@vinicunca/eslint-config 2.14.0 → 2.15.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +3 -1
- package/dist/index.d.cts +1510 -82
- package/dist/index.d.ts +1510 -82
- package/dist/index.js +3 -1
- package/package.json +2 -2
package/dist/index.d.ts
CHANGED
|
@@ -3766,166 +3766,1362 @@ interface RuleOptions {
|
|
|
3766
3766
|
* @see https://github.com/solidjs-community/eslint-plugin-solid/blob/main/packages/eslint-plugin-solid/docs/style-prop.md
|
|
3767
3767
|
*/
|
|
3768
3768
|
'solid/style-prop'?: Linter.RuleEntry<SolidStyleProp>
|
|
3769
|
+
/**
|
|
3770
|
+
* Alternatives in regular expressions should be grouped when used with anchors
|
|
3771
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5850/javascript
|
|
3772
|
+
*/
|
|
3773
|
+
'sonar/anchor-precedence'?: Linter.RuleEntry<[]>
|
|
3774
|
+
/**
|
|
3775
|
+
* Arguments to built-in functions should match documented types
|
|
3776
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3782/javascript
|
|
3777
|
+
*/
|
|
3778
|
+
'sonar/argument-type'?: Linter.RuleEntry<[]>
|
|
3779
|
+
/**
|
|
3780
|
+
* Parameters should be passed in the correct order
|
|
3781
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2234/javascript
|
|
3782
|
+
*/
|
|
3783
|
+
'sonar/arguments-order'?: Linter.RuleEntry<SonarArgumentsOrder>
|
|
3784
|
+
/**
|
|
3785
|
+
* "arguments" should not be accessed directly
|
|
3786
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3513/javascript
|
|
3787
|
+
*/
|
|
3788
|
+
'sonar/arguments-usage'?: Linter.RuleEntry<SonarArgumentsUsage>
|
|
3789
|
+
/**
|
|
3790
|
+
* Callbacks of array methods should have return statements
|
|
3791
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3796/javascript
|
|
3792
|
+
*/
|
|
3793
|
+
'sonar/array-callback-without-return'?: Linter.RuleEntry<[]>
|
|
3794
|
+
/**
|
|
3795
|
+
* Array constructors should not be used
|
|
3796
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1528/javascript
|
|
3797
|
+
*/
|
|
3798
|
+
'sonar/array-constructor'?: Linter.RuleEntry<[]>
|
|
3799
|
+
/**
|
|
3800
|
+
* Braces and parentheses should be used consistently with arrow functions
|
|
3801
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3524/javascript
|
|
3802
|
+
*/
|
|
3803
|
+
'sonar/arrow-function-convention'?: Linter.RuleEntry<SonarArrowFunctionConvention>
|
|
3804
|
+
/**
|
|
3805
|
+
* Tests should include assertions
|
|
3806
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2699/javascript
|
|
3807
|
+
*/
|
|
3808
|
+
'sonar/assertions-in-tests'?: Linter.RuleEntry<[]>
|
|
3809
|
+
/**
|
|
3810
|
+
* Creating public APIs is security-sensitive
|
|
3811
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6333/javascript
|
|
3812
|
+
*/
|
|
3813
|
+
'sonar/aws-apigateway-public-api'?: Linter.RuleEntry<[]>
|
|
3814
|
+
/**
|
|
3815
|
+
* Allowing public network access to cloud resources is security-sensitive
|
|
3816
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6329/javascript
|
|
3817
|
+
*/
|
|
3818
|
+
'sonar/aws-ec2-rds-dms-public'?: Linter.RuleEntry<[]>
|
|
3819
|
+
/**
|
|
3820
|
+
* Using unencrypted EBS volumes is security-sensitive
|
|
3821
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6275/javascript
|
|
3822
|
+
*/
|
|
3823
|
+
'sonar/aws-ec2-unencrypted-ebs-volume'?: Linter.RuleEntry<[]>
|
|
3824
|
+
/**
|
|
3825
|
+
* Using unencrypted EFS file systems is security-sensitive
|
|
3826
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6332/javascript
|
|
3827
|
+
*/
|
|
3828
|
+
'sonar/aws-efs-unencrypted'?: Linter.RuleEntry<[]>
|
|
3829
|
+
/**
|
|
3830
|
+
* Policies granting all privileges are security-sensitive
|
|
3831
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6302/javascript
|
|
3832
|
+
*/
|
|
3833
|
+
'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<SonarAwsIamAllPrivileges>
|
|
3834
|
+
/**
|
|
3835
|
+
* Policies granting access to all resources of an account are security-sensitive
|
|
3836
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6304/javascript
|
|
3837
|
+
*/
|
|
3838
|
+
'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<SonarAwsIamAllResourcesAccessible>
|
|
3839
|
+
/**
|
|
3840
|
+
* AWS IAM policies should limit the scope of permissions given
|
|
3841
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6317/javascript
|
|
3842
|
+
*/
|
|
3843
|
+
'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<SonarAwsIamPrivilegeEscalation>
|
|
3844
|
+
/**
|
|
3845
|
+
* Policies authorizing public access to resources are security-sensitive
|
|
3846
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6270/javascript
|
|
3847
|
+
*/
|
|
3848
|
+
'sonar/aws-iam-public-access'?: Linter.RuleEntry<SonarAwsIamPublicAccess>
|
|
3849
|
+
/**
|
|
3850
|
+
* Using unencrypted Elasticsearch domains is security-sensitive
|
|
3851
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6308/javascript
|
|
3852
|
+
*/
|
|
3853
|
+
'sonar/aws-opensearchservice-domain'?: Linter.RuleEntry<[]>
|
|
3854
|
+
/**
|
|
3855
|
+
* Using unencrypted RDS DB resources is security-sensitive
|
|
3856
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6303/javascript
|
|
3857
|
+
*/
|
|
3858
|
+
'sonar/aws-rds-unencrypted-databases'?: Linter.RuleEntry<[]>
|
|
3859
|
+
/**
|
|
3860
|
+
* Administration services access should be restricted to specific IP addresses
|
|
3861
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6321/javascript
|
|
3862
|
+
*/
|
|
3863
|
+
'sonar/aws-restricted-ip-admin-access'?: Linter.RuleEntry<[]>
|
|
3864
|
+
/**
|
|
3865
|
+
* Granting access to S3 buckets to all or authenticated users is security-sensitive
|
|
3866
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6265/javascript
|
|
3867
|
+
*/
|
|
3868
|
+
'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<SonarAwsS3BucketGrantedAccess>
|
|
3869
|
+
/**
|
|
3870
|
+
* Authorizing HTTP communications with S3 buckets is security-sensitive
|
|
3871
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6249/javascript
|
|
3872
|
+
*/
|
|
3873
|
+
'sonar/aws-s3-bucket-insecure-http'?: Linter.RuleEntry<[]>
|
|
3874
|
+
/**
|
|
3875
|
+
* Allowing public ACLs or policies on a S3 bucket is security-sensitive
|
|
3876
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6281/javascript
|
|
3877
|
+
*/
|
|
3878
|
+
'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<SonarAwsS3BucketPublicAccess>
|
|
3879
|
+
/**
|
|
3880
|
+
* Disabling server-side encryption of S3 buckets is security-sensitive
|
|
3881
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6245/javascript
|
|
3882
|
+
* @deprecated
|
|
3883
|
+
*/
|
|
3884
|
+
'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<SonarAwsS3BucketServerEncryption>
|
|
3885
|
+
/**
|
|
3886
|
+
* Disabling versioning of S3 buckets is security-sensitive
|
|
3887
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6252/javascript
|
|
3888
|
+
*/
|
|
3889
|
+
'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<SonarAwsS3BucketVersioning>
|
|
3890
|
+
/**
|
|
3891
|
+
* Using unencrypted SageMaker notebook instances is security-sensitive
|
|
3892
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6319/javascript
|
|
3893
|
+
*/
|
|
3894
|
+
'sonar/aws-sagemaker-unencrypted-notebook'?: Linter.RuleEntry<[]>
|
|
3895
|
+
/**
|
|
3896
|
+
* Using unencrypted SNS topics is security-sensitive
|
|
3897
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6327/javascript
|
|
3898
|
+
*/
|
|
3899
|
+
'sonar/aws-sns-unencrypted-topics'?: Linter.RuleEntry<[]>
|
|
3900
|
+
/**
|
|
3901
|
+
* Using unencrypted SQS queues is security-sensitive
|
|
3902
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6330/javascript
|
|
3903
|
+
*/
|
|
3904
|
+
'sonar/aws-sqs-unencrypted-queue'?: Linter.RuleEntry<[]>
|
|
3905
|
+
/**
|
|
3906
|
+
* Bitwise operators should not be used in boolean contexts
|
|
3907
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1529/javascript
|
|
3908
|
+
*/
|
|
3909
|
+
'sonar/bitwise-operators'?: Linter.RuleEntry<[]>
|
|
3910
|
+
/**
|
|
3911
|
+
* Variables should be used in the blocks where they are declared
|
|
3912
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2392/javascript
|
|
3913
|
+
*/
|
|
3914
|
+
'sonar/block-scoped-var'?: Linter.RuleEntry<SonarBlockScopedVar>
|
|
3915
|
+
/**
|
|
3916
|
+
* Optional boolean parameters should have default value
|
|
3917
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4798/javascript
|
|
3918
|
+
*/
|
|
3919
|
+
'sonar/bool-param-default'?: Linter.RuleEntry<[]>
|
|
3920
|
+
/**
|
|
3921
|
+
* Function call arguments should not start on new lines
|
|
3922
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1472/javascript
|
|
3923
|
+
*/
|
|
3924
|
+
'sonar/call-argument-line'?: Linter.RuleEntry<[]>
|
|
3925
|
+
/**
|
|
3926
|
+
* Disabling Certificate Transparency monitoring is security-sensitive
|
|
3927
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5742/javascript
|
|
3928
|
+
*/
|
|
3929
|
+
'sonar/certificate-transparency'?: Linter.RuleEntry<SonarCertificateTransparency>
|
|
3930
|
+
/**
|
|
3931
|
+
* Chai assertions should have only one reason to succeed
|
|
3932
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6092/javascript
|
|
3933
|
+
*/
|
|
3934
|
+
'sonar/chai-determinate-assertion'?: Linter.RuleEntry<[]>
|
|
3935
|
+
/**
|
|
3936
|
+
* Class names should comply with a naming convention
|
|
3937
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S101/javascript
|
|
3938
|
+
*/
|
|
3939
|
+
'sonar/class-name'?: Linter.RuleEntry<SonarClassName>
|
|
3940
|
+
/**
|
|
3941
|
+
* Class methods should be used instead of "prototype" assignments
|
|
3942
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3525/javascript
|
|
3943
|
+
*/
|
|
3944
|
+
'sonar/class-prototype'?: Linter.RuleEntry<[]>
|
|
3945
|
+
/**
|
|
3946
|
+
* Dynamically executing code is security-sensitive
|
|
3947
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1523/javascript
|
|
3948
|
+
*/
|
|
3949
|
+
'sonar/code-eval'?: Linter.RuleEntry<[]>
|
|
3769
3950
|
/**
|
|
3770
3951
|
* Cognitive Complexity of functions should not be too high
|
|
3771
|
-
* @see https://github.
