithm, data, key, callback) { validateString(algorithm, 'algorithm'); if (callback !== undefined) - validateCallback(callback); + validateFunction(callback, 'callback'); data = getArrayBufferOrView(data, 'data'); @@ -236,7 +236,7 @@ function verifyOneShot(algorithm, data, key, signature, callback) { validateString(algorithm, 'algorithm'); if (callback !== undefined) - validateCallback(callback); + validateFunction(callback, 'callback'); data = getArrayBufferOrView(data, 'data'); diff --git a/lib/internal/errors.js b/lib/internal/errors.js index c5b8146b851bf0..a4e32c12cecae1 100644 --- a/lib/internal/errors.js +++ b/lib/internal/errors.js @@ -1237,8 +1237,6 @@ E('ERR_INVALID_ARG_VALUE', (name, value, reason = 'is invalid') => { E('ERR_INVALID_ASYNC_ID', 'Invalid %s value: %s', RangeError); E('ERR_INVALID_BUFFER_SIZE', 'Buffer size must be a multiple of %s', RangeError); -E('ERR_INVALID_CALLBACK', - 'Callback must be a function. Received %O', TypeError); E('ERR_INVALID_CHAR', // Using a default argument here is important so the argument is not counted // towards `Function#length`. diff --git a/lib/internal/fs/dir.js b/lib/internal/fs/dir.js index 917319661a647d..5fda9d8a7f3ef4 100644 --- a/lib/internal/fs/dir.js +++ b/lib/internal/fs/dir.js @@ -31,7 +31,7 @@ const { handleErrorFromBinding } = require('internal/fs/utils'); const { - validateCallback, + validateFunction, validateUint32 } = require('internal/validators'); @@ -89,7 +89,7 @@ class Dir { return this[kDirReadPromisified](); } - validateCallback(callback); + validateFunction(callback, 'callback'); if (this[kDirOperationQueue] !== null) { ArrayPrototypePush(this[kDirOperationQueue], () => { @@ -174,7 +174,7 @@ class Dir { } // callback - validateCallback(callback); + validateFunction(callback, 'callback'); if (this[kDirClosed] === true) { process.nextTick(callback, new ERR_DIR_CLOSED()); @@ -234,7 +234,7 @@ ObjectDefineProperty(Dir.prototype, SymbolAsyncIterator, { function opendir(path, options, callback) { callback = typeof options === 'function' ? options : callback; - validateCallback(callback); + validateFunction(callback, 'callback'); path = getValidatedPath(path); options = getOptions(options, { diff --git a/lib/internal/http2/compat.js b/lib/internal/http2/compat.js index 0c4519dfff5986..596167990cd022 100644 --- a/lib/internal/http2/compat.js +++ b/lib/internal/http2/compat.js @@ -53,7 +53,7 @@ const { hideStackFrames } = require('internal/errors'); const { - validateCallback, + validateFunction, validateString, } = require('internal/validators'); const { @@ -798,7 +798,7 @@ class Http2ServerResponse extends Stream { } createPushResponse(headers, callback) { - validateCallback(callback); + validateFunction(callback, 'callback'); if (this[kState].closed) { process.nextTick(callback, new ERR_HTTP2_INVALID_STREAM()); return; diff --git a/lib/internal/http2/core.js b/lib/internal/http2/core.js index 0960bcc5e63e40..b7663cbb618f7d 100644 --- a/lib/internal/http2/core.js +++ b/lib/internal/http2/core.js @@ -120,7 +120,7 @@ const { } = require('internal/errors'); const { isUint32, - validateCallback, + validateFunction, validateInt32, validateInteger, validateNumber, @@ -1374,7 +1374,7 @@ class Http2Session extends EventEmitter { if (payload && payload.length !== 8) { throw new ERR_HTTP2_PING_LENGTH(); } - validateCallback(callback); + validateFunction(callback, 'callback'); const cb = pingCallback(callback); if (this.connecting || this.closed) { @@ -1472,7 +1472,7 @@ class Http2Session extends EventEmitter { validateSettings(settings); if (callback) { - validateCallback(callback); + validateFunction(callback, 'callback'); } debugSessionObj(this, 'sending settings'); @@ -2275,7 +2275,7 @@ class Http2Stream extends Duplex { validateInteger(code, 'code', 0, kMaxInt); if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (this.closed) @@ -2678,7 +2678,7 @@ class ServerHttp2Stream extends Http2Stream { options = undefined; } - validateCallback(callback); + validateFunction(callback, 'callback'); assertIsObject(options, 'options'); options = { ...options }; @@ -3142,7 +3142,7 @@ class Http2SecureServer extends TLSServer { setTimeout(msecs, callback) { this.timeout = msecs; if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); this.on('timeout', callback); } return this; @@ -3169,7 +3169,7 @@ class Http2Server extends NETServer { setTimeout(msecs, callback) { this.timeout = msecs; if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); this.on('timeout', callback); } return