eslint-plugin-sdl-2 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (418) hide show
  1. package/CHANGELOG.md +5316 -0
  2. package/LICENSE +21 -0
  3. package/README.md +133 -0
  4. package/dist/_internal/ast-utils.d.ts +17 -0
  5. package/dist/_internal/ast-utils.d.ts.map +1 -0
  6. package/dist/_internal/ast-utils.js +93 -0
  7. package/dist/_internal/ast-utils.js.map +1 -0
  8. package/dist/_internal/config-references.d.ts +5 -0
  9. package/dist/_internal/config-references.d.ts.map +1 -0
  10. package/dist/_internal/config-references.js +13 -0
  11. package/dist/_internal/config-references.js.map +1 -0
  12. package/dist/_internal/create-rule.d.ts +9 -0
  13. package/dist/_internal/create-rule.d.ts.map +1 -0
  14. package/dist/_internal/create-rule.js +6 -0
  15. package/dist/_internal/create-rule.js.map +1 -0
  16. package/dist/_internal/domparser.d.ts +19 -0
  17. package/dist/_internal/domparser.d.ts.map +1 -0
  18. package/dist/_internal/domparser.js +45 -0
  19. package/dist/_internal/domparser.js.map +1 -0
  20. package/dist/_internal/electron-web-preferences.d.ts +14 -0
  21. package/dist/_internal/electron-web-preferences.d.ts.map +1 -0
  22. package/dist/_internal/electron-web-preferences.js +63 -0
  23. package/dist/_internal/electron-web-preferences.js.map +1 -0
  24. package/dist/_internal/estree-utils.d.ts +51 -0
  25. package/dist/_internal/estree-utils.d.ts.map +1 -0
  26. package/dist/_internal/estree-utils.js +112 -0
  27. package/dist/_internal/estree-utils.js.map +1 -0
  28. package/dist/_internal/node-tls-config.d.ts +44 -0
  29. package/dist/_internal/node-tls-config.d.ts.map +1 -0
  30. package/dist/_internal/node-tls-config.js +101 -0
  31. package/dist/_internal/node-tls-config.js.map +1 -0
  32. package/dist/_internal/rules-registry.d.ts +10 -0
  33. package/dist/_internal/rules-registry.d.ts.map +1 -0
  34. package/dist/_internal/rules-registry.js +148 -0
  35. package/dist/_internal/rules-registry.js.map +1 -0
  36. package/dist/_internal/script-element.d.ts +7 -0
  37. package/dist/_internal/script-element.d.ts.map +1 -0
  38. package/dist/_internal/script-element.js +46 -0
  39. package/dist/_internal/script-element.js.map +1 -0
  40. package/dist/_internal/worker-code-loading.d.ts +69 -0
  41. package/dist/_internal/worker-code-loading.d.ts.map +1 -0
  42. package/dist/_internal/worker-code-loading.js +134 -0
  43. package/dist/_internal/worker-code-loading.js.map +1 -0
  44. package/dist/plugin.cjs +6036 -0
  45. package/dist/plugin.cjs.map +7 -0
  46. package/dist/plugin.d.cts +11 -0
  47. package/dist/plugin.d.ts +11 -0
  48. package/dist/plugin.d.ts.map +1 -0
  49. package/dist/plugin.js +235 -0
  50. package/dist/plugin.js.map +1 -0
  51. package/dist/rules/no-angular-bypass-sanitizer.d.ts +5 -0
  52. package/dist/rules/no-angular-bypass-sanitizer.d.ts.map +1 -0
  53. package/dist/rules/no-angular-bypass-sanitizer.js +32 -0
  54. package/dist/rules/no-angular-bypass-sanitizer.js.map +1 -0
  55. package/dist/rules/no-angular-bypass-security-trust-html.d.ts +5 -0
  56. package/dist/rules/no-angular-bypass-security-trust-html.d.ts.map +1 -0
  57. package/dist/rules/no-angular-bypass-security-trust-html.js +51 -0
  58. package/dist/rules/no-angular-bypass-security-trust-html.js.map +1 -0
  59. package/dist/rules/no-angular-innerhtml-binding.d.ts +5 -0
  60. package/dist/rules/no-angular-innerhtml-binding.d.ts.map +1 -0
  61. package/dist/rules/no-angular-innerhtml-binding.js +57 -0
  62. package/dist/rules/no-angular-innerhtml-binding.js.map +1 -0
  63. package/dist/rules/no-angular-sanitization-trusted-urls.d.ts +5 -0
  64. package/dist/rules/no-angular-sanitization-trusted-urls.d.ts.map +1 -0
  65. package/dist/rules/no-angular-sanitization-trusted-urls.js +32 -0
  66. package/dist/rules/no-angular-sanitization-trusted-urls.js.map +1 -0
  67. package/dist/rules/no-angularjs-bypass-sce.d.ts +5 -0
  68. package/dist/rules/no-angularjs-bypass-sce.d.ts.map +1 -0
  69. package/dist/rules/no-angularjs-bypass-sce.js +80 -0
  70. package/dist/rules/no-angularjs-bypass-sce.js.map +1 -0
  71. package/dist/rules/no-angularjs-enable-svg.d.ts +5 -0
  72. package/dist/rules/no-angularjs-enable-svg.d.ts.map +1 -0
  73. package/dist/rules/no-angularjs-enable-svg.js +48 -0
  74. package/dist/rules/no-angularjs-enable-svg.js.map +1 -0
  75. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts +5 -0
  76. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts.map +1 -0
  77. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js +64 -0
  78. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js.map +1 -0
  79. package/dist/rules/no-angularjs-sanitization-whitelist.d.ts +5 -0
  80. package/dist/rules/no-angularjs-sanitization-whitelist.d.ts.map +1 -0
  81. package/dist/rules/no-angularjs-sanitization-whitelist.js +32 -0
  82. package/dist/rules/no-angularjs-sanitization-whitelist.js.map +1 -0
  83. package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts +5 -0
  84. package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts.map +1 -0
  85. package/dist/rules/no-angularjs-sce-resource-url-wildcard.js +69 -0
  86. package/dist/rules/no-angularjs-sce-resource-url-wildcard.js.map +1 -0
  87. package/dist/rules/no-child-process-exec.d.ts +5 -0
  88. package/dist/rules/no-child-process-exec.d.ts.map +1 -0
  89. package/dist/rules/no-child-process-exec.js +141 -0
  90. package/dist/rules/no-child-process-exec.js.map +1 -0
  91. package/dist/rules/no-child-process-shell-true.d.ts +5 -0
  92. package/dist/rules/no-child-process-shell-true.d.ts.map +1 -0
  93. package/dist/rules/no-child-process-shell-true.js +89 -0
  94. package/dist/rules/no-child-process-shell-true.js.map +1 -0
  95. package/dist/rules/no-cookies.d.ts +5 -0