|
|
3952
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3776/javascript
|
|
3953
|
+
*/
|
|
3954
|
+
'sonar/cognitive-complexity'?: Linter.RuleEntry<SonarCognitiveComplexity>
|
|
3955
|
+
/**
|
|
3956
|
+
* Comma and logical OR operators should not be used in switch cases
|
|
3957
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3616/javascript
|
|
3958
|
+
*/
|
|
3959
|
+
'sonar/comma-or-logical-or-case'?: Linter.RuleEntry<[]>
|
|
3960
|
+
/**
|
|
3961
|
+
* Track comments matching a regular expression
|
|
3962
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S124/javascript
|
|
3963
|
+
*/
|
|
3964
|
+
'sonar/comment-regex'?: Linter.RuleEntry<SonarCommentRegex>
|
|
3965
|
+
/**
|
|
3966
|
+
* Regular expression quantifiers and character classes should be used concisely
|
|
3967
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6353/javascript
|
|
3968
|
+
*/
|
|
3969
|
+
'sonar/concise-regex'?: Linter.RuleEntry<[]>
|
|
3970
|
+
/**
|
|
3971
|
+
* A conditionally executed single line should be denoted by indentation
|
|
3972
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3973/javascript
|
|
3973
|
+
* @deprecated
|
|
3974
|
+
*/
|
|
3975
|
+
'sonar/conditional-indentation'?: Linter.RuleEntry<SonarConditionalIndentation>
|
|
3976
|
+
/**
|
|
3977
|
+
* Allowing confidential information to be logged is security-sensitive
|
|
3978
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5757/javascript
|
|
3979
|
+
*/
|
|
3980
|
+
'sonar/confidential-information-logging'?: Linter.RuleEntry<SonarConfidentialInformationLogging>
|
|
3981
|
+
/**
|
|
3982
|
+
* Objects should not be created to be dropped immediately without being used
|
|
3983
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1848/javascript
|
|
3984
|
+
*/
|
|
3985
|
+
'sonar/constructor-for-side-effects'?: Linter.RuleEntry<[]>
|
|
3986
|
+
/**
|
|
3987
|
+
* Allowing requests with excessive content length is security-sensitive
|
|
3988
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5693/javascript
|
|
3989
|
+
*/
|
|
3990
|
+
'sonar/content-length'?: Linter.RuleEntry<SonarContentLength>
|
|
3991
|
+
/**
|
|
3992
|
+
* Disabling content security policy fetch directives is security-sensitive
|
|
3993
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5728/javascript
|
|
3994
|
+
*/
|
|
3995
|
+
'sonar/content-security-policy'?: Linter.RuleEntry<SonarContentSecurityPolicy>
|
|
3996
|
+
/**
|
|
3997
|
+
* Creating cookies without the "HttpOnly" flag is security-sensitive
|
|
3998
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3330/javascript
|
|
3999
|
+
*/
|
|
4000
|
+
'sonar/cookie-no-httponly'?: Linter.RuleEntry<SonarCookieNoHttponly>
|
|
4001
|
+
/**
|
|
4002
|
+
* Writing cookies is security-sensitive
|
|
4003
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2255/javascript
|
|
4004
|
+
* @deprecated
|
|
4005
|
+
*/
|
|
4006
|
+
'sonar/cookies'?: Linter.RuleEntry<[]>
|
|
4007
|
+
/**
|
|
4008
|
+
* Having a permissive Cross-Origin Resource Sharing policy is security-sensitive
|
|
4009
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5122/javascript
|
|
4010
|
+
*/
|
|
4011
|
+
'sonar/cors'?: Linter.RuleEntry<SonarCors>
|
|
4012
|
+
/**
|
|
4013
|
+
* Disabling CSRF protections is security-sensitive
|
|
4014
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4502/javascript
|
|
4015
|
+
*/
|
|
4016
|
+
'sonar/csrf'?: Linter.RuleEntry<SonarCsrf>
|
|
4017
|
+
/**
|
|
4018
|
+
* Cyclomatic Complexity of functions should not be too high
|
|
4019
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1541/javascript
|
|
4020
|
+
*/
|
|
4021
|
+
'sonar/cyclomatic-complexity'?: Linter.RuleEntry<SonarCyclomaticComplexity>
|
|
4022
|
+
/**
|
|
4023
|
+
* Variables and functions should not be declared in the global scope
|
|
4024
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3798/javascript
|
|
4025
|
+
*/
|
|
4026
|
+
'sonar/declarations-in-global-scope'?: Linter.RuleEntry<[]>
|
|
4027
|
+
/**
|
|
4028
|
+
* Deprecated APIs should not be used
|
|
4029
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1874/javascript
|
|
4030
|
+
*/
|
|
4031
|
+
'sonar/deprecation'?: Linter.RuleEntry<[]>
|
|
4032
|
+
/**
|
|
4033
|
+
* Destructuring syntax should be used for assignments
|
|
4034
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3514/javascript
|
|
4035
|
+
*/
|
|
4036
|
+
'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<SonarDestructuringAssignmentSyntax>
|
|
4037
|
+
/**
|
|
4038
|
+
* Strict equality operators should not be used with dissimilar types
|
|
4039
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3403/javascript
|
|
4040
|
+
*/
|
|
4041
|
+
'sonar/different-types-comparison'?: Linter.RuleEntry<SonarDifferentTypesComparison>
|
|
4042
|
+
/**
|
|
4043
|
+
* Disabling auto-escaping in template engines is security-sensitive
|
|
4044
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5247/javascript
|
|
4045
|
+
*/
|
|
4046
|
+
'sonar/disabled-auto-escaping'?: Linter.RuleEntry<SonarDisabledAutoEscaping>
|
|
4047
|
+
/**
|
|
4048
|
+
* Using remote artifacts without integrity checks is security-sensitive
|
|
4049
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5725/javascript
|
|
4050
|
+
*/
|
|
4051
|
+
'sonar/disabled-resource-integrity'?: Linter.RuleEntry<[]>
|
|
4052
|
+
/**
|
|
4053
|
+
* Disabling Mocha timeouts should be explicit
|
|
4054
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6080/javascript
|
|
4055
|
+
*/
|
|
4056
|
+
'sonar/disabled-timeout'?: Linter.RuleEntry<[]>
|
|
4057
|
+
/**
|
|
4058
|
+
* Allowing browsers to perform DNS prefetching is security-sensitive
|
|
4059
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5743/javascript
|
|
4060
|
+
* @deprecated
|
|
4061
|
+
*/
|
|
4062
|
+
'sonar/dns-prefetching'?: Linter.RuleEntry<SonarDnsPrefetching>
|
|
4063
|
+
/**
|
|
4064
|
+
* Character classes in regular expressions should not contain the same character twice
|
|
4065
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5869/javascript
|
|
4066
|
+
*/
|
|
4067
|
+
'sonar/duplicates-in-character-class'?: Linter.RuleEntry<SonarDuplicatesInCharacterClass>
|
|
4068
|
+
/**
|
|
4069
|
+
* "if ... else if" constructs should end with "else" clauses
|
|
4070
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S126/javascript
|
|
4071
|
+
*/
|
|
4072
|
+
'sonar/elseif-without-else'?: Linter.RuleEntry<[]>
|
|
4073
|
+
/**
|
|
4074
|
+
* Repeated patterns in regular expressions should not match the empty string
|
|
4075
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5842/javascript
|
|
4076
|
+
*/
|
|
4077
|
+
'sonar/empty-string-repetition'?: Linter.RuleEntry<[]>
|
|
4078
|
+
/**
|
|
4079
|
+
* Encrypting data is security-sensitive
|
|
4080
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4787/javascript
|
|
4081
|
+
* @deprecated
|
|
4082
|
+
*/
|
|
4083
|
+
'sonar/encryption'?: Linter.RuleEntry<[]>
|
|
4084
|
+
/**
|
|
4085
|
+
* Encryption algorithms should be used with secure mode and padding scheme
|
|
4086
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5542/javascript
|
|
4087
|
+
*/
|
|
4088
|
+
'sonar/encryption-secure-mode'?: Linter.RuleEntry<[]>
|
|
4089
|
+
/**
|
|
4090
|
+
* Trailing commas should be used
|
|
4091
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3723/javascript
|
|
4092
|
+
* @deprecated
|
|
4093
|
+
*/
|
|
4094
|
+
'sonar/enforce-trailing-comma'?: Linter.RuleEntry<SonarEnforceTrailingComma>
|
|
4095
|
+
/**
|
|
4096
|
+
* Replacement strings should reference existing regular expression groups
|
|
4097
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6328/javascript
|
|
4098
|
+
*/
|
|
4099
|
+
'sonar/existing-groups'?: Linter.RuleEntry<[]>
|
|
4100
|
+
/**
|
|
4101
|
+
* Expressions should not be too complex
|
|
4102
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1067/javascript
|
|
4103
|
+
*/
|
|
4104
|
+
'sonar/expression-complexity'?: Linter.RuleEntry<SonarExpressionComplexity>
|
|
4105
|
+
/**
|
|
4106
|
+
* Track lack of copyright and license headers
|
|
4107
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1451/javascript
|
|
4108
|
+
*/
|
|
4109
|
+
'sonar/file-header'?: Linter.RuleEntry<SonarFileHeader>
|
|
4110
|
+
/**
|
|
4111
|
+
* Default export names and file names should match
|
|
4112
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3317/javascript
|
|
4113
|
+
*/
|
|
4114
|
+
'sonar/file-name-differ-from-class'?: Linter.RuleEntry<[]>
|
|
4115
|
+
/**
|
|
4116
|
+
* Setting loose POSIX file permissions is security-sensitive
|
|
4117
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2612/javascript
|
|
4118
|
+
*/
|
|
4119
|
+
'sonar/file-permissions'?: Linter.RuleEntry<[]>
|
|
4120
|
+
/**
|
|
4121
|
+
* File uploads should be restricted
|
|
4122
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2598/javascript
|
|
4123
|
+
*/
|
|
4124
|
+
'sonar/file-uploads'?: Linter.RuleEntry<SonarFileUploads>
|
|
4125
|
+
/**
|
|
4126
|
+
* Track uses of "FIXME" tags
|
|
4127
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1134/javascript
|
|
4128
|
+
*/
|
|
4129
|
+
'sonar/fixme-tag'?: Linter.RuleEntry<[]>
|
|
4130
|
+
/**
|
|
4131
|
+
* "for...in" loops should filter properties before acting on them
|
|
4132
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1535/javascript
|
|
4133
|
+
*/
|
|
4134
|
+
'sonar/for-in'?: Linter.RuleEntry<[]>
|
|
4135
|
+
/**
|
|
4136
|
+
* A "for" loop update clause should move the counter in the right direction
|
|
4137
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2251/javascript
|
|
4138
|
+
*/
|
|
4139
|
+
'sonar/for-loop-increment-sign'?: Linter.RuleEntry<SonarForLoopIncrementSign>
|
|
4140
|
+
/**
|
|
4141
|
+
* Disabling content security policy frame-ancestors directive is security-sensitive
|
|
4142
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5732/javascript
|
|
4143
|
+
*/
|
|
4144
|
+
'sonar/frame-ancestors'?: Linter.RuleEntry<SonarFrameAncestors>
|
|
4145
|
+
/**
|
|
4146
|
+
* Functions should not be defined inside loops
|
|
4147
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1515/javascript
|
|
4148
|
+
*/
|
|
4149
|
+
'sonar/function-inside-loop'?: Linter.RuleEntry<SonarFunctionInsideLoop>
|
|
4150
|
+
/**
|
|
4151
|
+
* Function and method names should comply with a naming convention
|
|
4152
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S100/javascript
|
|
4153
|
+
*/
|
|
4154
|
+
'sonar/function-name'?: Linter.RuleEntry<SonarFunctionName>
|
|
4155
|
+
/**
|
|
4156
|
+
* Functions should always return the same type
|
|
4157
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3800/javascript
|
|
4158
|
+
*/
|
|
4159
|
+
'sonar/function-return-type'?: Linter.RuleEntry<SonarFunctionReturnType>
|
|
4160
|
+
/**
|
|
4161
|
+
* Future reserved words should not be used as identifiers
|
|
4162
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1527/javascript
|
|
4163
|
+
*/
|
|
4164
|
+
'sonar/future-reserved-words'?: Linter.RuleEntry<[]>
|
|
4165
|
+
/**
|
|
4166
|
+
* Generators should explicitly "yield" a value
|
|
4167
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3531/javascript
|
|
4168
|
+
*/
|
|
4169
|
+
'sonar/generator-without-yield'?: Linter.RuleEntry<[]>
|
|
4170
|
+
/**
|
|
4171
|
+
* Using weak hashing algorithms is security-sensitive
|
|
4172
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4790/javascript
|
|
4173
|
+
*/
|
|
4174
|
+
'sonar/hashing'?: Linter.RuleEntry<[]>
|
|
4175
|
+
/**
|
|
4176
|
+
* Statically serving hidden files is security-sensitive
|
|
4177
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5691/javascript
|
|
4178
|
+
*/
|
|
4179
|
+
'sonar/hidden-files'?: Linter.RuleEntry<[]>
|
|
4180
|
+
/**
|
|
4181