this; diff --git a/lib/internal/perf/observe.js b/lib/internal/perf/observe.js index eadc617452e952..a685bac0c0e8b4 100644 --- a/lib/internal/perf/observe.js +++ b/lib/internal/perf/observe.js @@ -46,7 +46,7 @@ const { } = require('internal/errors'); const { - validateCallback, + validateFunction, validateObject, } = require('internal/validators'); @@ -203,7 +203,7 @@ class PerformanceObserver { this[kBuffer] = []; this[kEntryTypes] = new SafeSet(); this[kType] = undefined; - validateCallback(callback); + validateFunction(callback, 'callback'); this[kCallback] = callback; } diff --git a/lib/internal/process/task_queues.js b/lib/internal/process/task_queues.js index 2c53b21040e5d8..77372d1fd7ef32 100644 --- a/lib/internal/process/task_queues.js +++ b/lib/internal/process/task_queues.js @@ -36,7 +36,6 @@ const { const FixedQueue = require('internal/fixed_queue'); const { - validateCallback, validateFunction, } = require('internal/validators'); @@ -102,7 +101,7 @@ function processTicksAndRejections() { // `nextTick()` will not enqueue any callback when the process is about to // exit since the callback would not have a chance to be executed. function nextTick(callback) { - validateCallback(callback); + validateFunction(callback, 'callback'); if (process._exiting) return; diff --git a/lib/internal/readline/callbacks.js b/lib/internal/readline/callbacks.js index ae7cf0c07dda0b..692048c9157199 100644 --- a/lib/internal/readline/callbacks.js +++ b/lib/internal/readline/callbacks.js @@ -12,7 +12,7 @@ const { } = require('internal/errors'); const { - validateCallback, + validateFunction, } = require('internal/validators'); const { CSI, @@ -32,7 +32,7 @@ const { function cursorTo(stream, x, y, callback) { if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (typeof y === 'function') { @@ -60,7 +60,7 @@ function cursorTo(stream, x, y, callback) { function moveCursor(stream, dx, dy, callback) { if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (stream == null || !(dx || dy)) { @@ -94,7 +94,7 @@ function moveCursor(stream, dx, dy, callback) { function clearLine(stream, dir, callback) { if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (stream === null || stream === undefined) { @@ -113,7 +113,7 @@ function clearLine(stream, dir, callback) { function clearScreenDown(stream, callback) { if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); } if (stream === null || stream === undefined) { diff --git a/lib/internal/stream_base_commons.js b/lib/internal/stream_base_commons.js index f126d66d04b297..231ca139d171e2 100644 --- a/lib/internal/stream_base_commons.js +++ b/lib/internal/stream_base_commons.js @@ -27,7 +27,7 @@ const { } = require('internal/timers'); const { isUint8Array } = require('internal/util/types'); const { clearTimeout } = require('timers'); -const { validateCallback } = require('internal/validators'); +const { validateFunction } = require('internal/validators'); const kMaybeDestroy = Symbol('kMaybeDestroy'); const kUpdateTimer = Symbol('kUpdateTimer'); @@ -249,7 +249,7 @@ function setStreamTimeout(msecs, callback) { if (msecs === 0) { if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); this.removeListener('timeout', callback); } } else { @@ -257,7 +257,7 @@ function setStreamTimeout(msecs, callback) { if (this[kSession]) this[kSession][kUpdateTimer](); if (callback !== undefined) { - validateCallback(callback); + validateFunction(callback, 'callback'); this.once('timeout', callback); } } diff --git a/lib/internal/streams/pipeline.js b/lib/internal/streams/pipeline.js index 623973ff316453..7df14057b56d4d 100644 --- a/lib/internal/streams/pipeline.js +++ b/lib/internal/streams/pipeline.js @@ -25,7 +25,7 @@ const { } = require('internal/errors'); const { - validateCallback, + validateFunction, validateAbortSignal } = require('internal/validators'); @@ -60,7 +60,7 @@ function popCallback(streams) { // Streams should never be an empty array. It should always contain at least // a single stream. Therefore optimize for the average case instead of // checking for length === 0 as well. - validateCallback(streams[streams.length - 1]); + validateFunction(streams[streams.length - 1], 'streams[stream.length - 1]'); return streams.pop(); } diff --git a/lib/internal/timers.js b/lib/internal/timers.js index f48b4057a37ef1..7276f8eb32baed 100644 --- a/lib/internal/timers.js +++ b/lib/internal/timers.js @@ -112,7 +112,7 @@ const { ERR_OUT_OF_RANGE } = require('internal/errors').codes; const { - validateCallback, + validateFunction, validateNumber, } = require('internal/validators'); @@ -371,7 +371,7 @@ function insert(item, msecs, start = getLibuvNow()) { function setUnrefTimeout(callback, after) { // Type checking identical to setTimeout() - validateCallback(callback); + validateFunction(callback, 'callback'); const timer = new Timeout(callback, after, undefined, false, false); insert(timer, timer._idleTimeout); diff --git a/lib/internal/url.js b/lib/internal/url.js index 0cca3ecd48cb63..284ffe15fb3eb0 100644 --- a/lib/internal/url.js +++ b/lib/internal/url.js @@ -73,7 +73,7 @@ const { const path = require('path'); const { - validateCallback, + validateFunction, validateObject, } = require('internal/validators'); @@ -476,7 +476,7 @@ class URLSearchParams { if (!isURLSearchParams(this)) throw new ERR_INVALID_THIS('URLSearchParams'); - validateCallback(callback); + validateFunction(callback, 'callback'); let list = this[searchParams]; diff --git a/lib/internal/validators.js b/lib/internal/validators.js index 9fed5b363db9cb..b07eebfbd8b1a0 100644 --- a/lib/internal/validators.js +++ b/lib/internal/validators.js @@ -23,7 +23,6 @@ const { ERR_INVALID_ARG_VALUE, ERR_OUT_OF_RANGE, ERR_UNKNOWN_SIGNAL, - ERR_INVALID_CALLBACK, } } = require('internal/errors'); const { normalizeEncoding } = require('internal/util'); @@ -219,11 +218,6 @@ function validatePort(port, name = 'Port', allowZero = true) { return port | 0; } -const validateCallback = hideStackFrames((callback) => { - if (typeof callback !== 'function') - throw new ERR_INVALID_CALLBACK(callback); -}); - const validateAbortSignal = hideStackFrames((signal, name) => { if (signal !== undefined && (signal === null || @@ -268,6 +262,5 @@ module.exports = { validateString, validateUint32, validateUndefined, - validateCallback, validateAbortSignal, }; diff --git a/lib/timers.js b/lib/timers.js index a4543fea1df6bc..cd721ad4550164 100644 --- a/lib/timers.js +++ b/lib/timers.js @@ -59,7 +59,7 @@ const { let debug = require('internal/util/debuglog').debuglog('timer', (fn) => { debug = fn; }); -const { validateCallback } = require('internal/validators'); +const { validateFunction } = require('internal/validators'); let timersPromises; @@ -138,7 +138,7 @@ function enroll(item, msecs) { * @returns {Timeout} */ function setTimeout(callback, after, arg1, arg2, arg3) { - validateCallback(callback); + validateFunction(callback, 'callback'); let i, args; switch (arguments.length) { @@ -207,7 +207,7 @@ function clearTimeout(timer) { * @returns {Timeout} */ function setInterval(callback, repeat, arg1, arg2, arg3) { - validateCallback(callback); + validateFunction(callback, 'callback'); let i, args; switch (arguments.length) { @@ -276,7 +276,7 @@ Timeout.prototype[SymbolToPrimitive] = function() { * @returns {Immediate} */ function setImmediate(callback, arg1, arg2, arg3) { - validateCallback(callback); + validateFunction(callback, 'callback'); let i, args; switch (arguments.length) { diff --git a/test/parallel/test-crypto-keygen.js b/test/parallel/test-crypto-keygen.js index f92a1091fc9411..e930db92158005 100644 --- a/test/parallel/test-crypto-keygen.js +++ b/test/parallel/test-crypto-keygen.js @@ -1117,7 +1117,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); privateKeyEncoding: { type: 'pkcs1', format: 'pem' } }, cb), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK' + code: 'ERR_INVALID_ARG_TYPE' }); } } @@ -1518,8 +1518,7 @@ const sec1EncExp = (cipher) => getRegExpForPEM('EC PRIVATE KEY', cipher); }, { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK', - message: 'Callback must be a function. Received undefined' + code: 'ERR_INVALID_ARG_TYPE', } ); diff --git a/test/parallel/test-crypto-pbkdf2.js b/test/parallel/test-crypto-pbkdf2.js index c9ab6a9c48438e..a62cd97c19318a 100644 --- a/test/parallel/test-crypto-pbkdf2.js +++ b/test/parallel/test-crypto-pbkdf2.js @@ -58,7 +58,7 @@ testPBKDF2('password', 'salt', 32, 32, assert.throws( () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' } ); diff --git a/test/parallel/test-crypto-prime.js b/test/parallel/test-crypto-prime.js index 749221b4514ef3..6cd9290877d3c9 100644 --- a/test/parallel/test-crypto-prime.js +++ b/test/parallel/test-crypto-prime.js @@ -37,7 +37,7 @@ const pCheckPrime = promisify(checkPrime); ['hello', false, 123].forEach((i) => { assert.throws(() => generatePrime(80, {}), { - code: 'ERR_INVALID_CALLBACK' + code: 'ERR_INVALID_ARG_TYPE' }); }); diff --git a/test/parallel/test-crypto-random.js