  96. package/dist/rules/no-cookies.d.ts.map +1 -0
  97. package/dist/rules/no-cookies.js +38 -0
  98. package/dist/rules/no-cookies.js.map +1 -0
  99. package/dist/rules/no-document-domain.d.ts +5 -0
  100. package/dist/rules/no-document-domain.d.ts.map +1 -0
  101. package/dist/rules/no-document-domain.js +41 -0
  102. package/dist/rules/no-document-domain.js.map +1 -0
  103. package/dist/rules/no-document-execcommand-insert-html.d.ts +5 -0
  104. package/dist/rules/no-document-execcommand-insert-html.d.ts.map +1 -0
  105. package/dist/rules/no-document-execcommand-insert-html.js +57 -0
  106. package/dist/rules/no-document-execcommand-insert-html.js.map +1 -0
  107. package/dist/rules/no-document-parse-html-unsafe.d.ts +5 -0
  108. package/dist/rules/no-document-parse-html-unsafe.d.ts.map +1 -0
  109. package/dist/rules/no-document-parse-html-unsafe.js +67 -0
  110. package/dist/rules/no-document-parse-html-unsafe.js.map +1 -0
  111. package/dist/rules/no-document-write.d.ts +5 -0
  112. package/dist/rules/no-document-write.d.ts.map +1 -0
  113. package/dist/rules/no-document-write.js +40 -0
  114. package/dist/rules/no-document-write.js.map +1 -0
  115. package/dist/rules/no-domparser-html-without-sanitization.d.ts +5 -0
  116. package/dist/rules/no-domparser-html-without-sanitization.d.ts.map +1 -0
  117. package/dist/rules/no-domparser-html-without-sanitization.js +56 -0
  118. package/dist/rules/no-domparser-html-without-sanitization.js.map +1 -0
  119. package/dist/rules/no-domparser-svg-without-sanitization.d.ts +5 -0
  120. package/dist/rules/no-domparser-svg-without-sanitization.d.ts.map +1 -0
  121. package/dist/rules/no-domparser-svg-without-sanitization.js +56 -0
  122. package/dist/rules/no-domparser-svg-without-sanitization.js.map +1 -0
  123. package/dist/rules/no-dynamic-import-unsafe-url.d.ts +5 -0
  124. package/dist/rules/no-dynamic-import-unsafe-url.d.ts.map +1 -0
  125. package/dist/rules/no-dynamic-import-unsafe-url.js +47 -0
  126. package/dist/rules/no-dynamic-import-unsafe-url.js.map +1 -0
  127. package/dist/rules/no-electron-allow-running-insecure-content.d.ts +5 -0
  128. package/dist/rules/no-electron-allow-running-insecure-content.d.ts.map +1 -0
  129. package/dist/rules/no-electron-allow-running-insecure-content.js +30 -0
  130. package/dist/rules/no-electron-allow-running-insecure-content.js.map +1 -0
  131. package/dist/rules/no-electron-dangerous-blink-features.d.ts +5 -0
  132. package/dist/rules/no-electron-dangerous-blink-features.d.ts.map +1 -0
  133. package/dist/rules/no-electron-dangerous-blink-features.js +89 -0
  134. package/dist/rules/no-electron-dangerous-blink-features.js.map +1 -0
  135. package/dist/rules/no-electron-disable-context-isolation.d.ts +5 -0
  136. package/dist/rules/no-electron-disable-context-isolation.d.ts.map +1 -0
  137. package/dist/rules/no-electron-disable-context-isolation.js +30 -0
  138. package/dist/rules/no-electron-disable-context-isolation.js.map +1 -0
  139. package/dist/rules/no-electron-disable-sandbox.d.ts +5 -0
  140. package/dist/rules/no-electron-disable-sandbox.d.ts.map +1 -0
  141. package/dist/rules/no-electron-disable-sandbox.js +30 -0
  142. package/dist/rules/no-electron-disable-sandbox.js.map +1 -0
  143. package/dist/rules/no-electron-disable-web-security.d.ts +5 -0
  144. package/dist/rules/no-electron-disable-web-security.d.ts.map +1 -0
  145. package/dist/rules/no-electron-disable-web-security.js +30 -0
  146. package/dist/rules/no-electron-disable-web-security.js.map +1 -0
  147. package/dist/rules/no-electron-enable-remote-module.d.ts +5 -0
  148. package/dist/rules/no-electron-enable-remote-module.d.ts.map +1 -0
  149. package/dist/rules/no-electron-enable-remote-module.js +30 -0
  150. package/dist/rules/no-electron-enable-remote-module.js.map +1 -0
  151. package/dist/rules/no-electron-enable-webview-tag.d.ts +5 -0
  152. package/dist/rules/no-electron-enable-webview-tag.d.ts.map +1 -0
  153. package/dist/rules/no-electron-enable-webview-tag.js +30 -0
  154. package/dist/rules/no-electron-enable-webview-tag.js.map +1 -0
  155. package/dist/rules/no-electron-experimental-features.d.ts +5 -0
  156. package/dist/rules/no-electron-experimental-features.d.ts.map +1 -0
  157. package/dist/rules/no-electron-experimental-features.js +30 -0
  158. package/dist/rules/no-electron-experimental-features.js.map +1 -0
  159. package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts +5 -0
  160. package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts.map +1 -0
  161. package/dist/rules/no-electron-expose-raw-ipc-renderer.js +108 -0
  162. package/dist/rules/no-electron-expose-raw-ipc-renderer.js.map +1 -0
  163. package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts +5 -0
  164. package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts.map +1 -0
  165. package/dist/rules/no-electron-insecure-certificate-error-handler.js +91 -0
  166. package/dist/rules/no-electron-insecure-certificate-error-handler.js.map +1 -0
  167. package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts +5 -0
  168. package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts.map +1 -0
  169. package/dist/rules/no-electron-insecure-certificate-verify-proc.js +75 -0
  170. package/dist/rules/no-electron-insecure-certificate-verify-proc.js.map +1 -0
  171. package/dist/rules/no-electron-insecure-permission-request-handler.d.ts +5 -0
  172. package/dist/rules/no-electron-insecure-permission-request-handler.d.ts.map +1 -0
  173. package/dist/rules/no-electron-insecure-permission-request-handler.js +75 -0
  174. package/dist/rules/no-electron-insecure-permission-request-handler.js.map +1 -0
  175. package/dist/rules/no-electron-node-integration.d.ts +5 -0