|
+
* "in" should not be used with primitive types
|
|
4182
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3785/javascript
|
|
4183
|
+
*/
|
|
4184
|
+
'sonar/in-operator-type-error'?: Linter.RuleEntry<SonarInOperatorTypeError>
|
|
4185
|
+
/**
|
|
4186
|
+
* Functions should be called consistently with or without "new"
|
|
4187
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3686/javascript
|
|
4188
|
+
*/
|
|
4189
|
+
'sonar/inconsistent-function-call'?: Linter.RuleEntry<SonarInconsistentFunctionCall>
|
|
4190
|
+
/**
|
|
4191
|
+
* "indexOf" checks should not be for positive numbers
|
|
4192
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2692/javascript
|
|
4193
|
+
*/
|
|
4194
|
+
'sonar/index-of-compare-to-positive-number'?: Linter.RuleEntry<[]>
|
|
4195
|
+
/**
|
|
4196
|
+
* Creating cookies without the "secure" flag is security-sensitive
|
|
4197
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2092/javascript
|
|
4198
|
+
*/
|
|
4199
|
+
'sonar/insecure-cookie'?: Linter.RuleEntry<SonarInsecureCookie>
|
|
4200
|
+
/**
|
|
4201
|
+
* JWT should be signed and verified with strong cipher algorithms
|
|
4202
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5659/javascript
|
|
4203
|
+
*/
|
|
4204
|
+
'sonar/insecure-jwt-token'?: Linter.RuleEntry<SonarInsecureJwtToken>
|
|
4205
|
+
/**
|
|
4206
|
+
* Assertion arguments should be passed in the correct order
|
|
4207
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3415/javascript
|
|
4208
|
+
*/
|
|
4209
|
+
'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<SonarInvertedAssertionArguments>
|
|
4210
|
+
/**
|
|
4211
|
+
* React components should not render non-boolean condition values
|
|
4212
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6439/javascript
|
|
4213
|
+
*/
|
|
4214
|
+
'sonar/jsx-no-leaked-render'?: Linter.RuleEntry<[]>
|
|
4215
|
+
/**
|
|
4216
|
+
* Only "while", "do", "for" and "switch" statements should be labelled
|
|
4217
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1439/javascript
|
|
4218
|
+
*/
|
|
4219
|
+
'sonar/label-position'?: Linter.RuleEntry<[]>
|
|
4220
|
+
/**
|
|
4221
|
+
* Authorizing an opened window to access back to the originating window is security-sensitive
|
|
4222
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5148/javascript
|
|
4223
|
+
*/
|
|
4224
|
+
'sonar/link-with-target-blank'?: Linter.RuleEntry<[]>
|
|
4225
|
+
/**
|
|
4226
|
+
* Files should not have too many lines of code
|
|
4227
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S104/javascript
|
|
4228
|
+
*/
|
|
4229
|
+
'sonar/max-lines'?: Linter.RuleEntry<SonarMaxLines>
|
|
4230
|
+
/**
|
|
4231
|
+
* Functions should not have too many lines of code
|
|
4232
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S138/javascript
|
|
4233
|
+
*/
|
|
4234
|
+
'sonar/max-lines-per-function'?: Linter.RuleEntry<SonarMaxLinesPerFunction>
|
|
4235
|
+
/**
|
|
4236
|
+
* "switch" statements should not have too many "case" clauses
|
|
4237
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1479/javascript
|
|
4238
|
+
*/
|
|
4239
|
+
'sonar/max-switch-cases'?: Linter.RuleEntry<SonarMaxSwitchCases>
|
|
4240
|
+
/**
|
|
4241
|
+
* Union types should not have too many elements
|
|
4242
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4622/javascript
|
|
4243
|
+
*/
|
|
4244
|
+
'sonar/max-union-size'?: Linter.RuleEntry<SonarMaxUnionSize>
|
|
4245
|
+
/**
|
|
4246
|
+
* "for" loop increment clauses should modify the loops' counters
|
|
4247
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1994/javascript
|
|
4248
|
+
*/
|
|
4249
|
+
'sonar/misplaced-loop-counter'?: Linter.RuleEntry<[]>
|
|
4250
|
+
/**
|
|
4251
|
+
* Control flow statements "if", "for", "while", "switch" and "try" should not be nested too deeply
|
|
4252
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S134/javascript
|
|
4253
|
+
*/
|
|
4254
|
+
'sonar/nested-control-flow'?: Linter.RuleEntry<SonarNestedControlFlow>
|
|
4255
|
+
/**
|
|
4256
|
+
* "new" should only be used with functions and classes
|
|
4257
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2999/javascript
|
|
4258
|
+
*/
|
|
4259
|
+
'sonar/new-operator-misuse'?: Linter.RuleEntry<SonarNewOperatorMisuse>
|
|
4260
|
+
/**
|
|
4261
|
+
* All branches in a conditional structure should not have exactly the same implementation
|
|
4262
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3923/javascript
|
|
4263
|
+
*/
|
|
4264
|
+
'sonar/no-all-duplicated-branches'?: Linter.RuleEntry<[]>
|
|
4265
|
+
/**
|
|
4266
|
+
* "Array.prototype.sort()" and "Array.prototype.toSorted()" should use a compare function
|
|
4267
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2871/javascript
|
|
4268
|
+
*/
|
|
4269
|
+
'sonar/no-alphabetical-sort'?: Linter.RuleEntry<[]>
|
|
4270
|
+
/**
|
|
4271
|
+
* Disabling Angular built-in sanitization is security-sensitive
|
|
4272
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6268/javascript
|
|
4273
|
+
*/
|
|
4274
|
+
'sonar/no-angular-bypass-sanitization'?: Linter.RuleEntry<[]>
|
|
4275
|
+
/**
|
|
4276
|
+
* "delete" should not be used on arrays
|
|
4277
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2870/javascript
|
|
4278
|
+
*/
|
|
4279
|
+
'sonar/no-array-delete'?: Linter.RuleEntry<[]>
|
|
4280
|
+
/**
|
|
4281
|
+
* Array indexes should be numeric
|
|
4282
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3579/javascript
|
|
4283
|
+
*/
|
|
4284
|
+
'sonar/no-associative-arrays'?: Linter.RuleEntry<[]>
|
|
4285
|
+
/**
|
|
4286
|
+
* Constructors should not contain asynchronous operations
|
|
4287
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S7059/javascript
|
|
4288
|
+
*/
|
|
4289
|
+
'sonar/no-async-constructor'?: Linter.RuleEntry<[]>
|
|
4290
|
+
/**
|
|
4291
|
+
* Built-in objects should not be overridden
|
|
4292
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2424/javascript
|
|
4293
|
+
*/
|
|
4294
|
+
'sonar/no-built-in-override'?: Linter.RuleEntry<[]>
|
|
4295
|
+
/**
|
|
4296
|
+
* "switch" statements should not contain non-case labels
|
|
4297
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1219/javascript
|
|
4298
|
+
*/
|
|
4299
|
+
'sonar/no-case-label-in-switch'?: Linter.RuleEntry<[]>
|
|
4300
|
+
/**
|
|
4301
|
+
* Using clear-text protocols is security-sensitive
|
|
4302
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5332/javascript
|
|
4303
|
+
*/
|
|
4304
|
+
'sonar/no-clear-text-protocols'?: Linter.RuleEntry<[]>
|
|
4305
|
+
/**
|
|
4306
|
+
* Tests should not execute any code after "done()" is called
|
|
4307
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6079/javascript
|
|
4308
|
+
*/
|
|
4309
|
+
'sonar/no-code-after-done'?: Linter.RuleEntry<SonarNoCodeAfterDone>
|
|
4310
|
+
/**
|
|
4311
|
+
* Mergeable "if" statements should be combined
|
|
4312
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1066/javascript
|
|
4313
|
+
*/
|
|
4314
|
+
'sonar/no-collapsible-if'?: Linter.RuleEntry<SonarNoCollapsibleIf>
|
|
4315
|
+
/**
|
|
4316
|
+
* Collection size and array length comparisons should make sense
|
|
4317
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3981/javascript
|
|
4318
|
+
*/
|
|
4319
|
+
'sonar/no-collection-size-mischeck'?: Linter.RuleEntry<[]>
|
|
4320
|
+
/**
|
|
4321
|
+
* Sections of code should not be commented out
|
|
4322
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S125/javascript
|
|
4323
|
+
*/
|
|
4324
|
+
'sonar/no-commented-code'?: Linter.RuleEntry<[]>
|
|
4325
|
+
/**
|
|
4326
|
+
* Regular expressions should not contain control characters
|
|
4327
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6324/javascript
|
|
4328
|
+
*/
|
|
4329
|
+
'sonar/no-control-regex'?: Linter.RuleEntry<[]>
|
|
4330
|
+
/**
|
|
4331
|
+
* Unused assignments should be removed
|
|
4332
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1854/javascript
|
|
4333
|
+
*/
|
|
4334
|
+
'sonar/no-dead-store'?: Linter.RuleEntry<[]>
|
|
4335
|
+
/**
|
|
4336
|
+
* "delete" should be used only with object properties
|
|
4337
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3001/javascript
|
|
4338
|
+
*/
|
|
4339
|
+
'sonar/no-delete-var'?: Linter.RuleEntry<[]>
|
|
4340
|
+
/**
|
|
4341
|
+
* Union and intersection types should not include duplicated constituents
|
|
4342
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4621/javascript
|
|
4343
|
+
*/
|
|
4344
|
+
'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<SonarNoDuplicateInComposite>
|
|
4345
|
+
/**
|
|
4346
|
+
* String literals should not be duplicated
|
|
4347
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1192/javascript
|
|
4348
|
+
*/
|
|
4349
|
+
'sonar/no-duplicate-string'?: Linter.RuleEntry<SonarNoDuplicateString>
|
|
4350
|
+
/**
|
|
4351
|
+
* Two branches in a conditional structure should not have exactly the same implementation
|
|
4352
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1871/javascript
|
|
4353
|
+
*/
|
|
4354
|
+
'sonar/no-duplicated-branches'?: Linter.RuleEntry<SonarNoDuplicatedBranches>
|
|
4355
|
+
/**
|
|
4356
|
+
* Collection elements should not be replaced unconditionally
|
|
4357
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4143/javascript
|
|
4358
|
+
*/
|
|
4359
|
+
'sonar/no-element-overwrite'?: Linter.RuleEntry<SonarNoElementOverwrite>
|
|
4360
|
+
/**
|
|
4361
|
+
* Reluctant quantifiers in regular expressions should be followed by an expression that can't match the empty string
|
|
4362
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6019/javascript
|
|
4363
|
+
*/
|
|
4364
|
+
'sonar/no-empty-after-reluctant'?: Linter.RuleEntry<[]>
|
|
4365
|
+
/**
|
|
4366
|
+
* Alternation in regular expressions should not contain empty alternatives
|
|
4367
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6323/javascript
|
|
4368
|
+
*/
|
|
4369
|
+
'sonar/no-empty-alternatives'?: Linter.RuleEntry<[]>
|
|
4370
|
+
/**
|
|
4371
|
+
* Empty character classes should not be used
|
|
4372
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2639/javascript
|
|
4373
|
+
*/
|
|
4374
|
+
'sonar/no-empty-character-class'?: Linter.RuleEntry<[]>
|
|
4375
|
+
/**
|
|
4376
|
+
* Empty collections should not be accessed or iterated
|
|
4377
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4158/javascript
|
|
4378
|
+
*/
|
|
4379
|
+
'sonar/no-empty-collection'?: Linter.RuleEntry<[]>
|
|
4380
|
+
/**
|
|
4381
|
+
* Regular expressions should not contain empty groups
|
|
4382
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6331/javascript
|
|
4383
|
+
*/
|
|
4384
|
+
'sonar/no-empty-group'?: Linter.RuleEntry<[]>
|
|
4385
|
+
/**
|
|
4386
|
+
* Test files should contain at least one test case
|
|
4387
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2187/javascript
|
|
4388
|
+
*/
|
|
4389
|
+
'sonar/no-empty-test-file'?: Linter.RuleEntry<[]>
|
|
4390
|
+
/**
|
|
4391
|
+
* Equality operators should not be used in "for" loop termination conditions
|
|
4392
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S888/javascript
|
|
4393
|
+
*/
|
|
4394
|
+
'sonar/no-equals-in-for-termination'?: Linter.RuleEntry<[]>
|
|
4395
|
+
/**
|
|
4396
|
+
* Exclusive tests should not be commited to version control
|
|
4397
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6426/javascript
|
|
4398
|
+
*/
|
|
4399
|
+
'sonar/no-exclusive-tests'?: Linter.RuleEntry<[]>
|
|
4400
|
+
/**
|
|
4401
|
+
* Function calls should not pass extra arguments
|
|
4402
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S930/javascript
|
|
4403
|
+
*/
|
|
4404
|
+
'sonar/no-extra-arguments'?: Linter.RuleEntry<SonarNoExtraArguments>
|
|
4405
|
+
/**
|
|
4406
|
+
* Switch cases should end with an unconditional "break" statement