b/test/parallel/test-crypto-random.js index bc62d4b6847064..afe2edfc4fb4b3 100644 --- a/test/parallel/test-crypto-random.js +++ b/test/parallel/test-crypto-random.js @@ -30,7 +30,6 @@ const assert = require('assert'); const crypto = require('crypto'); const cryptop = require('crypto').webcrypto; const { kMaxLength } = require('buffer'); -const { inspect } = require('util'); const kMaxInt32 = 2 ** 31 - 1; const kMaxPossibleLength = Math.min(kMaxLength, kMaxInt32); @@ -320,9 +319,8 @@ assert.throws( assert.throws( () => crypto.randomFill(buf, 0, 10, i), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` }); }); @@ -330,9 +328,8 @@ assert.throws( assert.throws( () => crypto.randomBytes(1, i), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` } ); }); @@ -518,9 +515,8 @@ assert.throws( [true, NaN, null, {}, [], 10].forEach((i) => { const cbError = { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` }; assert.throws(() => crypto.randomInt(0, 1, i), cbError); }); diff --git a/test/parallel/test-crypto-scrypt.js b/test/parallel/test-crypto-scrypt.js index 7b695a36f2b5a4..5f860c75bbebf0 100644 --- a/test/parallel/test-crypto-scrypt.js +++ b/test/parallel/test-crypto-scrypt.js @@ -211,7 +211,7 @@ for (const { args, expected } of badargs) { } { - const expected = { code: 'ERR_INVALID_CALLBACK' }; + const expected = { code: 'ERR_INVALID_ARG_TYPE' }; assert.throws(() => crypto.scrypt('', '', 42, null), expected); assert.throws(() => crypto.scrypt('', '', 42, {}, null), expected); assert.throws(() => crypto.scrypt('', '', 42, {}), expected); diff --git a/test/parallel/test-crypto-secret-keygen.js b/test/parallel/test-crypto-secret-keygen.js index ab662aeb5d123b..0739393643d6bb 100644 --- a/test/parallel/test-crypto-secret-keygen.js +++ b/test/parallel/test-crypto-secret-keygen.js @@ -44,7 +44,7 @@ const { }); assert.throws(() => generateKey('aes', { length: 256 }), { - code: 'ERR_INVALID_CALLBACK' + code: 'ERR_INVALID_ARG_TYPE' }); assert.throws(() => generateKey('hmac', { length: -1 }, common.mustNotCall()), { diff --git a/test/parallel/test-dns-lookup.js b/test/parallel/test-dns-lookup.js index aa4a1b8abef6df..461e705a5e3cb6 100644 --- a/test/parallel/test-dns-lookup.js +++ b/test/parallel/test-dns-lookup.js @@ -39,14 +39,14 @@ common.expectWarning({ assert.throws(() => { dns.lookup(false, 'cb'); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); assert.throws(() => { dns.lookup(false, 'options', 'cb'); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); diff --git a/test/parallel/test-dns-resolvens-typeerror.js b/test/parallel/test-dns-resolvens-typeerror.js index 54e0da57604ed8..2beb33c869e6da 100644 --- a/test/parallel/test-dns-resolvens-typeerror.js +++ b/test/parallel/test-dns-resolvens-typeerror.js @@ -49,7 +49,7 @@ assert.throws( assert.throws( () => dns.resolveNs(''), // bad callback { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' } ); diff --git a/test/parallel/test-dns.js b/test/parallel/test-dns.js index 6f3790d427d353..18218308486f4e 100644 --- a/test/parallel/test-dns.js +++ b/test/parallel/test-dns.js @@ -230,12 +230,12 @@ assert.deepStrictEqual(dns.getServers(), []); } assert.throws(() => dns.lookup('nodejs.org'), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); assert.throws(() => dns.lookup('nodejs.org', 4), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); @@ -331,7 +331,7 @@ portErr('test'); assert.throws(() => { dns.lookupService('0.0.0.0', 80, null); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); diff --git a/test/parallel/test-fs-access.js b/test/parallel/test-fs-access.js index d8e1c94300d2ed..633a3d7ace4b7d 100644 --- a/test/parallel/test-fs-access.js +++ b/test/parallel/test-fs-access.js @@ -138,7 +138,7 @@ assert.throws( fs.access(__filename, fs.F_OK); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); @@ -147,7 +147,7 @@ assert.throws( fs.access(__filename, fs.F_OK, {}); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); diff --git a/test/parallel/test-fs-append-file.js b/test/parallel/test-fs-append-file.js index 70919830f6cb0b..20ad2c01758798 100644 --- a/test/parallel/test-fs-append-file.js +++ b/test/parallel/test-fs-append-file.js @@ -191,4 +191,4 @@ const throwNextTick = (e) => { process.nextTick(() => { throw e; }); }; assert.throws( () => fs.appendFile(join(tmpdir.path, 'append6.txt'), console.log), - { code: 'ERR_INVALID_CALLBACK' }); + { code: 'ERR_INVALID_ARG_TYPE' }); diff --git a/test/parallel/test-fs-close-errors.js b/test/parallel/test-fs-close-errors.js