  176. package/dist/rules/no-electron-node-integration.d.ts.map +1 -0
  177. package/dist/rules/no-electron-node-integration.js +52 -0
  178. package/dist/rules/no-electron-node-integration.js.map +1 -0
  179. package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts +5 -0
  180. package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts.map +1 -0
  181. package/dist/rules/no-electron-permission-check-handler-allow-all.js +63 -0
  182. package/dist/rules/no-electron-permission-check-handler-allow-all.js.map +1 -0
  183. package/dist/rules/no-electron-unchecked-ipc-sender.d.ts +5 -0
  184. package/dist/rules/no-electron-unchecked-ipc-sender.d.ts.map +1 -0
  185. package/dist/rules/no-electron-unchecked-ipc-sender.js +90 -0
  186. package/dist/rules/no-electron-unchecked-ipc-sender.js.map +1 -0
  187. package/dist/rules/no-electron-unrestricted-navigation.d.ts +5 -0
  188. package/dist/rules/no-electron-unrestricted-navigation.d.ts.map +1 -0
  189. package/dist/rules/no-electron-unrestricted-navigation.js +100 -0
  190. package/dist/rules/no-electron-unrestricted-navigation.js.map +1 -0
  191. package/dist/rules/no-electron-untrusted-open-external.d.ts +5 -0
  192. package/dist/rules/no-electron-untrusted-open-external.d.ts.map +1 -0
  193. package/dist/rules/no-electron-untrusted-open-external.js +92 -0
  194. package/dist/rules/no-electron-untrusted-open-external.js.map +1 -0
  195. package/dist/rules/no-electron-webview-allowpopups.d.ts +5 -0
  196. package/dist/rules/no-electron-webview-allowpopups.d.ts.map +1 -0
  197. package/dist/rules/no-electron-webview-allowpopups.js +85 -0
  198. package/dist/rules/no-electron-webview-allowpopups.js.map +1 -0
  199. package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts +5 -0
  200. package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts.map +1 -0
  201. package/dist/rules/no-electron-webview-insecure-webpreferences.js +88 -0
  202. package/dist/rules/no-electron-webview-insecure-webpreferences.js.map +1 -0
  203. package/dist/rules/no-electron-webview-node-integration.d.ts +5 -0
  204. package/dist/rules/no-electron-webview-node-integration.d.ts.map +1 -0
  205. package/dist/rules/no-electron-webview-node-integration.js +107 -0
  206. package/dist/rules/no-electron-webview-node-integration.js.map +1 -0
  207. package/dist/rules/no-html-method.d.ts +5 -0
  208. package/dist/rules/no-html-method.d.ts.map +1 -0
  209. package/dist/rules/no-html-method.js +42 -0
  210. package/dist/rules/no-html-method.js.map +1 -0
  211. package/dist/rules/no-http-request-to-insecure-protocol.d.ts +5 -0
  212. package/dist/rules/no-http-request-to-insecure-protocol.d.ts.map +1 -0
  213. package/dist/rules/no-http-request-to-insecure-protocol.js +94 -0
  214. package/dist/rules/no-http-request-to-insecure-protocol.js.map +1 -0
  215. package/dist/rules/no-iframe-srcdoc.d.ts +5 -0
  216. package/dist/rules/no-iframe-srcdoc.d.ts.map +1 -0
  217. package/dist/rules/no-iframe-srcdoc.js +144 -0
  218. package/dist/rules/no-iframe-srcdoc.js.map +1 -0
  219. package/dist/rules/no-inner-html.d.ts +5 -0
  220. package/dist/rules/no-inner-html.d.ts.map +1 -0
  221. package/dist/rules/no-inner-html.js +67 -0
  222. package/dist/rules/no-inner-html.js.map +1 -0
  223. package/dist/rules/no-insecure-random.d.ts +5 -0
  224. package/dist/rules/no-insecure-random.d.ts.map +1 -0
  225. package/dist/rules/no-insecure-random.js +95 -0
  226. package/dist/rules/no-insecure-random.js.map +1 -0
  227. package/dist/rules/no-insecure-tls-agent-options.d.ts +5 -0
  228. package/dist/rules/no-insecure-tls-agent-options.d.ts.map +1 -0
  229. package/dist/rules/no-insecure-tls-agent-options.js +73 -0
  230. package/dist/rules/no-insecure-tls-agent-options.js.map +1 -0
  231. package/dist/rules/no-insecure-url.d.ts +12 -0
  232. package/dist/rules/no-insecure-url.d.ts.map +1 -0
  233. package/dist/rules/no-insecure-url.js +142 -0
  234. package/dist/rules/no-insecure-url.js.map +1 -0
  235. package/dist/rules/no-location-javascript-url.d.ts +5 -0
  236. package/dist/rules/no-location-javascript-url.d.ts.map +1 -0
  237. package/dist/rules/no-location-javascript-url.js +98 -0
  238. package/dist/rules/no-location-javascript-url.js.map +1 -0
  239. package/dist/rules/no-message-event-without-origin-check.d.ts +5 -0
  240. package/dist/rules/no-message-event-without-origin-check.d.ts.map +1 -0
  241. package/dist/rules/no-message-event-without-origin-check.js +183 -0
  242. package/dist/rules/no-message-event-without-origin-check.js.map +1 -0
  243. package/dist/rules/no-msapp-exec-unsafe.d.ts +5 -0
  244. package/dist/rules/no-msapp-exec-unsafe.d.ts.map +1 -0
  245. package/dist/rules/no-msapp-exec-unsafe.js +32 -0
  246. package/dist/rules/no-msapp-exec-unsafe.js.map +1 -0
  247. package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts +5 -0
  248. package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts.map +1 -0
  249. package/dist/rules/no-node-tls-check-server-identity-bypass.js +95 -0
  250. package/dist/rules/no-node-tls-check-server-identity-bypass.js.map +1 -0
  251. package/dist/rules/no-node-tls-legacy-protocol.d.ts +5 -0
  252. package/dist/rules/no-node-tls-legacy-protocol.d.ts.map +1 -0
  253. package/dist/rules/no-node-tls-legacy-protocol.js +106 -0
  254. package/dist/rules/no-node-tls-legacy-protocol.js.map +1 -0
  255. package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts +5 -0
  256. package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts.map +1 -0
  257. package/dist/rules/no-node-tls-reject-unauthorized-zero.js +93 -0
  258. package/dist/rules/no-node-tls-reject-unauthorized-zero.js.map +1 -0
  259. package/dist/rules/no-node-tls-security-level-zero.d.ts +5 -0