|
|
4407
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S128/javascript
|
|
4408
|
+
*/
|
|
4409
|
+
'sonar/no-fallthrough'?: Linter.RuleEntry<[]>
|
|
4410
|
+
/**
|
|
4411
|
+
* "for in" should not be used with iterables
|
|
4412
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4139/javascript
|
|
4413
|
+
*/
|
|
4414
|
+
'sonar/no-for-in-iterable'?: Linter.RuleEntry<[]>
|
|
4415
|
+
/**
|
|
4416
|
+
* Function declarations should not be made within blocks
|
|
4417
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1530/javascript
|
|
4418
|
+
*/
|
|
4419
|
+
'sonar/no-function-declaration-in-block'?: Linter.RuleEntry<[]>
|
|
4420
|
+
/**
|
|
4421
|
+
* The global "this" object should not be used
|
|
4422
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2990/javascript
|
|
4423
|
+
*/
|
|
4424
|
+
'sonar/no-global-this'?: Linter.RuleEntry<[]>
|
|
4425
|
+
/**
|
|
4426
|
+
* Special identifiers should not be bound or assigned
|
|
4427
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2137/javascript
|
|
4428
|
+
*/
|
|
4429
|
+
'sonar/no-globals-shadowing'?: Linter.RuleEntry<[]>
|
|
4430
|
+
/**
|
|
4431
|
+
* Boolean expressions should not be gratuitous
|
|
4432
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2589/javascript
|
|
4433
|
+
*/
|
|
4434
|
+
'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<SonarNoGratuitousExpressions>
|
|
4435
|
+
/**
|
|
4436
|
+
* Using hardcoded IP addresses is security-sensitive
|
|
4437
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1313/javascript
|
|
4438
|
+
*/
|
|
4439
|
+
'sonar/no-hardcoded-ip'?: Linter.RuleEntry<[]>
|
|
4440
|
+
/**
|
|
4441
|
+
* Hard-coded passwords are security-sensitive
|
|
4442
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2068/javascript
|
|
4443
|
+
*/
|
|
4444
|
+
'sonar/no-hardcoded-passwords'?: Linter.RuleEntry<SonarNoHardcodedPasswords>
|
|
4445
|
+
/**
|
|
4446
|
+
* Hard-coded secrets are security-sensitive
|
|
4447
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6418/javascript
|
|
4448
|
+
*/
|
|
4449
|
+
'sonar/no-hardcoded-secrets'?: Linter.RuleEntry<SonarNoHardcodedSecrets>
|
|
4450
|
+
/**
|
|
4451
|
+
* React's useState hook should not be used directly in the render function or body of a component
|
|
4452
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6442/javascript
|
|
4453
|
+
*/
|
|
4454
|
+
'sonar/no-hook-setter-in-body'?: Linter.RuleEntry<[]>
|
|
4455
|
+
/**
|
|
4456
|
+
* "if/else if" chains and "switch" cases should not have the same condition
|
|
4457
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1862/javascript
|
|
4458
|
+
*/
|
|
4459
|
+
'sonar/no-identical-conditions'?: Linter.RuleEntry<SonarNoIdenticalConditions>
|
|
4460
|
+
/**
|
|
4461
|
+
* Identical expressions should not be used on both sides of a binary operator
|
|
4462
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1764/javascript
|
|
4463
|
+
*/
|
|
4464
|
+
'sonar/no-identical-expressions'?: Linter.RuleEntry<SonarNoIdenticalExpressions>
|
|
4465
|
+
/**
|
|
4466
|
+
* Functions should not have identical implementations
|
|
4467
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4144/javascript
|
|
4468
|
+
*/
|
|
4469
|
+
'sonar/no-identical-functions'?: Linter.RuleEntry<SonarNoIdenticalFunctions>
|
|
4470
|
+
/**
|
|
4471
|
+
* Exceptions should not be ignored
|
|
4472
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2486/javascript
|
|
4473
|
+
*/
|
|
4474
|
+
'sonar/no-ignored-exceptions'?: Linter.RuleEntry<[]>
|
|
4475
|
+
/**
|
|
4476
|
+
* Return values from functions without side effects should not be ignored
|
|
4477
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2201/javascript
|
|
4478
|
+
*/
|
|
4479
|
+
'sonar/no-ignored-return'?: Linter.RuleEntry<[]>
|
|
4480
|
+
/**
|
|
4481
|
+
* Dependencies should be explicit
|
|
4482
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4328/javascript
|
|
4483
|
+
*/
|
|
4484
|
+
'sonar/no-implicit-dependencies'?: Linter.RuleEntry<SonarNoImplicitDependencies>
|
|
4485
|
+
/**
|
|
4486
|
+
* Variables should be declared explicitly
|
|
4487
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2703/javascript
|
|
4488
|
+
*/
|
|
4489
|
+
'sonar/no-implicit-global'?: Linter.RuleEntry<[]>
|
|
4490
|
+
/**
|
|
4491
|
+
* "in" should not be used on arrays
|
|
4492
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4619/javascript
|
|
3772
4493
|
*/
|
|
3773
|
-
'sonar/
|
|
4494
|
+
'sonar/no-in-misuse'?: Linter.RuleEntry<[]>
|
|
3774
4495
|
/**
|
|
3775
|
-
*
|
|
3776
|
-
* @see https://github.
|
|
4496
|
+
* Assertions should be complete
|
|
4497
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2970/javascript
|
|
3777
4498
|
*/
|
|
3778
|
-
'sonar/
|
|
4499
|
+
'sonar/no-incomplete-assertions'?: Linter.RuleEntry<[]>
|
|
3779
4500
|
/**
|
|
3780
|
-
*
|
|
3781
|
-
* @see https://github.
|
|
4501
|
+
* Functions should use "return" consistently
|
|
4502
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3801/javascript
|
|
3782
4503
|
*/
|
|
3783
|
-
'sonar/
|
|
4504
|
+
'sonar/no-inconsistent-returns'?: Linter.RuleEntry<SonarNoInconsistentReturns>
|
|
3784
4505
|
/**
|
|
3785
|
-
*
|
|
3786
|
-
* @see https://github.
|
|
4506
|
+
* Strings and non-strings should not be added
|
|
4507
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3402/javascript
|
|
3787
4508
|
*/
|
|
3788
|
-
'sonar/no-
|
|
4509
|
+
'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<SonarNoIncorrectStringConcat>
|
|
3789
4510
|
/**
|
|
3790
|
-
*
|
|
3791
|
-
* @see https://github.
|
|
4511
|
+
* Users should not use internal APIs
|
|
4512
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6627/javascript
|
|
3792
4513
|
*/
|
|
3793
|
-
'sonar/no-
|
|
4514
|
+
'sonar/no-internal-api-use'?: Linter.RuleEntry<[]>
|
|
3794
4515
|
/**
|
|
3795
|
-
*
|
|
3796
|
-
* @see https://github.
|
|
4516
|
+
* Using intrusive permissions is security-sensitive
|
|
4517
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5604/javascript
|
|
3797
4518
|
*/
|
|
3798
|
-
'sonar/no-
|
|
4519
|
+
'sonar/no-intrusive-permissions'?: Linter.RuleEntry<SonarNoIntrusivePermissions>
|
|
3799
4520
|
/**
|
|
3800
|
-
*
|
|
3801
|
-
* @see https://github.
|
|
4521
|
+
* "await" should only be used with promises
|
|
4522
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4123/javascript
|
|
3802
4523
|
*/
|
|
3803
|
-
'sonar/no-
|
|
4524
|
+
'sonar/no-invalid-await'?: Linter.RuleEntry<[]>
|
|
3804
4525
|
/**
|
|
3805
|
-
*
|
|
3806
|
-
* @see https://github.
|
|
4526
|
+
* Regular expressions should be syntactically valid
|
|
4527
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5856/javascript
|
|
3807
4528
|
*/
|
|
3808
|
-
'sonar/no-
|
|
4529
|
+
'sonar/no-invalid-regexp'?: Linter.RuleEntry<[]>
|
|
3809
4530
|
/**
|
|
3810
|
-
*
|
|
3811
|
-
* @see https://github.
|
|
4531
|
+
* Function returns should not be invariant
|
|
4532
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3516/javascript
|
|
3812
4533
|
*/
|
|
3813
|
-
'sonar/no-
|
|
4534
|
+
'sonar/no-invariant-returns'?: Linter.RuleEntry<SonarNoInvariantReturns>
|
|
3814
4535
|
/**
|
|
3815
|
-
*
|
|
3816
|
-
* @see https://github.
|
|
4536
|
+
* Boolean checks should not be inverted
|
|
4537
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1940/javascript
|
|
3817
4538
|
*/
|
|
3818
|
-
'sonar/no-
|
|
4539
|
+
'sonar/no-inverted-boolean-check'?: Linter.RuleEntry<[]>
|
|
3819
4540
|
/**
|
|
3820
|
-
*
|
|
3821
|
-
* @see https://github.
|
|
4541
|
+
* Forwarding client IP address is security-sensitive
|
|
4542
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5759/javascript
|
|
3822
4543
|
*/
|
|
3823
|
-
'sonar/no-
|
|
4544
|
+
'sonar/no-ip-forward'?: Linter.RuleEntry<SonarNoIpForward>
|
|
3824
4545
|
/**
|
|
3825
|
-
*
|
|
3826
|
-
* @see https://github.
|
|
4546
|
+
* Labels should not be used
|
|
4547
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1119/javascript
|
|
3827
4548
|
*/
|
|
3828
|
-
'sonar/no-
|
|
4549
|
+
'sonar/no-labels'?: Linter.RuleEntry<[]>
|
|
3829
4550
|
/**
|
|
3830
|
-
*
|
|
3831
|
-
* @see https://github.
|
|
4551
|
+
* Literals should not be used as functions
|
|
4552
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6958/javascript
|
|
3832
4553
|
*/
|
|
3833
|
-
'sonar/no-
|
|
4554
|
+
'sonar/no-literal-call'?: Linter.RuleEntry<[]>
|
|
3834
4555
|
/**
|
|
3835
|
-
*
|
|
3836
|
-
* @see https://github.
|
|
4556
|
+
* Allowing browsers to sniff MIME types is security-sensitive
|
|
4557
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5734/javascript
|
|
3837
4558
|
*/
|
|
3838
|
-
'sonar/no-
|
|
4559
|
+
'sonar/no-mime-sniff'?: Linter.RuleEntry<SonarNoMimeSniff>
|
|
3839
4560
|
/**
|
|
3840
|
-
*
|
|
3841
|
-
* @see https://github.
|
|
4561
|
+
* Array-mutating methods should not be used misleadingly
|
|
4562
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4043/javascript
|
|
3842
4563
|
*/
|
|
3843
|
-
'sonar/no-
|
|
4564
|
+
'sonar/no-misleading-array-reverse'?: Linter.RuleEntry<[]>
|
|
3844
4565
|
/**
|
|
3845
|
-
*
|
|
3846
|
-
* @see https://github.
|
|
4566
|
+
* Unicode Grapheme Clusters should be avoided inside regex character classes
|
|
4567
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5868/javascript
|
|
3847
4568
|
*/
|
|
3848
|
-
'sonar/no-
|
|
4569
|
+
'sonar/no-misleading-character-class'?: Linter.RuleEntry<[]>
|
|
3849
4570
|
/**
|
|
3850
|
-
*
|
|
3851
|
-
* @see https://github.
|
|
4571
|
+
* Allowing mixed-content is security-sensitive
|
|
4572
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5730/javascript
|
|
3852
4573
|
*/
|
|
3853
|
-
'sonar/no-
|
|
4574
|
+
'sonar/no-mixed-content'?: Linter.RuleEntry<SonarNoMixedContent>
|
|
4575
|
+
/**
|
|
4576
|
+
* Assignments should not be made from within sub-expressions
|
|
4577
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1121/javascript
|
|
4578
|
+
*/
|
|
4579
|
+
'sonar/no-nested-assignment'?: Linter.RuleEntry<[]>
|
|
4580
|
+
/**
|
|
4581
|
+
* Ternary operators should not be nested
|
|
4582
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3358/javascript
|
|
4583
|
+
*/
|
|
4584
|
+
'sonar/no-nested-conditional'?: Linter.RuleEntry<[]>
|
|
4585
|
+
/**
|
|
4586
|
+
* Functions should not be nested too deeply
|
|
4587
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2004/javascript
|
|
4588
|
+
*/
|
|
4589
|
+
'sonar/no-nested-functions'?: Linter.RuleEntry<SonarNoNestedFunctions>
|
|
4590
|
+
/**
|
|
4591
|
+
* Increment (++) and decrement (--) operators should not be used in a method call or mixed with other operators in an expression
|
|
4592
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S881/javascript
|
|
4593
|
+
*/
|
|
4594
|
+
'sonar/no-nested-incdec'?: Linter.RuleEntry<[]>
|
|
3854
4595
|
/**
|
|
3855
4596
|
* "switch" statements should not be nested
|
|
3856
|
-
* @see https://github.
|
|
4597
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1821/javascript
|
|
3857
4598
|
*/
|
|
3858
4599
|
'sonar/no-nested-switch'?: Linter.RuleEntry<[]>
|
|
3859
4600
|
/**
|
|
3860
4601
|
* Template literals should not be nested
|
|
3861
|
-
* @see https://github.
|
|
4602
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4624/javascript
|
|
3862
4603
|
*/
|
|
3863
4604
|
'sonar/no-nested-template-literals'?: Linter.RuleEntry<[]>
|
|
3864
4605
|
/**
|
|
3865
4606
|
* Loops with at most one iteration should be refactored
|
|
3866
|
-
* @see https://github.
|
|
4607
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1751/javascript
|
|
3867
4608
|
*/
|
|
3868
4609
|
'sonar/no-one-iteration-loop'?: Linter.RuleEntry<[]>
|
|
3869
4610
|
/**
|
|
3870
|
-
*
|
|
3871
|
-
* @see https://github.