index 52930a203eddbb..112b93739e784c 100644 --- a/test/parallel/test-fs-close-errors.js +++ b/test/parallel/test-fs-close-errors.js @@ -23,7 +23,7 @@ const fs = require('fs'); const fd = fs.openSync(__filename, 'r'); const errObj = { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }; diff --git a/test/parallel/test-fs-copyfile.js b/test/parallel/test-fs-copyfile.js index 51250d7b83145c..1bfa410a124d2d 100644 --- a/test/parallel/test-fs-copyfile.js +++ b/test/parallel/test-fs-copyfile.js @@ -103,7 +103,7 @@ fs.copyFile(src, dest, common.mustSucceed(() => { assert.throws(() => { fs.copyFile(src, dest, 0, 0); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); diff --git a/test/parallel/test-fs-exists.js b/test/parallel/test-fs-exists.js index 75b7adfc3ee3d0..857f3f26174549 100644 --- a/test/parallel/test-fs-exists.js +++ b/test/parallel/test-fs-exists.js @@ -25,9 +25,9 @@ const assert = require('assert'); const fs = require('fs'); const f = __filename; -assert.throws(() => fs.exists(f), { code: 'ERR_INVALID_CALLBACK' }); -assert.throws(() => fs.exists(), { code: 'ERR_INVALID_CALLBACK' }); -assert.throws(() => fs.exists(f, {}), { code: 'ERR_INVALID_CALLBACK' }); +assert.throws(() => fs.exists(f), { code: 'ERR_INVALID_ARG_TYPE' }); +assert.throws(() => fs.exists(), { code: 'ERR_INVALID_ARG_TYPE' }); +assert.throws(() => fs.exists(f, {}), { code: 'ERR_INVALID_ARG_TYPE' }); fs.exists(f, common.mustCall(function(y) { assert.strictEqual(y, true); diff --git a/test/parallel/test-fs-lchmod.js b/test/parallel/test-fs-lchmod.js index d0cba919b64754..ae5cb3ba2a230a 100644 --- a/test/parallel/test-fs-lchmod.js +++ b/test/parallel/test-fs-lchmod.js @@ -14,9 +14,9 @@ if (!common.isOSX) { } // Check callback -assert.throws(() => fs.lchmod(f), { code: 'ERR_INVALID_CALLBACK' }); -assert.throws(() => fs.lchmod(), { code: 'ERR_INVALID_CALLBACK' }); -assert.throws(() => fs.lchmod(f, {}), { code: 'ERR_INVALID_CALLBACK' }); +assert.throws(() => fs.lchmod(f), { code: 'ERR_INVALID_ARG_TYPE' }); +assert.throws(() => fs.lchmod(), { code: 'ERR_INVALID_ARG_TYPE' }); +assert.throws(() => fs.lchmod(f, {}), { code: 'ERR_INVALID_ARG_TYPE' }); // Check path [false, 1, {}, [], null, undefined].forEach((i) => { diff --git a/test/parallel/test-fs-lchown.js b/test/parallel/test-fs-lchown.js index ba2b4b85fb9c90..899f9c630188d6 100644 --- a/test/parallel/test-fs-lchown.js +++ b/test/parallel/test-fs-lchown.js @@ -46,7 +46,7 @@ const { promises } = fs; [false, 1, 'test', {}, [], null, undefined].forEach((i) => { assert.throws(() => fs.lchown('not_a_file_that_exists', 1, 1, i), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK' + code: 'ERR_INVALID_ARG_TYPE' }); }); diff --git a/test/parallel/test-fs-make-callback.js b/test/parallel/test-fs-make-callback.js index 0cbc4a7fe3e186..d9341ab06f90cc 100644 --- a/test/parallel/test-fs-make-callback.js +++ b/test/parallel/test-fs-make-callback.js @@ -19,7 +19,7 @@ function testMakeCallback(cb) { function invalidCallbackThrowsTests() { callbackThrowValues.forEach((value) => { assert.throws(testMakeCallback(value), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); }); diff --git a/test/parallel/test-fs-makeStatsCallback.js b/test/parallel/test-fs-makeStatsCallback.js index 52d129db2b6bc8..953fc065e84853 100644 --- a/test/parallel/test-fs-makeStatsCallback.js +++ b/test/parallel/test-fs-makeStatsCallback.js @@ -17,7 +17,7 @@ testMakeStatsCallback(common.mustCall())(); function invalidCallbackThrowsTests() { callbackThrowValues.forEach((value) => { assert.throws(testMakeStatsCallback(value), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); }); diff --git a/test/parallel/test-fs-open.js b/test/parallel/test-fs-open.js index 92dd8f5f48718b..29580019db6f61 100644 --- a/test/parallel/test-fs-open.js +++ b/test/parallel/test-fs-open.js @@ -67,7 +67,7 @@ for (const extra of [[], ['r'], ['r', 0], ['r', 0, 'bad callback']]) { assert.throws( () => fs.open(__filename, ...extra), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' } ); diff --git a/test/parallel/test-fs-opendir.js b/test/parallel/test-fs-opendir.js index 4c4681ef48e2ff..1a4aded61dcd1a 100644 --- a/test/parallel/test-fs-opendir.js +++ b/test/parallel/test-fs-opendir.js @@ -38,7 +38,7 @@ const dirconcurrentError = { }; const invalidCallbackObj = { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }; @@ -94,7 +94,7 @@ assert.throws(function() { assert.throws(function() { fs.opendir(__filename); -}, /TypeError \[ERR_INVALID_CALLBACK\]: Callback must be a function/); +}, /TypeError \[ERR_INVALID_ARG_TYPE\]: The "callback" argument must be of type function/); fs.opendir(__filename, common.mustCall(function(e) { assert.strictEqual(e.code, 'ENOTDIR'); @@ -247,7 +247,7 @@ doConcurrentAsyncAndSyncOps().then(common.mustCall()); // Check read throw exceptions on invalid callback { const dir = fs.opendirSync(testDir); - assert.throws(() => dir.read('INVALID_CALLBACK'), /ERR_INVALID_CALLBACK/); + assert.throws(() => dir.read('INVALID_CALLBACK'), /ERR_INVALID_ARG_TYPE/); } // Check that concurrent read() operations don't do weird things. diff --git a/test/parallel/test-fs-read.js b/test/parallel/test-fs-read.js index 70296172ed9988..2b3dab4f243b90 100644 --- a/test/parallel/test-fs-read.js +++ b/test/parallel/test-fs-read.js @@ -73,8 +73,7 @@ assert.throws(() => new fs.Dir(), { assert.throws( () => fs.read(fd, Buffer.alloc(1), 0, 1, 0), { - message: 'Callback must be a function. Received undefined', - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', } ); diff --git a/test/parallel/test-http2-client-rststream-before-connect.js b/test/parallel/test-http2-client-rststream-before-connect.js index 2acdefdfbe28f8..bc0cb5ff619dc0 100644 --- a/test/parallel/test-http2-client-rststream-before-connect.js +++ b/test/parallel/test-http2-client-rststream-before-connect.js @@ -5,7 +5,6 @@ if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const h2 = require('http2'); -const { inspect } = require('util'); const server = h2.createServer(); server.on('stream', (stream) => { @@ -35,8 +34,7 @@ server.listen(0, common.mustCall(() => { () => req.close(closeCode, notFunction), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK', - message: `Callback must be a function. Received ${inspect(notFunction)}` + code: 'ERR_INVALID_ARG_TYPE', } ); assert.strictEqual(req.closed, false); diff --git a/test/parallel/test-http2-client-settings-before-connect.js b/test/parallel/test-http2-client-settings-before-connect.js index 406ddd86ab5e9b..d370b49ce050dd 100644 --- a/test/parallel/test-http2-client-settings-before-connect.js +++ b/test/parallel/test-http2-client-settings-before-connect.js @@ -5,7 +5,6 @@ if (!common.hasCrypto) common.skip('missing crypto'); const assert = require('assert'); const h2 = require('http2'); -const { inspect } = require('util'); const server = h2.createServer(); @@ -54,9 +53,7 @@ server.listen(0, common.mustCall(() => { () => client.settings({}, invalidCallback), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK', - message: - `Callback must be a function. Received ${inspect(invalidCallback)}` + code: 'ERR_INVALID_ARG_TYPE', } ) ); diff --git a/test/parallel/test-http2-compat-serverresponse-createpushresponse.js b/test/parallel/test-http2-compat-serverresponse-createpushresponse.js index f25eab444f2dfd..0546bde1e2ca18 100644 --- a/test/parallel/test-http2-compat-serverresponse-createpushresponse.js +++ b/test/parallel/test-http2-compat-serverresponse-createpushresponse.js @@ -22,9 +22,8 @@ const server = h2.createServer((request, response) => { ':method': 'GET' }, undefined), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: 'Callback must be a function. Received undefined' } ); diff --git a/test/parallel/test-http2-ping.js b/test/parallel/test-http2-ping.js index d775e93333797e..9a6b30194d0c30 100644 --- a/test/parallel/test-http2-ping.js +++ b/test/parallel/test-http2-ping.js @@ -7,7 +7,6 @@ if (!common.hasCrypto) const async_hooks = require('async_hooks'); const assert = require('assert'); const http2 = require('http2'); -const { inspect } = require('util'); const pings = new Set(); const events = [0, 0, 0, 0]; @@ -120,9 +119,7 @@ server.listen(0, common.mustCall(() => { () => client.ping(payload, invalidCallback), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK', - message: 'Callback must be a function. ' + - `Received ${inspect(invalidCallback)}` + code: 'ERR_INVALID_ARG_TYPE', } ) ); diff --git a/test/parallel/test-http2-server-push-stream-errors-args.js b/test/parallel/test-http2-server-push-stream-errors-args.js index ba0aabcf5cf658..944532ec513958 100644 --- a/test/parallel/test-http2-server-push-stream-errors-args.js +++ b/test/parallel/test-http2-server-push-stream-errors-args.js @@ -21,8 +21,7 @@ server.on('stream', common.mustCall((stream, headers) => { ':authority': `localhost:${port}`, }, {}, 'callback'), { - code: 'ERR_INVALID_CALLBACK', - message: "Callback must be a function. Received 'callback'" + code: 'ERR_INVALID_ARG_TYPE', } ); diff --git a/test/parallel/test-http2-server-settimeout-no-callback.js b/test/parallel/test-http2-server-settimeout-no-callback.js index 31a64731f6dabc..79094b57772aba 100644 --- a/test/parallel/test-http2-server-settimeout-no-callback.js +++ b/test/parallel/test-http2-server-settimeout-no-callback.js @@ -6,7 +6,6 @@ if (!common.hasCrypto) const assert = require('assert'); const http2 = require('http2'); -const { inspect } = require('util'); // Verify that setTimeout callback verifications work correctly const verifyCallbacks = (server) => { @@ -17,9 +16,7 @@ const verifyCallbacks = (server) => { () => server.setTimeout(testTimeout, notFunction), { name: 'TypeError', - code: 'ERR_INVALID_CALLBACK', - message: 'Callback must be a function. ' + - `Received ${inspect(notFunction)}` + code: 'ERR_INVALID_ARG_TYPE', } ); }); diff --git a/test/parallel/test-http2-timeouts.js b/test/parallel/test-http2-timeouts.js index a67b7227154080..bf84289eef27da 100644 --- a/test/parallel/test-http2-timeouts.js +++ b/test/parallel/test-http2-timeouts.js @@ -29,17 +29,15 @@ server.on('stream', common.mustCall((stream) => { assert.throws( () => stream.setTimeout(0, Symbol('test')), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: 'Callback must be a function. Received Symbol(test)' } ); assert.throws( () => stream.setTimeout(100, {}), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: 'Callback must be a function. Received {}' } ); })); diff --git a/test/parallel/test-inspector-module.js b/test/parallel/test-inspector-module.js index 5f5efe4cb80061..cdbbc69229dd55 100644 --- a/test/parallel/test-inspector-module.js +++ b/test/parallel/test-inspector-module.js @@ -6,7 +6,6 @@ common.skipIfInspectorDisabled(); const assert = require('assert'); const { Session } = require('inspector'); -const { inspect } = require('util'); const session = new Session(); @@ -52,9 +51,8 @@ session.post('Runtime.evaluate', { expression: '2 + 2' }); assert.throws( () => session.post('test', {}, i), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` } ); }); diff --git a/test/parallel/test-net-socket-timeout.js b/test/parallel/test-net-socket-timeout.js index 209359fda60810..58906a25df42b9 100644 --- a/test/parallel/test-net-socket-timeout.js +++ b/test/parallel/test-net-socket-timeout.js @@ -23,7 +23,6 @@ const common = require('../common'); const net = require('net'); const assert = require('assert'); -const { inspect } = require('util'); // Verify that invalid delays throw const s = new net.Socket(); @@ -58,10 +57,8 @@ for (let i = 0; i < invalidCallbacks.length; i++) { assert.throws( () => s.setTimeout(mesc, invalidCallbacks[i]), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: 'Callback must be a function. ' + - `Received ${inspect(invalidCallbacks[i])}` } ) ); diff --git a/test/parallel/test-next-tick-errors.js b/test/parallel/test-next-tick-errors.js index 56480adcf53c27..6fd079625afae2 100644 --- a/test/parallel/test-next-tick-errors.js +++ b/test/parallel/test-next-tick-errors.js @@ -45,7 +45,7 @@ function testNextTickWith(val) { assert.throws(() => { process.nextTick(val); }, { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }); } diff --git a/test/parallel/test-performanceobserver.js b/test/parallel/test-performanceobserver.js index 4862f5fbf02f25..6d83f5718d0498 100644 --- a/test/parallel/test-performanceobserver.js +++ b/test/parallel/test-performanceobserver.js @@ -3,7 +3,6 @@ const common = require('../common'); const assert = require('assert'); -const { inspect } = require('util'); const { internalBinding } = require('internal/test/binding'); const { observerCounts: counts @@ -27,9 +26,8 @@ assert.strictEqual(counts[NODE_PERFORMANCE_ENTRY_TYPE_HTTP2], 0); assert.throws( () => new PerformanceObserver(i), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` } ); }); diff --git a/test/parallel/test-process-next-tick.js b/test/parallel/test-process-next-tick.js index 691bf57b3751c5..66913beebf2f7b 100644 --- a/test/parallel/test-process-next-tick.js +++ b/test/parallel/test-process-next-tick.js @@ -22,7 +22,6 @@ 'use strict'; const common = require('../common'); const assert = require('assert'); -const { inspect } = require('util'); const N = 2; function cb() { @@ -43,9 +42,8 @@ process.on('exit', function() { assert.throws( () => process.nextTick(i), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', - message: `Callback must be a function. Received ${inspect(i)}` } ); }); diff --git a/test/parallel/test-readline-csi.js