  260. package/dist/rules/no-node-tls-security-level-zero.d.ts.map +1 -0
  261. package/dist/rules/no-node-tls-security-level-zero.js +80 -0
  262. package/dist/rules/no-node-tls-security-level-zero.js.map +1 -0
  263. package/dist/rules/no-node-vm-run-in-context.d.ts +5 -0
  264. package/dist/rules/no-node-vm-run-in-context.d.ts.map +1 -0
  265. package/dist/rules/no-node-vm-run-in-context.js +186 -0
  266. package/dist/rules/no-node-vm-run-in-context.js.map +1 -0
  267. package/dist/rules/no-node-vm-source-text-module.d.ts +5 -0
  268. package/dist/rules/no-node-vm-source-text-module.d.ts.map +1 -0
  269. package/dist/rules/no-node-vm-source-text-module.js +126 -0
  270. package/dist/rules/no-node-vm-source-text-module.js.map +1 -0
  271. package/dist/rules/no-node-worker-threads-eval.d.ts +5 -0
  272. package/dist/rules/no-node-worker-threads-eval.d.ts.map +1 -0
  273. package/dist/rules/no-node-worker-threads-eval.js +151 -0
  274. package/dist/rules/no-node-worker-threads-eval.js.map +1 -0
  275. package/dist/rules/no-nonnull-assertion-on-security-input.d.ts +5 -0
  276. package/dist/rules/no-nonnull-assertion-on-security-input.d.ts.map +1 -0
  277. package/dist/rules/no-nonnull-assertion-on-security-input.js +48 -0
  278. package/dist/rules/no-nonnull-assertion-on-security-input.js.map +1 -0
  279. package/dist/rules/no-postmessage-star-origin.d.ts +5 -0
  280. package/dist/rules/no-postmessage-star-origin.d.ts.map +1 -0
  281. package/dist/rules/no-postmessage-star-origin.js +58 -0
  282. package/dist/rules/no-postmessage-star-origin.js.map +1 -0
  283. package/dist/rules/no-postmessage-without-origin-allowlist.d.ts +5 -0
  284. package/dist/rules/no-postmessage-without-origin-allowlist.d.ts.map +1 -0
  285. package/dist/rules/no-postmessage-without-origin-allowlist.js +80 -0
  286. package/dist/rules/no-postmessage-without-origin-allowlist.js.map +1 -0
  287. package/dist/rules/no-range-create-contextual-fragment.d.ts +5 -0
  288. package/dist/rules/no-range-create-contextual-fragment.d.ts.map +1 -0
  289. package/dist/rules/no-range-create-contextual-fragment.js +64 -0
  290. package/dist/rules/no-range-create-contextual-fragment.js.map +1 -0
  291. package/dist/rules/no-script-src-data-url.d.ts +5 -0
  292. package/dist/rules/no-script-src-data-url.d.ts.map +1 -0
  293. package/dist/rules/no-script-src-data-url.js +108 -0
  294. package/dist/rules/no-script-src-data-url.js.map +1 -0
  295. package/dist/rules/no-script-text.d.ts +5 -0
  296. package/dist/rules/no-script-text.d.ts.map +1 -0
  297. package/dist/rules/no-script-text.js +52 -0
  298. package/dist/rules/no-script-text.js.map +1 -0
  299. package/dist/rules/no-service-worker-unsafe-script-url.d.ts +5 -0
  300. package/dist/rules/no-service-worker-unsafe-script-url.d.ts.map +1 -0
  301. package/dist/rules/no-service-worker-unsafe-script-url.js +52 -0
  302. package/dist/rules/no-service-worker-unsafe-script-url.js.map +1 -0
  303. package/dist/rules/no-set-html-unsafe.d.ts +5 -0
  304. package/dist/rules/no-set-html-unsafe.d.ts.map +1 -0
  305. package/dist/rules/no-set-html-unsafe.js +48 -0
  306. package/dist/rules/no-set-html-unsafe.js.map +1 -0
  307. package/dist/rules/no-trusted-types-policy-pass-through.d.ts +5 -0
  308. package/dist/rules/no-trusted-types-policy-pass-through.d.ts.map +1 -0
  309. package/dist/rules/no-trusted-types-policy-pass-through.js +115 -0
  310. package/dist/rules/no-trusted-types-policy-pass-through.js.map +1 -0
  311. package/dist/rules/no-unsafe-alloc.d.ts +5 -0
  312. package/dist/rules/no-unsafe-alloc.d.ts.map +1 -0
  313. package/dist/rules/no-unsafe-alloc.js +51 -0
  314. package/dist/rules/no-unsafe-alloc.js.map +1 -0
  315. package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts +5 -0
  316. package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts.map +1 -0
  317. package/dist/rules/no-unsafe-cast-to-trusted-types.js +89 -0
  318. package/dist/rules/no-unsafe-cast-to-trusted-types.js.map +1 -0
  319. package/dist/rules/no-window-open-without-noopener.d.ts +5 -0
  320. package/dist/rules/no-window-open-without-noopener.d.ts.map +1 -0
  321. package/dist/rules/no-window-open-without-noopener.js +84 -0
  322. package/dist/rules/no-window-open-without-noopener.js.map +1 -0
  323. package/dist/rules/no-winjs-html-unsafe.d.ts +5 -0
  324. package/dist/rules/no-winjs-html-unsafe.d.ts.map +1 -0
  325. package/dist/rules/no-winjs-html-unsafe.js +32 -0
  326. package/dist/rules/no-winjs-html-unsafe.js.map +1 -0
  327. package/dist/rules/no-worker-blob-url.d.ts +5 -0
  328. package/dist/rules/no-worker-blob-url.d.ts.map +1 -0
  329. package/dist/rules/no-worker-blob-url.js +64 -0
  330. package/dist/rules/no-worker-blob-url.js.map +1 -0
  331. package/dist/rules/no-worker-data-url.d.ts +5 -0
  332. package/dist/rules/no-worker-data-url.d.ts.map +1 -0
  333. package/dist/rules/no-worker-data-url.js +67 -0
  334. package/dist/rules/no-worker-data-url.js.map +1 -0
  335. package/docs/rules/getting-started.md +70 -0
  336. package/docs/rules/no-angular-bypass-sanitizer.md +69 -0
  337. package/docs/rules/no-angular-bypass-security-trust-html.md +59 -0
  338. package/docs/rules/no-angular-innerhtml-binding.md +59 -0
  339. package/docs/rules/no-angular-sanitization-trusted-urls.md +64 -0
  340. package/docs/rules/no-angularjs-bypass-sce.md +64 -0
  341. package/docs/rules/no-angularjs-enable-svg.md +59 -0
  342. package/docs/rules/no-angularjs-ng-bind-html-without-sanitize.md +59 -0
  343. package/docs/rules/no-angularjs-sanitization-whitelist.md +63 -0
  344. package/docs/rules/no-angularjs-sce-resource-url-wildcard.md +62 -0
  345. package/docs/rules/no-child-process-exec.md +101 -0
  346. package/docs/rules/no-child-process-shell-true.md +59 -0