|
|
4611
|
+
* Searching OS commands in PATH is security-sensitive
|
|
4612
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4036/javascript
|
|
4613
|
+
*/
|
|
4614
|
+
'sonar/no-os-command-from-path'?: Linter.RuleEntry<[]>
|
|
4615
|
+
/**
|
|
4616
|
+
* Initial values of parameters, caught exceptions, and loop variables should not be ignored
|
|
4617
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1226/javascript
|
|
4618
|
+
*/
|
|
4619
|
+
'sonar/no-parameter-reassignment'?: Linter.RuleEntry<[]>
|
|
4620
|
+
/**
|
|
4621
|
+
* Wrapper objects should not be used for primitive types
|
|
4622
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1533/javascript
|
|
4623
|
+
*/
|
|
4624
|
+
'sonar/no-primitive-wrappers'?: Linter.RuleEntry<[]>
|
|
4625
|
+
/**
|
|
4626
|
+
* Assignments should not be redundant
|
|
4627
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4165/javascript
|
|
4628
|
+
*/
|
|
4629
|
+
'sonar/no-redundant-assignments'?: Linter.RuleEntry<[]>
|
|
4630
|
+
/**
|
|
4631
|
+
* Boolean literals should not be used in comparisons
|
|
4632
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1125/javascript
|
|
3872
4633
|
*/
|
|
3873
4634
|
'sonar/no-redundant-boolean'?: Linter.RuleEntry<[]>
|
|
3874
4635
|
/**
|
|
3875
4636
|
* Jump statements should not be redundant
|
|
3876
|
-
* @see https://github.
|
|
4637
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3626/javascript
|
|
3877
4638
|
*/
|
|
3878
4639
|
'sonar/no-redundant-jump'?: Linter.RuleEntry<[]>
|
|
4640
|
+
/**
|
|
4641
|
+
* Optional property declarations should not use both '?' and 'undefined' syntax
|
|
4642
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4782/javascript
|
|
4643
|
+
*/
|
|
4644
|
+
'sonar/no-redundant-optional'?: Linter.RuleEntry<SonarNoRedundantOptional>
|
|
4645
|
+
/**
|
|
4646
|
+
* Redundant pairs of parentheses should be removed
|
|
4647
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1110/javascript
|
|
4648
|
+
* @deprecated
|
|
4649
|
+
*/
|
|
4650
|
+
'sonar/no-redundant-parentheses'?: Linter.RuleEntry<SonarNoRedundantParentheses>
|
|
4651
|
+
/**
|
|
4652
|
+
* Variables should be defined before being used
|
|
4653
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3827/javascript
|
|
4654
|
+
*/
|
|
4655
|
+
'sonar/no-reference-error'?: Linter.RuleEntry<SonarNoReferenceError>
|
|
4656
|
+
/**
|
|
4657
|
+
* Disabling strict HTTP no-referrer policy is security-sensitive
|
|
4658
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5736/javascript
|
|
4659
|
+
*/
|
|
4660
|
+
'sonar/no-referrer-policy'?: Linter.RuleEntry<SonarNoReferrerPolicy>
|
|
4661
|
+
/**
|
|
4662
|
+
* Regular expressions should not contain multiple spaces
|
|
4663
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6326/javascript
|
|
4664
|
+
*/
|
|
4665
|
+
'sonar/no-regex-spaces'?: Linter.RuleEntry<[]>
|
|
4666
|
+
/**
|
|
4667
|
+
* "import" should be used to include external code
|
|
4668
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3533/javascript
|
|
4669
|
+
*/
|
|
4670
|
+
'sonar/no-require-or-define'?: Linter.RuleEntry<[]>
|
|
4671
|
+
/**
|
|
4672
|
+
* Primitive return types should be used
|
|
4673
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4324/javascript
|
|
4674
|
+
*/
|
|
4675
|
+
'sonar/no-return-type-any'?: Linter.RuleEntry<[]>
|
|
4676
|
+
/**
|
|
4677
|
+
* Assertions should not be given twice the same argument
|
|
4678
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5863/javascript
|
|
4679
|
+
*/
|
|
4680
|
+
'sonar/no-same-argument-assert'?: Linter.RuleEntry<SonarNoSameArgumentAssert>
|
|
3879
4681
|
/**
|
|
3880
4682
|
* Conditionals should start on new lines
|
|
3881
|
-
* @see https://github.
|
|
4683
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3972/javascript
|
|
3882
4684
|
*/
|
|
3883
4685
|
'sonar/no-same-line-conditional'?: Linter.RuleEntry<SonarNoSameLineConditional>
|
|
3884
4686
|
/**
|
|
3885
|
-
*
|
|
3886
|
-
* @see https://github.
|
|
4687
|
+
* Methods should not contain selector parameters
|
|
4688
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2301/javascript
|
|
4689
|
+
*/
|
|
4690
|
+
'sonar/no-selector-parameter'?: Linter.RuleEntry<SonarNoSelectorParameter>
|
|
4691
|
+
/**
|
|
4692
|
+
* Tests should not be skipped without providing a reason
|
|
4693
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1607/javascript
|
|
4694
|
+
*/
|
|
4695
|
+
'sonar/no-skipped-tests'?: Linter.RuleEntry<[]>
|
|
4696
|
+
/**
|
|
4697
|
+
* "if" statements should be preferred over "switch" when simpler
|
|
4698
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1301/javascript
|
|
3887
4699
|
*/
|
|
3888
4700
|
'sonar/no-small-switch'?: Linter.RuleEntry<[]>
|
|
3889
4701
|
/**
|
|
3890
|
-
*
|
|
3891
|
-
* @see https://github.
|
|
4702
|
+
* Track uses of "NOSONAR" comments
|
|
4703
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1291/javascript
|
|
4704
|
+
*/
|
|
4705
|
+
'sonar/no-sonar-comments'?: Linter.RuleEntry<[]>
|
|
4706
|
+
/**
|
|
4707
|
+
* Tabulation characters should not be used
|
|
4708
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S105/javascript
|
|
4709
|
+
* @deprecated
|
|
4710
|
+
*/
|
|
4711
|
+
'sonar/no-tab'?: Linter.RuleEntry<[]>
|
|
4712
|
+
/**
|
|
4713
|
+
* HTML "<table>" should not be used for layout purposes
|
|
4714
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5257/javascript
|
|
4715
|
+
*/
|
|
4716
|
+
'sonar/no-table-as-layout'?: Linter.RuleEntry<[]>
|
|
4717
|
+
/**
|
|
4718
|
+
* Promise rejections should not be caught by "try" blocks
|
|
4719
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4822/javascript
|
|
4720
|
+
*/
|
|
4721
|
+
'sonar/no-try-promise'?: Linter.RuleEntry<SonarNoTryPromise>
|
|
4722
|
+
/**
|
|
4723
|
+
* "undefined" should not be passed as the value of optional parameters
|
|
4724
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4623/javascript
|
|
4725
|
+
*/
|
|
4726
|
+
'sonar/no-undefined-argument'?: Linter.RuleEntry<[]>
|
|
4727
|
+
/**
|
|
4728
|
+
* "undefined" should not be assigned
|
|
4729
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2138/javascript
|
|
4730
|
+
*/
|
|
4731
|
+
'sonar/no-undefined-assignment'?: Linter.RuleEntry<[]>
|
|
4732
|
+
/**
|
|
4733
|
+
* Multiline blocks should be enclosed in curly braces
|
|
4734
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2681/javascript
|
|
4735
|
+
*/
|
|
4736
|
+
'sonar/no-unenclosed-multiline-block'?: Linter.RuleEntry<[]>
|
|
4737
|
+
/**
|
|
4738
|
+
* JSX list components keys should match up between renders
|
|
4739
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6486/javascript
|
|
4740
|
+
*/
|
|
4741
|
+
'sonar/no-uniq-key'?: Linter.RuleEntry<[]>
|
|
4742
|
+
/**
|
|
4743
|
+
* Expanding archive files without controlling resource consumption is security-sensitive
|
|
4744
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5042/javascript
|
|
4745
|
+
*/
|
|
4746
|
+
'sonar/no-unsafe-unzip'?: Linter.RuleEntry<[]>
|
|
4747
|
+
/**
|
|
4748
|
+
* Errors should not be created without being thrown
|
|
4749
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3984/javascript
|
|
4750
|
+
*/
|
|
4751
|
+
'sonar/no-unthrown-error'?: Linter.RuleEntry<[]>
|
|
4752
|
+
/**
|
|
4753
|
+
* Collection contents should be used
|
|
4754
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4030/javascript
|
|
3892
4755
|
*/
|
|
3893
4756
|
'sonar/no-unused-collection'?: Linter.RuleEntry<[]>
|
|
3894
4757
|
/**
|
|
3895
|
-
*
|
|
3896
|
-
* @see https://github.
|
|
4758
|
+
* Unused function parameters should be removed
|
|
4759
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1172/javascript
|
|
4760
|
+
*/
|
|
4761
|
+
'sonar/no-unused-function-argument'?: Linter.RuleEntry<[]>
|
|
4762
|
+
/**
|
|
4763
|
+
* Unused local variables and functions should be removed
|
|
4764
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1481/javascript
|
|
4765
|
+
*/
|
|
4766
|
+
'sonar/no-unused-vars'?: Linter.RuleEntry<[]>
|
|
4767
|
+
/**
|
|
4768
|
+
* The return value of void functions should not be used
|
|
4769
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3699/javascript
|
|
3897
4770
|
*/
|
|
3898
4771
|
'sonar/no-use-of-empty-return-value'?: Linter.RuleEntry<[]>
|
|
3899
4772
|
/**
|
|
3900
4773
|
* "catch" clauses should do more than rethrow
|
|
3901
|
-
* @see https://github.
|
|
4774
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2737/javascript
|
|
3902
4775
|
*/
|
|
3903
4776
|
'sonar/no-useless-catch'?: Linter.RuleEntry<[]>
|
|
3904
4777
|
/**
|
|
3905
|
-
*
|
|
3906
|
-
* @see https://github.
|
|
4778
|
+
* Values should not be uselessly incremented
|
|
4779
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2123/javascript
|
|
4780
|
+
*/
|
|
4781
|
+
'sonar/no-useless-increment'?: Linter.RuleEntry<[]>
|
|
4782
|
+
/**
|
|
4783
|
+
* Type intersections should use meaningful types
|
|
4784
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4335/javascript
|
|
4785
|
+
*/
|
|
4786
|
+
'sonar/no-useless-intersection'?: Linter.RuleEntry<[]>
|
|
4787
|
+
/**
|
|
4788
|
+
* React state setter function should not be called with its matching state variable
|
|
4789
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6443/javascript
|
|
4790
|
+
*/
|
|
4791
|
+
'sonar/no-useless-react-setstate'?: Linter.RuleEntry<[]>
|
|
4792
|
+
/**
|
|
4793
|
+
* Variables declared with "var" should be declared before they are used
|
|
4794
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1526/javascript
|
|
4795
|
+
*/
|
|
4796
|
+
'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<SonarNoVariableUsageBeforeDeclaration>
|
|
4797
|
+
/**
|
|
4798
|
+
* Disabling Vue.js built-in escaping is security-sensitive
|
|
4799
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6299/javascript
|
|
4800
|
+
* @deprecated
|
|
4801
|
+
*/
|
|
4802
|
+
'sonar/no-vue-bypass-sanitization'?: Linter.RuleEntry<[]>
|
|
4803
|
+
/**
|
|
4804
|
+
* Cipher algorithms should be robust
|
|
4805
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5547/javascript
|
|
4806
|
+
*/
|
|
4807
|
+
'sonar/no-weak-cipher'?: Linter.RuleEntry<[]>
|
|
4808
|
+
/**
|
|
4809
|
+
* Cryptographic keys should be robust
|
|
4810
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4426/javascript
|
|
4811
|
+
*/
|
|
4812
|
+
'sonar/no-weak-keys'?: Linter.RuleEntry<[]>
|
|
4813
|
+
/**
|
|
4814
|
+
* Wildcard imports should not be used
|
|
4815
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2208/javascript
|
|
4816
|
+
*/
|
|
4817
|
+
'sonar/no-wildcard-import'?: Linter.RuleEntry<[]>
|
|
4818
|
+
/**
|
|
4819
|
+
* Non-existent operators '=+', '=-' and '=!' should not be used
|
|
4820
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2757/javascript
|
|
3907
4821
|
*/
|
|
3908
4822
|
'sonar/non-existent-operator'?: Linter.RuleEntry<[]>
|
|
4823
|
+
/**
|
|
4824
|
+
* Arithmetic operators should only have numbers as operands
|
|
4825
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3760/javascript
|
|
4826
|
+
*/
|
|
4827
|
+
'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<SonarNonNumberInArithmeticExpression>
|
|
4828
|
+
/**
|
|
4829
|
+
* Properties of variables with "null" or "undefined" values should not be accessed
|
|
4830
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2259/javascript
|
|
4831
|
+
*/
|
|
4832
|
+
'sonar/null-dereference'?: Linter.RuleEntry<[]>
|
|
4833
|
+
/**
|
|
4834
|
+
* "<object>" tags should provide an alternative content
|
|
4835
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5264/javascript
|
|
4836
|
+
*/
|
|
4837
|
+
'sonar/object-alt-content'?: Linter.RuleEntry<[]>
|
|
4838
|
+
/**
|
|
4839
|
+
* Arithmetic operations should not result in "NaN"
|
|
4840
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3757/javascript
|
|
4841
|
+
*/
|
|
4842
|
+
'sonar/operation-returning-nan'?: Linter.RuleEntry<[]>
|
|
4843
|
+
/**
|
|
4844
|
+
* Using shell interpreter when executing OS commands is security-sensitive
|
|
4845
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4721/javascript
|
|
4846
|
+
*/
|
|
4847
|
+
'sonar/os-command'?: Linter.RuleEntry<[]>
|
|
4848
|
+
/**
|
|
4849
|
+
* Origins should be verified during cross-origin communications
|
|
4850
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2819/javascript
|
|
4851
|
+
*/
|
|
4852
|
+
'sonar/post-message'?: Linter.RuleEntry<[]>
|
|
4853
|
+
/**
|
|
4854
|
+
* "default" clauses should be last
|
|
4855
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4524/javascript
|
|
4856
|
+
*/
|
|
4857
|
+
'sonar/prefer-default-last'?: Linter.RuleEntry<[]>
|
|
3909
4858
|
/**
|
|
3910
4859
|
* Local variables should not be declared and then immediately returned or thrown
|
|
3911
|
-
* @see https://github.