b/test/parallel/test-readline-csi.js index 13dbbfa30f6fa2..75cd942f3b69f7 100644 --- a/test/parallel/test-readline-csi.js +++ b/test/parallel/test-readline-csi.js @@ -36,7 +36,7 @@ assert.strictEqual(readline.clearScreenDown(writable, common.mustCall()), true); // Verify that clearScreenDown() throws on invalid callback. assert.throws(() => { readline.clearScreenDown(writable, null); -}, /ERR_INVALID_CALLBACK/); +}, /ERR_INVALID_ARG_TYPE/); // Verify that clearScreenDown() does not throw on null or undefined stream. assert.strictEqual(readline.clearScreenDown(null, common.mustCall((err) => { @@ -64,7 +64,7 @@ assert.deepStrictEqual(writable.data, CSI.kClearToLineBeginning); // Verify that clearLine() throws on invalid callback. assert.throws(() => { readline.clearLine(writable, 0, null); -}, /ERR_INVALID_CALLBACK/); +}, /ERR_INVALID_ARG_TYPE/); // Verify that clearLine() does not throw on null or undefined stream. assert.strictEqual(readline.clearLine(null, 0), true); @@ -100,7 +100,7 @@ assert.strictEqual(readline.clearLine(undefined, 0, common.mustCall()), true); // Verify that moveCursor() throws on invalid callback. assert.throws(() => { readline.moveCursor(writable, 1, 1, null); -}, /ERR_INVALID_CALLBACK/); +}, /ERR_INVALID_ARG_TYPE/); // Verify that moveCursor() does not throw on null or undefined stream. assert.strictEqual(readline.moveCursor(null, 1, 1), true); @@ -160,7 +160,7 @@ assert.strictEqual(writable.data, '\x1b[2G'); // Verify that cursorTo() throws on invalid callback. assert.throws(() => { readline.cursorTo(writable, 1, 1, null); -}, /ERR_INVALID_CALLBACK/); +}, /ERR_INVALID_ARG_TYPE/); // Verify that cursorTo() throws if x or y is NaN. assert.throws(() => { diff --git a/test/parallel/test-stream-pipeline.js b/test/parallel/test-stream-pipeline.js index 192f971b29daca..e97b48d753ae81 100644 --- a/test/parallel/test-stream-pipeline.js +++ b/test/parallel/test-stream-pipeline.js @@ -66,7 +66,7 @@ const tsp = require('timers/promises'); }, /ERR_MISSING_ARGS/); assert.throws(() => { pipeline(); - }, /ERR_INVALID_CALLBACK/); + }, /ERR_INVALID_ARG_TYPE/); } { @@ -560,7 +560,7 @@ const tsp = require('timers/promises'); assert.throws( () => pipeline(read, transform, write), - { code: 'ERR_INVALID_CALLBACK' } + { code: 'ERR_INVALID_ARG_TYPE' } ); } diff --git a/test/parallel/test-timers-refresh.js b/test/parallel/test-timers-refresh.js index 17b3b34af5662b..a26c4efac30b6c 100644 --- a/test/parallel/test-timers-refresh.js +++ b/test/parallel/test-timers-refresh.js @@ -6,7 +6,6 @@ const common = require('../common'); const { strictEqual, throws } = require('assert'); const { setUnrefTimeout } = require('internal/timers'); -const { inspect } = require('util'); // Schedule the unrefed cases first so that the later case keeps the event loop // active. @@ -37,8 +36,7 @@ const { inspect } = require('util'); throws( () => setUnrefTimeout(cb), { - code: 'ERR_INVALID_CALLBACK', - message: `Callback must be a function. Received ${inspect(cb)}` + code: 'ERR_INVALID_ARG_TYPE', } ); }); diff --git a/test/parallel/test-timers-throw-when-cb-not-function.js b/test/parallel/test-timers-throw-when-cb-not-function.js index 75f49b0f3b967e..f7432af233c8c2 100644 --- a/test/parallel/test-timers-throw-when-cb-not-function.js +++ b/test/parallel/test-timers-throw-when-cb-not-function.js @@ -9,7 +9,7 @@ function doSetTimeout(callback, after) { } const errMessage = { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }; diff --git a/test/parallel/test-tls-disable-renegotiation.js b/test/parallel/test-tls-disable-renegotiation.js index f720eec6c6448a..3de7c79cf04025 100644 --- a/test/parallel/test-tls-disable-renegotiation.js +++ b/test/parallel/test-tls-disable-renegotiation.js @@ -61,12 +61,12 @@ server.listen(0, common.mustCall(() => { }); assert.throws(() => client.renegotiate({}, false), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', }); assert.throws(() => client.renegotiate({}, null), { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError', }); diff --git a/test/parallel/test-whatwg-url-custom-searchparams.js b/test/parallel/test-whatwg-url-custom-searchparams.js index 272435b001a366..0b2087ac246313 100644 --- a/test/parallel/test-whatwg-url-custom-searchparams.js +++ b/test/parallel/test-whatwg-url-custom-searchparams.js @@ -74,7 +74,7 @@ sp.forEach(function() { { const callbackErr = { - code: 'ERR_INVALID_CALLBACK', + code: 'ERR_INVALID_ARG_TYPE', name: 'TypeError' }; assert.throws(() => sp.forEach(), callbackErr);