  347. package/docs/rules/no-cookies.md +61 -0
  348. package/docs/rules/no-document-domain.md +59 -0
  349. package/docs/rules/no-document-execcommand-insert-html.md +69 -0
  350. package/docs/rules/no-document-parse-html-unsafe.md +72 -0
  351. package/docs/rules/no-document-write.md +64 -0
  352. package/docs/rules/no-domparser-html-without-sanitization.md +59 -0
  353. package/docs/rules/no-domparser-svg-without-sanitization.md +71 -0
  354. package/docs/rules/no-dynamic-import-unsafe-url.md +81 -0
  355. package/docs/rules/no-electron-allow-running-insecure-content.md +69 -0
  356. package/docs/rules/no-electron-dangerous-blink-features.md +77 -0
  357. package/docs/rules/no-electron-disable-context-isolation.md +69 -0
  358. package/docs/rules/no-electron-disable-sandbox.md +69 -0
  359. package/docs/rules/no-electron-disable-web-security.md +69 -0
  360. package/docs/rules/no-electron-enable-remote-module.md +69 -0
  361. package/docs/rules/no-electron-enable-webview-tag.md +77 -0
  362. package/docs/rules/no-electron-experimental-features.md +77 -0
  363. package/docs/rules/no-electron-expose-raw-ipc-renderer.md +79 -0
  364. package/docs/rules/no-electron-insecure-certificate-error-handler.md +72 -0
  365. package/docs/rules/no-electron-insecure-certificate-verify-proc.md +63 -0
  366. package/docs/rules/no-electron-insecure-permission-request-handler.md +67 -0
  367. package/docs/rules/no-electron-node-integration.md +70 -0
  368. package/docs/rules/no-electron-permission-check-handler-allow-all.md +66 -0
  369. package/docs/rules/no-electron-unchecked-ipc-sender.md +62 -0
  370. package/docs/rules/no-electron-unrestricted-navigation.md +64 -0
  371. package/docs/rules/no-electron-untrusted-open-external.md +65 -0
  372. package/docs/rules/no-electron-webview-allowpopups.md +59 -0
  373. package/docs/rules/no-electron-webview-insecure-webpreferences.md +84 -0
  374. package/docs/rules/no-electron-webview-node-integration.md +59 -0
  375. package/docs/rules/no-html-method.md +58 -0
  376. package/docs/rules/no-http-request-to-insecure-protocol.md +59 -0
  377. package/docs/rules/no-iframe-srcdoc.md +76 -0
  378. package/docs/rules/no-inner-html.md +65 -0
  379. package/docs/rules/no-insecure-random.md +66 -0
  380. package/docs/rules/no-insecure-tls-agent-options.md +59 -0
  381. package/docs/rules/no-insecure-url.md +72 -0
  382. package/docs/rules/no-location-javascript-url.md +59 -0
  383. package/docs/rules/no-message-event-without-origin-check.md +82 -0
  384. package/docs/rules/no-msapp-exec-unsafe.md +59 -0
  385. package/docs/rules/no-node-tls-check-server-identity-bypass.md +88 -0
  386. package/docs/rules/no-node-tls-legacy-protocol.md +80 -0
  387. package/docs/rules/no-node-tls-reject-unauthorized-zero.md +61 -0
  388. package/docs/rules/no-node-tls-security-level-zero.md +77 -0
  389. package/docs/rules/no-node-vm-run-in-context.md +89 -0
  390. package/docs/rules/no-node-vm-source-text-module.md +79 -0
  391. package/docs/rules/no-node-worker-threads-eval.md +82 -0
  392. package/docs/rules/no-nonnull-assertion-on-security-input.md +59 -0
  393. package/docs/rules/no-postmessage-star-origin.md +59 -0
  394. package/docs/rules/no-postmessage-without-origin-allowlist.md +59 -0
  395. package/docs/rules/no-range-create-contextual-fragment.md +64 -0
  396. package/docs/rules/no-script-src-data-url.md +83 -0
  397. package/docs/rules/no-script-text.md +80 -0
  398. package/docs/rules/no-service-worker-unsafe-script-url.md +85 -0
  399. package/docs/rules/no-set-html-unsafe.md +64 -0
  400. package/docs/rules/no-trusted-types-policy-pass-through.md +68 -0
  401. package/docs/rules/no-unsafe-alloc.md +62 -0
  402. package/docs/rules/no-unsafe-cast-to-trusted-types.md +59 -0
  403. package/docs/rules/no-window-open-without-noopener.md +63 -0
  404. package/docs/rules/no-winjs-html-unsafe.md +60 -0
  405. package/docs/rules/no-worker-blob-url.md +86 -0
  406. package/docs/rules/no-worker-data-url.md +85 -0
  407. package/docs/rules/overview.md +111 -0
  408. package/docs/rules/presets/angular.md +35 -0
  409. package/docs/rules/presets/angularjs.md +36 -0
  410. package/docs/rules/presets/common.md +59 -0
  411. package/docs/rules/presets/electron.md +51 -0
  412. package/docs/rules/presets/index.md +26 -0
  413. package/docs/rules/presets/node.md +43 -0
  414. package/docs/rules/presets/react.md +33 -0
  415. package/docs/rules/presets/recommended.md +104 -0
  416. package/docs/rules/presets/required.md +99 -0
  417. package/docs/rules/presets/typescript.md +34 -0
  418. package/package.json +583 -0
@@ -0,0 +1,85 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ const isJsxWebviewElement = (node) => {
3
+ if (node.name.type === "JSXIdentifier") {
4
+ return node.name.name.toLowerCase() === "webview";
5
+ }
6
+ return false;
7
+ };
8
+ const getJsxAttributeName = (attributeNode) => {
9
+ if (attributeNode.name.type !== "JSXIdentifier") {
10
+ return undefined;
11
+ }
12
+ return attributeNode.name.name.toLowerCase();
13
+ };
14
+ const isTruthyJsxAttributeValue = (attributeValue) => {
15
+ if (attributeValue === null) {
16
+ return true;
17
+ }
18
+ if (attributeValue.type === "Literal") {
19
+ if (typeof attributeValue.value === "boolean") {
20
+ return attributeValue.value;
21
+ }
22
+ if (typeof attributeValue.value === "string") {
23
+ return attributeValue.value.toLowerCase() !== "false";
24
+ }
25
+ return false;
26
+ }
27
+ if (attributeValue.type !== "JSXExpressionContainer") {
28
+ return false;
29
+ }
30
+ if (attributeValue.expression.type === "Literal" &&
31
+ typeof attributeValue.expression.value === "boolean") {
32
+ return attributeValue.expression.value;
33
+ }
34
+ return true;
35
+ };
36