|
|
4860
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1488/javascript
|
|
3912
4861
|
*/
|
|
3913
4862
|
'sonar/prefer-immediate-return'?: Linter.RuleEntry<[]>
|
|
3914
4863
|
/**
|
|
3915
4864
|
* Object literal syntax should be used
|
|
3916
|
-
* @see https://github.
|
|
4865
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2428/javascript
|
|
3917
4866
|
*/
|
|
3918
4867
|
'sonar/prefer-object-literal'?: Linter.RuleEntry<[]>
|
|
4868
|
+
/**
|
|
4869
|
+
* Shorthand promises should be used
|
|
4870
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4634/javascript
|
|
4871
|
+
*/
|
|
4872
|
+
'sonar/prefer-promise-shorthand'?: Linter.RuleEntry<[]>
|
|
4873
|
+
/**
|
|
4874
|
+
* React props should be read-only
|
|
4875
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6759/javascript
|
|
4876
|
+
*/
|
|
4877
|
+
'sonar/prefer-read-only-props'?: Linter.RuleEntry<[]>
|
|
4878
|
+
/**
|
|
4879
|
+
* "RegExp.exec()" should be preferred over "String.match()"
|
|
4880
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6594/javascript
|
|
4881
|
+
*/
|
|
4882
|
+
'sonar/prefer-regexp-exec'?: Linter.RuleEntry<[]>
|
|
3919
4883
|
/**
|
|
3920
4884
|
* Return of boolean expressions should not be wrapped into an "if-then-else" statement
|
|
3921
|
-
* @see https://github.
|
|
4885
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1126/javascript
|
|
3922
4886
|
*/
|
|
3923
4887
|
'sonar/prefer-single-boolean-return'?: Linter.RuleEntry<[]>
|
|
4888
|
+
/**
|
|
4889
|
+
* Type predicates should be used
|
|
4890
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4322/javascript
|
|
4891
|
+
*/
|
|
4892
|
+
'sonar/prefer-type-guard'?: Linter.RuleEntry<[]>
|
|
3924
4893
|
/**
|
|
3925
4894
|
* A "while" loop should be used instead of a "for" loop
|
|
3926
|
-
* @see https://github.
|
|
4895
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1264/javascript
|
|
3927
4896
|
*/
|
|
3928
4897
|
'sonar/prefer-while'?: Linter.RuleEntry<[]>
|
|
4898
|
+
/**
|
|
4899
|
+
* Using command line arguments is security-sensitive
|
|
4900
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4823/javascript
|
|
4901
|
+
* @deprecated
|
|
4902
|
+
*/
|
|
4903
|
+
'sonar/process-argv'?: Linter.RuleEntry<[]>
|
|
4904
|
+
/**
|
|
4905
|
+
* Delivering code in production with debug features activated is security-sensitive
|
|
4906
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4507/javascript
|
|
4907
|
+
*/
|
|
4908
|
+
'sonar/production-debug'?: Linter.RuleEntry<[]>
|
|
4909
|
+
/**
|
|
4910
|
+
* Using pseudorandom number generators (PRNGs) is security-sensitive
|
|
4911
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2245/javascript
|
|
4912
|
+
*/
|
|
4913
|
+
'sonar/pseudo-random'?: Linter.RuleEntry<[]>
|
|
4914
|
+
/**
|
|
4915
|
+
* Public "static" fields should be read-only
|
|
4916
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1444/javascript
|
|
4917
|
+
*/
|
|
4918
|
+
'sonar/public-static-readonly'?: Linter.RuleEntry<[]>
|
|
4919
|
+
/**
|
|
4920
|
+
* Using publicly writable directories is security-sensitive
|
|
4921
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5443/javascript
|
|
4922
|
+
*/
|
|
4923
|
+
'sonar/publicly-writable-directories'?: Linter.RuleEntry<[]>
|
|
4924
|
+
/**
|
|
4925
|
+
* "Array.reduce()" calls should include an initial value
|
|
4926
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6959/javascript
|
|
4927
|
+
*/
|
|
4928
|
+
'sonar/reduce-initial-value'?: Linter.RuleEntry<[]>
|
|
4929
|
+
/**
|
|
4930
|
+
* Redundant type aliases should not be used
|
|
4931
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6564/javascript
|
|
4932
|
+
*/
|
|
4933
|
+
'sonar/redundant-type-aliases'?: Linter.RuleEntry<[]>
|
|
4934
|
+
/**
|
|
4935
|
+
* Regular expressions should not be too complicated
|
|
4936
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5843/javascript
|
|
4937
|
+
*/
|
|
4938
|
+
'sonar/regex-complexity'?: Linter.RuleEntry<SonarRegexComplexity>
|
|
4939
|
+
/**
|
|
4940
|
+
* Using regular expressions is security-sensitive
|
|
4941
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4784/javascript
|
|
4942
|
+
* @deprecated
|
|
4943
|
+
*/
|
|
4944
|
+
'sonar/regular-expr'?: Linter.RuleEntry<[]>
|
|
4945
|
+
/**
|
|
4946
|
+
* A new session should be created during user authentication
|
|
4947
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5876/javascript
|
|
4948
|
+
*/
|
|
4949
|
+
'sonar/session-regeneration'?: Linter.RuleEntry<[]>
|
|
4950
|
+
/**
|
|
4951
|
+
* Shorthand object properties should be grouped at the beginning or end of an object declaration
|
|
4952
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3499/javascript
|
|
4953
|
+
*/
|
|
4954
|
+
'sonar/shorthand-property-grouping'?: Linter.RuleEntry<SonarShorthandPropertyGrouping>
|
|
4955
|
+
/**
|
|
4956
|
+
* Character classes in regular expressions should not contain only one character
|
|
4957
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6397/javascript
|
|
4958
|
+
*/
|
|
4959
|
+
'sonar/single-char-in-character-classes'?: Linter.RuleEntry<[]>
|
|
4960
|
+
/**
|
|
4961
|
+
* Single-character alternations in regular expressions should be replaced with character classes
|
|
4962
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6035/javascript
|
|
4963
|
+
*/
|
|
4964
|
+
'sonar/single-character-alternation'?: Linter.RuleEntry<[]>
|
|
4965
|
+
/**
|
|
4966
|
+
* Using slow regular expressions is security-sensitive
|
|
4967
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5852/javascript
|
|
4968
|
+
*/
|
|
4969
|
+
'sonar/slow-regex'?: Linter.RuleEntry<[]>
|
|
4970
|
+
/**
|
|
4971
|
+
* Using Sockets is security-sensitive
|
|
4972
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4818/javascript
|
|
4973
|
+
* @deprecated
|
|
4974
|
+
*/
|
|
4975
|
+
'sonar/sockets'?: Linter.RuleEntry<[]>
|
|
4976
|
+
/**
|
|
4977
|
+
* Formatting SQL queries is security-sensitive
|
|
4978
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2077/javascript
|
|
4979
|
+
*/
|
|
4980
|
+
'sonar/sql-queries'?: Linter.RuleEntry<[]>
|
|
4981
|
+
/**
|
|
4982
|
+
* Tests should be stable
|
|
4983
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5973/javascript
|
|
4984
|
+
*/
|
|
4985
|
+
'sonar/stable-tests'?: Linter.RuleEntry<[]>
|
|
4986
|
+
/**
|
|
4987
|
+
* Reading the Standard Input is security-sensitive
|
|
4988
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4829/javascript
|
|
4989
|
+
* @deprecated
|
|
4990
|
+
*/
|
|
4991
|
+
'sonar/standard-input'?: Linter.RuleEntry<[]>
|
|
4992
|
+
/**
|
|
4993
|
+
* Regular expressions with the global flag should be used with caution
|
|
4994
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S6351/javascript
|
|
4995
|
+
*/
|
|
4996
|
+
'sonar/stateful-regex'?: Linter.RuleEntry<SonarStatefulRegex>
|
|
4997
|
+
/**
|
|
4998
|
+
* Disabling Strict-Transport-Security policy is security-sensitive
|
|
4999
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5739/javascript
|
|
5000
|
+
*/
|
|
5001
|
+
'sonar/strict-transport-security'?: Linter.RuleEntry<SonarStrictTransportSecurity>
|
|
5002
|
+
/**
|
|
5003
|
+
* Comparison operators should not be used with strings
|
|
5004
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3003/javascript
|
|
5005
|
+
*/
|
|
5006
|
+
'sonar/strings-comparison'?: Linter.RuleEntry<SonarStringsComparison>
|
|
5007
|
+
/**
|
|
5008
|
+
* "super()" should be invoked appropriately
|
|
5009
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3854/javascript
|
|
5010
|
+
*/
|
|
5011
|
+
'sonar/super-invocation'?: Linter.RuleEntry<[]>
|
|
5012
|
+
/**
|
|
5013
|
+
* Tables should have headers
|
|
5014
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5256/javascript
|
|
5015
|
+
*/
|
|
5016
|
+
'sonar/table-header'?: Linter.RuleEntry<[]>
|
|
5017
|
+
/**
|
|
5018
|
+
* Table cells should reference their headers
|
|
5019
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5260/javascript
|
|
5020
|
+
*/
|
|
5021
|
+
'sonar/table-header-reference'?: Linter.RuleEntry<[]>
|
|
5022
|
+
/**
|
|
5023
|
+
* Tests should check which exception is thrown
|
|
5024
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5958/javascript
|
|
5025
|
+
*/
|
|
5026
|
+
'sonar/test-check-exception'?: Linter.RuleEntry<[]>
|
|
5027
|
+
/**
|
|
5028
|
+
* Track uses of "TODO" tags
|
|
5029
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1135/javascript
|
|
5030
|
+
*/
|
|
5031
|
+
'sonar/todo-tag'?: Linter.RuleEntry<[]>
|
|
5032
|
+
/**
|
|
5033
|
+
* Loops should not contain more than a single "break" or "continue" statement
|
|
5034
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S135/javascript
|
|
5035
|
+
*/
|
|
5036
|
+
'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<SonarTooManyBreakOrContinueInLoop>
|
|
5037
|
+
/**
|
|
5038
|
+
* Regular expressions using Unicode character classes or property escapes should enable the unicode flag
|
|
5039
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5867/javascript
|
|
5040
|
+
*/
|
|
5041
|
+
'sonar/unicode-aware-regex'?: Linter.RuleEntry<SonarUnicodeAwareRegex>
|
|
5042
|
+
/**
|
|
5043
|
+
* Unnecessary imports should be removed
|
|
5044
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1128/javascript
|
|
5045
|
+
*/
|
|
5046
|
+
'sonar/unused-import'?: Linter.RuleEntry<[]>
|
|
5047
|
+
/**
|
|
5048
|
+
* Names of regular expressions named groups should be used
|
|
5049
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5860/javascript
|
|
5050
|
+
*/
|
|
5051
|
+
'sonar/unused-named-groups'?: Linter.RuleEntry<SonarUnusedNamedGroups>
|
|
5052
|
+
/**
|
|
5053
|
+
* Server certificates should be verified during SSL/TLS connections
|
|
5054
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4830/javascript
|
|
5055
|
+
*/
|
|
5056
|
+