+ /** Rule implementation. */
37
+ const rule = createRule({
38
+ create(context) {
39
+ return {
40
+ JSXOpeningElement(node) {
41
+ if (!isJsxWebviewElement(node)) {
42
+ return;
43
+ }
44
+ for (const attributeNode of node.attributes) {
45
+ if (attributeNode.type !== "JSXAttribute") {
46
+ continue;
47
+ }
48
+ if (getJsxAttributeName(attributeNode) !== "allowpopups") {
49
+ continue;
50
+ }
51
+ if (!isTruthyJsxAttributeValue(attributeNode.value)) {
52
+ continue;
53
+ }
54
+ context.report({
55
+ fix(fixer) {
56
+ return fixer.remove(attributeNode);
57
+ },
58
+ messageId: "default",
59
+ node: attributeNode,
60
+ });
61
+ }
62
+ },
63
+ };
64
+ },
65
+ defaultOptions: [],
66
+ meta: {
67
+ deprecated: false,
68
+ docs: {
69
+ description: "disallow enabling allowpopups in Electron webview elements.",
70
+ frozen: false,
71
+ recommended: false,
72
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-allowpopups",
73
+ },
74
+ fixable: "code",
75
+ messages: {
76
+ default: "Do not enable allowpopups on Electron webview elements.",
77
+ },
78
+ schema: [],
79
+ type: "problem",
80
+ },
81
+ name: "no-electron-webview-allowpopups",
82
+ });
83
+ export default rule;
84
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
85
+ //# sourceMappingURL=no-electron-webview-allowpopups.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-webview-allowpopups.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-allowpopups.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE;IACtE,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QACrC,OAAO,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;IACtD,CAAC;IAED,OAAO,KAAK,CAAC;AACjB,CAAC,CAAC;AAEF,MAAM,mBAAmB,GAAG,CACxB,aAAoC,EAClB,EAAE;IACpB,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;AACjD,CAAC,CAAC;AAEF,MAAM,yBAAyB,GAAG,CAC9B,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACpC,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5C,OAAO,cAAc,CAAC,KAAK,CAAC;QAChC,CAAC;QAED,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC3C,OAAO,cAAc,CAAC,KAAK,CAAC,WAAW,EAAE,KAAK,OAAO,CAAC;QAC1D,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,wBAAwB,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,UAAU,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,KAAK,SAAS,EACtD,CAAC;QACC,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,IAAI,CAAC;AAChB,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,IAAI,mBAAmB,CAAC,aAAa,CAAC,KAAK,aAAa,EAAE,CAAC;wBACvD,SAAS;oBACb,CAAC;oBAED,IAAI,CAAC,yBAAyB,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;wBAClD,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,GAAG,CAAC,KAAK;4BACL,OAAO,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;wBACvC,CAAC;wBACD,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,6DAA6D;YACjE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,6FAA6F;SACrG;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EAAE,yDAAyD;SACrE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,iCAAiC;CAC1C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-electron-webview-insecure-webpreferences.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-webview-insecure-webpreferences.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-webview-insecure-webpreferences.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA+CzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA+DtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,88 @@
1
+ import { arrayJoin, isEmpty } from "ts-extras";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ import { getStaticJsxAttributeStringValue } from "../_internal/estree-utils.js";
4
+ const UNSAFE_WEBPREFERENCES_PATTERNS = [
5
+ {
6
+ flagName: "allowRunningInsecureContent",
7
+ pattern: /\ballowrunninginsecurecontent\s*=\s*(?:1|on|true|yes)\b/iu,
8
+ },
9
+ {
10
+ flagName: "contextIsolation",
11
+ pattern: /\bcontextisolation\s*=\s*(?:0|false|no|off)\b/iu,
12
+ },
13
+ {
14
+ flagName: "experimentalFeatures",
15
+ pattern: /\bexperimentalfeatures\s*=\s*(?:1|on|true|yes)\b/iu,
16
+ },
17
+ {
18
+ flagName: "sandbox",
19
+ pattern: /\bsandbox\s*=\s*(?:0|false|no|off)\b/iu,
20
+ },
21
+ {
22
+ flagName: "webSecurity",
23
+ pattern: /\bwebsecurity\s*=\s*(?:0|false|no|off)\b/iu,
24
+ },
25
+ ];
26
+ const isJsxWebviewElement = (node) => node.name.type === "JSXIdentifier" &&
27
+ node.name.name.toLowerCase() === "webview";
28
+ const getJsxAttributeName = (attributeNode) => {
29
+ if (attributeNode.name.type === "JSXIdentifier") {
30
+ return attributeNode.name.name.toLowerCase();
31
+ }
32
+ return `${attributeNode.name.namespace.name}:${attributeNode.name.name.name}`.toLowerCase();
33
+ };
34
+ const getUnsafeWebPreferencesFlags = (attributeValue) => UNSAFE_WEBPREFERENCES_PATTERNS.flatMap(({ flagName, pattern }) => pattern.test(attributeValue) ? [flagName] : []);
35
+ /** Rule implementation. */
36
+ const rule = createRule({
37
+ create(context) {
38
+ return {
39
+ JSXOpeningElement(node) {
40
+ if (!isJsxWebviewElement(node)) {
41
+ return;
42
+ }
43
+ for (const attributeNode of node.attributes) {
44
+ if (attributeNode.type !== "JSXAttribute") {
45
+ continue;
46
+ }
47
+ if (getJsxAttributeName(attributeNode) !== "webpreferences") {
48
+ continue;
49
+ }
50
+ const staticValue = getStaticJsxAttributeStringValue(attributeNode.value);
51
+ if (typeof staticValue !== "string") {
52
+ continue;
53
+ }
54
+ const unsafeFlags = getUnsafeWebPreferencesFlags(staticValue);
55
+ if (isEmpty(unsafeFlags)) {
56
+ continue;
57
+ }
58
+ context.report({
59
+ data: {
60
+ flags: arrayJoin(unsafeFlags, ", "),
61
+ },
62
+ messageId: "default",
63
+ node: attributeNode,
64
+ });
65
+ }
66
+ },
67
+ };
68
+ },
69
+ defaultOptions: [],
70
+ meta: {
71
+ deprecated: false,
72
+ docs: {
73
+ description: "disallow unsafe Electron webview webpreferences string flags.",
74
+ frozen: false,
75
+ recommended: false,
76
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-insecure-webpreferences",
77
+ },
78
+ messages: {
79
+ default: "Do not enable unsafe Electron webview webpreferences flags: {{flags}}.",
80
+ },
81
+ schema: [],
82
+ type: "problem",
83
+ },
84
+ name: "no-electron-webview-insecure-webpreferences",
85
+ });
86
+ export default rule;
87
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
88
+ //# sourceMappingURL=no-electron-webview-insecure-webpreferences.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-webview-insecure-webpreferences.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-insecure-webpreferences.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAE/C,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,gCAAgC,EAAE,MAAM,8BAA8B,CAAC;AAIhF,MAAM,8BAA8B,GAAG;IACnC;QACI,QAAQ,EAAE,6BAA6B;QACvC,OAAO,EAAE,2DAA2D;KACvE;IACD;QACI,QAAQ,EAAE,kBAAkB;QAC5B,OAAO,EAAE,iDAAiD;KAC7D;IACD;QACI,QAAQ,EAAE,sBAAsB;QAChC,OAAO,EAAE,oDAAoD;KAChE;IACD;QACI,QAAQ,EAAE,SAAS;QACnB,OAAO,EAAE,wCAAwC;KACpD;IACD;QACI,QAAQ,EAAE,aAAa;QACvB,OAAO,EAAE,4CAA4C;KACxD;CACK,CAAC;AAEX,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE,CACtE,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe;IAClC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;AAE/C,MAAM,mBAAmB,GAAG,CAAC,aAAoC,EAAU,EAAE;IACzE,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IACjD,CAAC;IAED,OAAO,GAAG,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;AAChG,CAAC,CAAC;AAEF,MAAM,4BAA4B,GAAG,CACjC,cAAsB,EACL,EAAE,CACnB,8BAA8B,CAAC,OAAO,CAAC,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,EAAE,EAAE,CAC7D,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC;AAEN,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,IACI,mBAAmB,CAAC,aAAa,CAAC,KAAK,gBAAgB,EACzD,CAAC;wBACC,SAAS;oBACb,CAAC;oBAED,MAAM,WAAW,GAAG,gCAAgC,CAChD,aAAa,CAAC,KAAK,CACtB,CAAC;oBAEF,IAAI,OAAO,WAAW,KAAK,QAAQ,EAAE,CAAC;wBAClC,SAAS;oBACb,CAAC;oBAED,MAAM,WAAW,GACb,4BAA4B,CAAC,WAAW,CAAC,CAAC;oBAE9C,IAAI,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;wBACvB,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,IAAI,EAAE;4BACF,KAAK,EAAE,SAAS,CAAC,WAAW,EAAE,IAAI,CAAC;yBACtC;wBACD,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+DAA+D;YACnE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,yGAAyG;SACjH;QACD,QAAQ,EAAE;YACN,OAAO,EACH,wEAAwE;SAC/E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,6CAA6C;CACtD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-electron-webview-node-integration.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-webview-node-integration.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-webview-node-integration.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA2EzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAoEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,107 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ const isJsxWebviewElement = (node) => node.name.type === "JSXIdentifier" &&
3
+ node.name.name.toLowerCase() === "webview";
4
+ const getJsxAttributeName = (attributeNode) => {
5
+ if (attributeNode.name.type === "JSXIdentifier") {
6
+ return attributeNode.name.name.toLowerCase();
7
+ }
8
+ return `${attributeNode.name.namespace.name}:${attributeNode.name.name.name}`.toLowerCase();
9
+ };
10
+ const isNodeIntegrationAttribute = (attributeName) => {
11
+ const normalizedName = attributeName.toLowerCase();
12
+ return (normalizedName === "nodeintegration" ||
13
+ normalizedName === "nodeintegrationinsubframes");
14
+ };
15
+ const isTruthyJsxAttributeValue = (attributeValue) => {
16
+ if (attributeValue === null) {
17
+ return true;
18
+ }
19
+ if (attributeValue.type === "Literal") {
20
+ if (typeof attributeValue.value === "boolean") {
21
+ return attributeValue.value;
22
+ }
23
+ if (typeof attributeValue.value === "string") {
24
+ return attributeValue.value.toLowerCase() !== "false";
25
+ }
26
+ return false;
27
+ }
28
+ if (attributeValue.type !== "JSXExpressionContainer") {
29
+ return false;
30
+ }
31
+ if (attributeValue.expression.type === "Literal" &&
32
+ typeof attributeValue.expression.value === "boolean") {
33
+ return attributeValue.expression.value;
34
+ }
35
+ return true;
36
+ };
37
+ const webPreferencesHasNodeIntegration = (attributeValue) => {
38
+ if (attributeValue === null) {
39
+ return false;
40
+ }
41
+ if (attributeValue.type === "Literal" &&
42
+ typeof attributeValue.value === "string") {
43
+ return /\bnodeintegration\b/iu.test(attributeValue.value);
44
+ }
45
+ return false;
46
+ };
47
+ /** Rule implementation. */
48
+ const rule = createRule({
49
+ create(context) {
50
+ return {
51
+ JSXOpeningElement(node) {
52
+ if (!isJsxWebviewElement(node)) {
53
+ return;
54
+ }
55
+ for (const attributeNode of node.attributes) {
56
+ if (attributeNode.type !== "JSXAttribute") {
57
+ continue;
58
+ }
59
+ const attributeName = getJsxAttributeName(attributeNode);
60
+ if (isNodeIntegrationAttribute(attributeName)) {
61
+ if (!isTruthyJsxAttributeValue(attributeNode.value)) {
62
+ continue;
63
+ }
64
+ context.report({
65
+ fix(fixer) {
66
+ return fixer.remove(attributeNode);
67
+ },
68
+ messageId: "default",
69
+ node: attributeNode,
70
+ });
71
+ continue;
72
+ }
73
+ if (attributeName !== "webpreferences") {
74
+ continue;
75
+ }
76
+ if (!webPreferencesHasNodeIntegration(attributeNode.value)) {
77
+ continue;
78
+ }
79
+ context.report({
80
+ messageId: "default",
81
+ node: attributeNode,
82
+ });
83
+ }
84
+ },
85
+ };
86
+ },
87
+ defaultOptions: [],
88
+ meta: {
89
+ deprecated: false,
90
+ docs: {
91
+ description: "disallow node integration flags on Electron webview elements.",