'sonar/unverified-certificate'?: Linter.RuleEntry<SonarUnverifiedCertificate>
|
|
5057
|
+
/**
|
|
5058
|
+
* Server hostnames should be verified during SSL/TLS connections
|
|
5059
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5527/javascript
|
|
5060
|
+
*/
|
|
5061
|
+
'sonar/unverified-hostname'?: Linter.RuleEntry<SonarUnverifiedHostname>
|
|
5062
|
+
/**
|
|
5063
|
+
* "const" variables should not be reassigned
|
|
5064
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3500/javascript
|
|
5065
|
+
*/
|
|
5066
|
+
'sonar/updated-const-var'?: Linter.RuleEntry<SonarUpdatedConstVar>
|
|
5067
|
+
/**
|
|
5068
|
+
* Loop counters should not be assigned within the loop body
|
|
5069
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2310/javascript
|
|
5070
|
+
*/
|
|
5071
|
+
'sonar/updated-loop-counter'?: Linter.RuleEntry<SonarUpdatedLoopCounter>
|
|
5072
|
+
/**
|
|
5073
|
+
* Type aliases should be used
|
|
5074
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4323/javascript
|
|
5075
|
+
*/
|
|
5076
|
+
'sonar/use-type-alias'?: Linter.RuleEntry<SonarUseTypeAlias>
|
|
5077
|
+
/**
|
|
5078
|
+
* Results of operations on strings should not be ignored
|
|
5079
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S1154/javascript
|
|
5080
|
+
* @deprecated
|
|
5081
|
+
*/
|
|
5082
|
+
'sonar/useless-string-operation'?: Linter.RuleEntry<[]>
|
|
5083
|
+
/**
|
|
5084
|
+
* Values not convertible to numbers should not be used in numeric comparisons
|
|
5085
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3758/javascript
|
|
5086
|
+
*/
|
|
5087
|
+
'sonar/values-not-convertible-to-numbers'?: Linter.RuleEntry<[]>
|
|
5088
|
+
/**
|
|
5089
|
+
* Variable, property and parameter names should comply with a naming convention
|
|
5090
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S117/javascript
|
|
5091
|
+
*/
|
|
5092
|
+
'sonar/variable-name'?: Linter.RuleEntry<SonarVariableName>
|
|
5093
|
+
/**
|
|
5094
|
+
* "void" should not be used
|
|
5095
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S3735/javascript
|
|
5096
|
+
*/
|
|
5097
|
+
'sonar/void-use'?: Linter.RuleEntry<[]>
|
|
5098
|
+
/**
|
|
5099
|
+
* Weak SSL/TLS protocols should not be used
|
|
5100
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4423/javascript
|
|
5101
|
+
*/
|
|
5102
|
+
'sonar/weak-ssl'?: Linter.RuleEntry<[]>
|
|
5103
|
+
/**
|
|
5104
|
+
* Web SQL databases should not be used
|
|
5105
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2817/javascript
|
|
5106
|
+
* @deprecated
|
|
5107
|
+
*/
|
|
5108
|
+
'sonar/web-sql-database'?: Linter.RuleEntry<[]>
|
|
5109
|
+
/**
|
|
5110
|
+
* Disclosing fingerprints from web application technologies is security-sensitive
|
|
5111
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S5689/javascript
|
|
5112
|
+
*/
|
|
5113
|
+
'sonar/x-powered-by'?: Linter.RuleEntry<[]>
|
|
5114
|
+
/**
|
|
5115
|
+
* XML parsers should not be vulnerable to XXE attacks
|
|
5116
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S2755/javascript
|
|
5117
|
+
*/
|
|
5118
|
+
'sonar/xml-parser-xxe'?: Linter.RuleEntry<SonarXmlParserXxe>
|
|
5119
|
+
/**
|
|
5120
|
+
* Executing XPath expressions is security-sensitive
|
|
5121
|
+
* @see https://sonarsource.github.io/rspec/#/rspec/S4817/javascript
|
|
5122
|
+
* @deprecated
|
|
5123
|
+
*/
|
|
5124
|
+
'sonar/xpath'?: Linter.RuleEntry<[]>
|
|
3929
5125
|
/**
|
|
3930
5126
|
* Enforce sorted import declarations within modules
|
|
3931
5127
|
* @see https://eslint.org/docs/latest/rules/sort-imports
|
|
@@ -11456,38 +12652,270 @@ type SolidStyleProp = []|[{
|
|
|
11456
12652
|
|
|
11457
12653
|
allowString?: boolean
|
|
11458
12654
|
}]
|
|
12655
|
+
// ----- sonar/arguments-order -----
|
|
12656
|
+
type SonarArgumentsOrder = []|[("sonar-runtime" | "metric")]
|
|
12657
|
+
// ----- sonar/arguments-usage -----
|
|
12658
|
+
type SonarArgumentsUsage = []|[("sonar-runtime" | "metric")]
|
|
12659
|
+
// ----- sonar/arrow-function-convention -----
|
|
12660
|
+
type SonarArrowFunctionConvention = []|[{
|
|
12661
|
+
requireParameterParentheses?: boolean
|
|
12662
|
+
requireBodyBraces?: boolean
|
|
12663
|
+
}]
|
|
12664
|
+
// ----- sonar/aws-iam-all-privileges -----
|
|
12665
|
+
type SonarAwsIamAllPrivileges = []|[("sonar-runtime" | "metric")]
|
|
12666
|
+
// ----- sonar/aws-iam-all-resources-accessible -----
|
|
12667
|
+
type SonarAwsIamAllResourcesAccessible = []|[("sonar-runtime" | "metric")]
|
|
12668
|
+
// ----- sonar/aws-iam-privilege-escalation -----
|
|
12669
|
+
type SonarAwsIamPrivilegeEscalation = []|[("sonar-runtime" | "metric")]
|
|
12670
|
+
// ----- sonar/aws-iam-public-access -----
|
|
12671
|
+
type SonarAwsIamPublicAccess = []|[("sonar-runtime" | "metric")]
|
|
12672
|
+
// ----- sonar/aws-s3-bucket-granted-access -----
|
|
12673
|
+
type SonarAwsS3BucketGrantedAccess = []|[("sonar-runtime" | "metric")]
|
|
12674
|
+
// ----- sonar/aws-s3-bucket-public-access -----
|
|
12675
|
+
type SonarAwsS3BucketPublicAccess = []|[("sonar-runtime" | "metric")]
|
|
12676
|
+
// ----- sonar/aws-s3-bucket-server-encryption -----
|
|
12677
|
+
type SonarAwsS3BucketServerEncryption = []|[("sonar-runtime" | "metric")]
|
|
12678
|
+
// ----- sonar/aws-s3-bucket-versioning -----
|
|
12679
|
+
type SonarAwsS3BucketVersioning = []|[("sonar-runtime" | "metric")]
|
|
12680
|
+
// ----- sonar/block-scoped-var -----
|
|
12681
|
+
type SonarBlockScopedVar = []|[("sonar-runtime" | "metric")]
|
|
12682
|
+
// ----- sonar/certificate-transparency -----
|
|
12683
|
+
type SonarCertificateTransparency = []|[("sonar-runtime" | "metric")]
|
|
12684
|
+
// ----- sonar/class-name -----
|
|
12685
|
+
type SonarClassName = []|[{
|
|
12686
|
+
format?: string
|
|
12687
|
+
}]
|
|
11459
12688
|
// ----- sonar/cognitive-complexity -----
|
|
11460
12689
|
type SonarCognitiveComplexity = []|[number]|[number, ("sonar-runtime" | "metric")]
|
|
12690
|
+
// ----- sonar/comment-regex -----
|
|
12691
|
+
type SonarCommentRegex = []|[{
|
|
12692
|
+
regularExpression?: string
|
|
12693
|
+
message?: string
|
|
12694
|
+
flags?: string
|
|
12695
|
+
}]
|
|
12696
|
+
// ----- sonar/conditional-indentation -----
|
|
12697
|
+
type SonarConditionalIndentation = []|[("sonar-runtime" | "metric")]
|
|
12698
|
+
// ----- sonar/confidential-information-logging -----
|
|
12699
|
+
type SonarConfidentialInformationLogging = []|[("sonar-runtime" | "metric")]
|
|
12700
|
+
// ----- sonar/content-length -----
|
|
12701
|
+
type SonarContentLength = []|[{
|
|
12702
|
+
fileUploadSizeLimit?: number
|
|
12703
|
+
standardSizeLimit?: number
|
|
12704
|
+
}]
|
|
12705
|
+
// ----- sonar/content-security-policy -----
|
|
12706
|
+
type SonarContentSecurityPolicy = []|[("sonar-runtime" | "metric")]
|
|
12707
|
+
// ----- sonar/cookie-no-httponly -----
|
|
12708
|
+
type SonarCookieNoHttponly = []|[("sonar-runtime" | "metric")]
|
|
12709
|
+
// ----- sonar/cors -----
|
|
12710
|
+
type SonarCors = []|[("sonar-runtime" | "metric")]
|
|
12711
|
+
// ----- sonar/csrf -----
|
|
12712
|
+
type SonarCsrf = []|[("sonar-runtime" | "metric")]
|
|
12713
|
+
// ----- sonar/cyclomatic-complexity -----
|
|
12714
|
+
type SonarCyclomaticComplexity = []|[{
|
|
12715
|
+
threshold?: number
|
|
12716
|
+
}]|[{
|
|
12717
|
+
threshold?: number
|
|
12718
|
+
}, ("sonar-runtime" | "metric")]
|
|
12719
|
+
// ----- sonar/destructuring-assignment-syntax -----
|
|
12720
|
+
type SonarDestructuringAssignmentSyntax = []|[("sonar-runtime" | "metric")]
|
|
12721
|
+
// ----- sonar/different-types-comparison -----
|
|
12722
|
+
type SonarDifferentTypesComparison = []|[("sonar-runtime" | "metric")]
|
|
12723
|
+
// ----- sonar/disabled-auto-escaping -----
|
|
12724
|
+
type SonarDisabledAutoEscaping = []|[("sonar-runtime" | "metric")]
|
|
12725
|
+
// ----- sonar/dns-prefetching -----
|
|
12726
|
+
type SonarDnsPrefetching = []|[("sonar-runtime" | "metric")]
|
|
12727
|
+
// ----- sonar/duplicates-in-character-class -----
|
|
12728
|
+
type SonarDuplicatesInCharacterClass = []|[("sonar-runtime" | "metric")]
|
|
12729
|
+
// ----- sonar/enforce-trailing-comma -----
|
|
12730
|
+
type SonarEnforceTrailingComma = []|[(_SonarEnforceTrailingCommaValue | {
|
|
12731
|
+
arrays?: _SonarEnforceTrailingCommaValueWithIgnore
|
|
12732
|
+
objects?: _SonarEnforceTrailingCommaValueWithIgnore
|
|
12733
|
+
imports?: _SonarEnforceTrailingCommaValueWithIgnore
|
|
12734
|
+
exports?: _SonarEnforceTrailingCommaValueWithIgnore
|
|
12735
|
+
functions?: _SonarEnforceTrailingCommaValueWithIgnore
|
|
12736
|
+
})]
|
|
12737
|
+
type _SonarEnforceTrailingCommaValue = ("always-multiline" | "always" | "never" | "only-multiline")
|
|
12738
|
+
type _SonarEnforceTrailingCommaValueWithIgnore = ("always-multiline" | "always" | "ignore" | "never" | "only-multiline")
|
|
12739
|
+
// ----- sonar/expression-complexity -----
|
|
12740
|
+
type SonarExpressionComplexity = []|[{
|
|
12741
|
+
max?: number
|
|
12742
|
+
}]|[{
|
|
12743
|
+
max?: number
|
|
12744
|
+
}, ("sonar-runtime" | "metric")]
|
|
12745
|
+
// ----- sonar/file-header -----
|
|
12746
|
+
type SonarFileHeader = []|[{
|
|
12747
|
+
headerFormat?: string
|
|
12748
|
+
isRegularExpression?: boolean
|
|
12749
|
+
}]
|
|
12750
|
+
// ----- sonar/file-uploads -----
|
|
12751
|
+
type SonarFileUploads = []|[("sonar-runtime" | "metric")]
|
|
12752
|
+
// ----- sonar/for-loop-increment-sign -----
|
|
12753
|
+
type SonarForLoopIncrementSign = []|[("sonar-runtime" | "metric")]
|
|
12754
|
+
// ----- sonar/frame-ancestors -----
|
|
12755
|
+
type SonarFrameAncestors = []|[("sonar-runtime" | "metric")]
|
|
12756
|
+
// ----- sonar/function-inside-loop -----
|
|
12757
|
+
type SonarFunctionInsideLoop = []|[("sonar-runtime" | "metric")]
|
|
12758
|
+
// ----- sonar/function-name -----
|
|
12759
|
+
type SonarFunctionName = []|[{
|
|
12760
|
+
format?: string
|
|
12761
|
+
}]
|
|
12762
|
+
// ----- sonar/function-return-type -----
|
|
12763
|
+
type SonarFunctionReturnType = []|[("sonar-runtime" | "metric")]
|
|
12764
|
+
// ----- sonar/in-operator-type-error -----
|
|
12765
|
+
type SonarInOperatorTypeError = []|[("sonar-runtime" | "metric")]
|
|
12766
|
+
// ----- sonar/inconsistent-function-call -----
|
|
12767
|
+
type SonarInconsistentFunctionCall = []|[("sonar-runtime" | "metric")]
|
|
12768
|
+
// ----- sonar/insecure-cookie -----
|
|
12769
|
+
type SonarInsecureCookie = []|[("sonar-runtime" | "metric")]
|
|
12770
|
+
// ----- sonar/insecure-jwt-token -----
|
|
12771
|
+
type SonarInsecureJwtToken = []|[("sonar-runtime" | "metric")]
|
|
12772
|
+
// ----- sonar/inverted-assertion-arguments -----
|
|
12773
|
+
type SonarInvertedAssertionArguments = []|[("sonar-runtime" | "metric")]
|
|
12774
|
+
// ----- sonar/max-lines -----
|
|
12775
|
+
type SonarMaxLines = []|[{
|
|
12776
|
+
maximum?: number
|
|
12777
|
+
}]
|
|
12778
|
+
// ----- sonar/max-lines-per-function -----
|
|
12779
|
+
type SonarMaxLinesPerFunction = []|[{
|
|
12780
|
+
maximum?: number
|
|
12781
|
+
}]
|
|
11461
12782
|
// ----- sonar/max-switch-cases -----
|
|
11462
12783
|
type SonarMaxSwitchCases = []|[number]
|
|
12784
|
+
// ----- sonar/max-union-size -----
|
|
12785
|
+
type SonarMaxUnionSize = []|[{
|
|
12786
|
+
threshold?: number
|
|
12787
|
+
}]
|
|
12788
|
+
// ----- sonar/nested-control-flow -----
|
|
12789
|
+
type SonarNestedControlFlow = []|[{
|
|
12790
|
+
maximumNestingLevel?: number
|
|
12791
|
+
}]|[{
|
|
12792
|
+
maximumNestingLevel?: number
|
|
12793
|
+
}, ("sonar-runtime" | "metric")]
|
|
12794
|
+
// ----- sonar/new-operator-misuse -----
|
|
12795
|
+
type SonarNewOperatorMisuse = []|[{
|
|
12796
|
+
considerJSDoc?: boolean
|
|
12797
|
+
}]|[{
|
|
12798
|
+
considerJSDoc?: boolean
|
|
12799
|
+
}, unknown]
|
|
12800
|
+
// ----- sonar/no-code-after-done -----
|
|
12801
|
+
type SonarNoCodeAfterDone = []|[("sonar-runtime" | "metric")]
|
|
11463
12802
|
// ----- sonar/no-collapsible-if -----
|
|
11464
|
-
type SonarNoCollapsibleIf = []|["sonar-runtime"]
|
|
12803
|
+
type SonarNoCollapsibleIf = []|[("sonar-runtime" | "metric")]
|
|
12804
|
+
// ----- sonar/no-duplicate-in-composite -----
|
|
12805
|
+
type SonarNoDuplicateInComposite = []|[("sonar-runtime" | "metric")]
|
|
11465
12806
|
// ----- sonar/no-duplicate-string -----
|
|
11466
12807
|
type SonarNoDuplicateString = []|[{
|
|
11467
12808
|
threshold?: number
|
|
11468
12809
|
ignoreStrings?: string
|
|
11469
|
-
[k: string]: unknown | undefined
|
|
11470
12810
|
}]|[{
|
|
11471
12811
|
threshold?: number
|
|
11472
12812
|
ignoreStrings?: string
|
|
11473
|
-
|
|
11474
|
-
}, "sonar-runtime"]
|
|
12813
|
+
}, ("sonar-runtime" | "metric")]
|
|
11475
12814
|
// ----- sonar/no-duplicated-branches -----
|
|
11476
|
-
type SonarNoDuplicatedBranches = []|["sonar-runtime"]
|
|
12815
|
+
type SonarNoDuplicatedBranches = []|[("sonar-runtime" | "metric")]
|
|
11477
12816
|
// ----- sonar/no-element-overwrite -----
|
|
11478
|
-
type SonarNoElementOverwrite = []|["sonar-runtime"]
|
|
12817
|
+
type SonarNoElementOverwrite = []|[("sonar-runtime" | "metric")]
|
|
11479
12818
|
// ----- sonar/no-extra-arguments -----
|
|
11480
|
-
type SonarNoExtraArguments = []|["sonar-runtime"]
|
|
12819
|
+
type SonarNoExtraArguments = []|[("sonar-runtime" | "metric")]
|
|
11481
12820
|
// ----- sonar/no-gratuitous-expressions -----
|
|
11482
|
-
type SonarNoGratuitousExpressions = []|["sonar-runtime"]
|
|
12821
|
+
type SonarNoGratuitousExpressions = []|[("sonar-runtime" | "metric")]
|
|
12822
|
+
// ----- sonar/no-hardcoded-passwords -----
|
|
12823
|
+
type SonarNoHardcodedPasswords = []|[{
|
|
12824
|
+
passwordWords?: string[]
|
|
12825
|
+
}]
|
|
12826
|
+
// ----- sonar/no-hardcoded-secrets -----
|
|
12827
|
+
type SonarNoHardcodedSecrets = []|[{
|
|
12828
|
+
secretWords?: string
|
|
12829
|
+
randomnessSensibility?: number
|
|
12830
|
+
}]
|
|
11483
12831
|
// ----- sonar/no-identical-conditions -----
|
|
11484
|
-
type SonarNoIdenticalConditions = []|["sonar-runtime"]
|
|
12832
|
+
type SonarNoIdenticalConditions = []|[("sonar-runtime" | "metric")]
|
|
11485
12833
|
// ----- sonar/no-identical-expressions -----
|
|
11486
|
-
type SonarNoIdenticalExpressions = []|["sonar-runtime"]
|
|
12834
|
+
type SonarNoIdenticalExpressions = []|[("sonar-runtime" | "metric")]
|
|
11487
12835
|
// ----- sonar/no-identical-functions -----
|
|
11488
|
-
type SonarNoIdenticalFunctions = []|[number]|[number, "sonar-runtime"]
|
|
12836
|
+
type SonarNoIdenticalFunctions = []|[number]|[number, ("sonar-runtime" | "metric")]
|
|
12837
|
+
// ----- sonar/no-implicit-dependencies -----
|
|
12838
|
+
type SonarNoImplicitDependencies = []|[{
|
|
12839
|
+
whitelist?: string[]
|
|
12840
|
+
}]
|
|
12841
|
+
// ----- sonar/no-inconsistent-returns -----
|
|
12842
|
+
type SonarNoInconsistentReturns = []|[("sonar-runtime" | "metric")]
|
|
12843
|
+
// ----- sonar/no-incorrect-string-concat -----
|
|
12844
|
+
type SonarNoIncorrectStringConcat = []|[("sonar-runtime" | "metric")]
|
|
12845
|
+
// ----- sonar/no-intrusive-permissions -----
|
|
12846
|
+
type SonarNoIntrusivePermissions = []|[{
|
|
12847
|
+
permissions?: string[]
|
|
12848
|
+
}]
|
|
12849
|
+
// ----- sonar/no-invariant-returns -----
|
|
12850
|
+
type SonarNoInvariantReturns = []|[("sonar-runtime" | "metric")]
|
|
12851
|
+
// ----- sonar/no-ip-forward -----
|
|
12852
|
+
type SonarNoIpForward = []|[("sonar-runtime" | "metric")]
|
|
12853
|
+
// ----- sonar/no-mime-sniff -----
|
|
12854
|
+
type SonarNoMimeSniff = []|[("sonar-runtime" | "metric")]
|
|
12855
|
+
// ----- sonar/no-mixed-content -----
|
|
12856
|
+
type SonarNoMixedContent = []|[("sonar-runtime" | "metric")]
|
|
12857
|
+
// ----- sonar/no-nested-functions -----
|
|
12858
|
+
type SonarNoNestedFunctions = []|[{
|
|
12859
|
+
threshold?: number
|
|
12860
|
+
}]|[{
|
|
12861
|
+
threshold?: number
|
|
12862
|
+
}, ("sonar-runtime" | "metric")]
|
|
12863
|
+
// ----- sonar/no-redundant-optional -----
|
|
12864
|
+
type SonarNoRedundantOptional = []|[("sonar-runtime" | "metric")]
|
|
12865
|
+
// ----- sonar/no-redundant-parentheses -----
|
|
12866
|
+
type SonarNoRedundantParentheses = []|[("sonar-runtime" | "metric")]
|
|
12867
|
+
// ----- sonar/no-reference-error -----
|
|
12868
|
+
type SonarNoReferenceError = []|[("sonar-runtime" | "metric")]
|
|
12869
|
+
// ----- sonar/no-referrer-policy -----
|
|
12870
|
+
type SonarNoReferrerPolicy = []|[("sonar-runtime" | "metric")]
|
|
12871
|
+
// ----- sonar/no-same-argument-assert -----
|
|
12872
|
+
type SonarNoSameArgumentAssert = []|[("sonar-runtime" | "metric")]
|
|
11489
12873
|
// ----- sonar/no-same-line-conditional -----
|
|
11490
|
-
type SonarNoSameLineConditional = []|["sonar-runtime"]
|
|
12874
|
+
type SonarNoSameLineConditional = []|[("sonar-runtime" | "metric")]
|
|
12875
|
+
// ----- sonar/no-selector-parameter -----
|
|
12876
|
+
type SonarNoSelectorParameter = []|[("sonar-runtime" | "metric")]
|
|
12877
|
+
// ----- sonar/no-try-promise -----
|
|
12878
|
+
type SonarNoTryPromise = []|[("sonar-runtime" | "metric")]
|
|
12879
|
+
// ----- sonar/no-variable-usage-before-declaration -----
|
|
12880
|
+
type SonarNoVariableUsageBeforeDeclaration = []|[("sonar-runtime" | "metric")]
|
|
12881
|
+
// ----- sonar/non-number-in-arithmetic-expression -----
|
|
12882
|
+
type SonarNonNumberInArithmeticExpression = []|[("sonar-runtime" | "metric")]
|
|
12883
|
+
// ----- sonar/regex-complexity -----
|
|
12884
|
+
type SonarRegexComplexity = []|[{
|
|
12885
|
+
threshold?: number
|
|
12886
|
+
}]|[{
|
|
12887
|
+
threshold?: number
|
|
12888
|
+
}, ("sonar-runtime" | "metric")]
|
|
12889
|
+
// ----- sonar/shorthand-property-grouping -----
|
|
12890
|
+
type SonarShorthandPropertyGrouping = []|[("sonar-runtime" | "metric")]
|
|
12891
|
+
// ----- sonar/stateful-regex -----
|
|
12892
|
+
type SonarStatefulRegex = []|[("sonar-runtime" | "metric")]
|
|
12893
|
+
// ----- sonar/strict-transport-security -----
|
|
12894
|
+
type SonarStrictTransportSecurity = []|[("sonar-runtime" | "metric")]
|
|
12895
|
+
// ----- sonar/strings-comparison -----
|
|
12896
|
+
type SonarStringsComparison = []|[("sonar-runtime" | "metric")]
|
|
12897
|
+
// ----- sonar/too-many-break-or-continue-in-loop -----
|
|
12898
|
+
type SonarTooManyBreakOrContinueInLoop = []|[("sonar-runtime" | "metric")]
|
|
12899
|
+
// ----- sonar/unicode-aware-regex -----
|
|
12900
|
+
type SonarUnicodeAwareRegex = []|[("sonar-runtime" | "metric")]
|
|
12901
|
+
// ----- sonar/unused-named-groups -----
|
|
12902
|
+
type SonarUnusedNamedGroups = []|[("sonar-runtime" | "metric")]
|
|
12903
|
+
// ----- sonar/unverified-certificate -----
|
|
12904
|
+
type SonarUnverifiedCertificate = []|[("sonar-runtime" | "metric")]
|
|
12905
|
+
// ----- sonar/unverified-hostname -----
|
|
12906
|
+
type SonarUnverifiedHostname = []|[("sonar-runtime" | "metric")]
|
|
12907
|
+
// ----- sonar/updated-const-var -----
|
|
12908
|
+
type SonarUpdatedConstVar = []|[("sonar-runtime" | "metric")]
|
|
12909
|
+
// ----- sonar/updated-loop-counter -----
|
|
12910
|
+
type SonarUpdatedLoopCounter = []|[("sonar-runtime" | "metric")]
|
|
12911
|
+
// ----- sonar/use-type-alias -----
|
|
12912
|
+
type SonarUseTypeAlias = []|[("sonar-runtime" | "metric")]
|
|
12913
|
+
// ----- sonar/variable-name -----
|
|
12914
|
+
type SonarVariableName = []|[{
|
|
12915
|
+
format?: string
|
|
12916
|
+
}]
|
|
12917
|
+
// ----- sonar/xml-parser-xxe -----
|
|
12918
|
+
type SonarXmlParserXxe = []|[("sonar-runtime" | "metric")]
|
|
11491
12919
|
// ----- sort-imports -----
|
|
11492
12920
|
type SortImports = []|[{
|
|
11493
12921
|
ignoreCase?: boolean
|