92
+ frozen: false,
93
+ recommended: false,
94
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-node-integration",
95
+ },
96
+ fixable: "code",
97
+ messages: {
98
+ default: "Do not enable node integration options on Electron webview elements.",
99
+ },
100
+ schema: [],
101
+ type: "problem",
102
+ },
103
+ name: "no-electron-webview-node-integration",
104
+ });
105
+ export default rule;
106
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
107
+ //# sourceMappingURL=no-electron-webview-node-integration.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-webview-node-integration.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-node-integration.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE,CACtE,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe;IAClC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;AAE/C,MAAM,mBAAmB,GAAG,CAAC,aAAoC,EAAU,EAAE;IACzE,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IACjD,CAAC;IAED,OAAO,GAAG,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;AAChG,CAAC,CAAC;AAEF,MAAM,0BAA0B,GAAG,CAAC,aAAqB,EAAW,EAAE;IAClE,MAAM,cAAc,GAAG,aAAa,CAAC,WAAW,EAAE,CAAC;IAEnD,OAAO,CACH,cAAc,KAAK,iBAAiB;QACpC,cAAc,KAAK,4BAA4B,CAClD,CAAC;AACN,CAAC,CAAC;AAEF,MAAM,yBAAyB,GAAG,CAC9B,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACpC,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5C,OAAO,cAAc,CAAC,KAAK,CAAC;QAChC,CAAC;QAED,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC3C,OAAO,cAAc,CAAC,KAAK,CAAC,WAAW,EAAE,KAAK,OAAO,CAAC;QAC1D,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,wBAAwB,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,UAAU,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,KAAK,SAAS,EACtD,CAAC;QACC,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,IAAI,CAAC;AAChB,CAAC,CAAC;AAEF,MAAM,gCAAgC,GAAG,CACrC,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,IAAI,KAAK,SAAS;QACjC,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAC1C,CAAC;QACC,OAAO,uBAAuB,CAAC,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;IAC9D,CAAC;IAED,OAAO,KAAK,CAAC;AACjB,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC,CAAC;oBAEzD,IAAI,0BAA0B,CAAC,aAAa,CAAC,EAAE,CAAC;wBAC5C,IAAI,CAAC,yBAAyB,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAClD,SAAS;wBACb,CAAC;wBAED,OAAO,CAAC,MAAM,CAAC;4BACX,GAAG,CAAC,KAAK;gCACL,OAAO,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;4BACvC,CAAC;4BACD,SAAS,EAAE,SAAS;4BACpB,IAAI,EAAE,aAAa;yBACtB,CAAC,CAAC;wBAEH,SAAS;oBACb,CAAC;oBAED,IAAI,aAAa,KAAK,gBAAgB,EAAE,CAAC;wBACrC,SAAS;oBACb,CAAC;oBAED,IACI,CAAC,gCAAgC,CAAC,aAAa,CAAC,KAAK,CAAC,EACxD,CAAC;wBACC,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+DAA+D;YACnE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,kGAAkG;SAC1G;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EACH,sEAAsE;SAC7E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,sCAAsC;CAC/C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-html-method.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-html-method.d.ts","sourceRoot":"","sources":["../../src/rules/no-html-method.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA6CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,42 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ const rule = createRule({
4
+ create(context) {
5
+ return {
6
+ "CallExpression[arguments.length=1] > MemberExpression.callee[property.name='html']"(node) {
7
+ const parentCall = node.parent;
8
+ if (parentCall.type !== "CallExpression") {
9
+ return;
10
+ }
11
+ const [firstArgument] = parentCall.arguments;
12
+ if (firstArgument?.type === "Literal" &&
13
+ (firstArgument.value === "" || firstArgument.value === null)) {
14
+ return;
15
+ }
16
+ context.report({
17
+ messageId: "default",
18
+ node,
19
+ });
20
+ },
21
+ };
22
+ },
23
+ defaultOptions: [],
24
+ meta: {
25
+ deprecated: false,
26
+ docs: {
27
+ description: "disallow direct html(...) DOM writes (for example jQuery html()) that bypass sanitization.",
28
+ frozen: false,
29
+ recommended: false,
30
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-html-method",
31
+ },
32
+ messages: {
33
+ default: "Do not write to the DOM directly using html(...).",
34
+ },
35
+ schema: [],
36
+ type: "problem",
37
+ },
38
+ name: "no-html-method",
39
+ });
40
+ export default rule;
41
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
42
+ //# sourceMappingURL=no-html-method.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-html-method.js","sourceRoot":"","sources":["../../src/rules/no-html-method.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAC;IACnD,MAAM,CAAC,OAAO;QACV,OAAO;YACH,oFAAoF,CAChF,IAA+B;gBAE/B,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC;gBAE/B,IAAI,UAAU,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;oBACvC,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,UAAU,CAAC,SAAS,CAAC;gBAE7C,IACI,aAAa,EAAE,IAAI,KAAK,SAAS;oBACjC,CAAC,aAAa,CAAC,KAAK,KAAK,EAAE,IAAI,aAAa,CAAC,KAAK,KAAK,IAAI,CAAC,EAC9D,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,4FAA4F;YAChG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,4EAA4E;SACpF;QACD,QAAQ,EAAE;YACN,OAAO,EAAE,mDAAmD;SAC/D;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,gBAAgB;CACzB,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-http-request-to-insecure-protocol.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-http-request-to-insecure-protocol.d.ts","sourceRoot":"","sources":["../../src/rules/no-http-request-to-insecure-protocol.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAkEzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAoEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,94 @@
1
+ import { arrayFirst } from "ts-extras";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ const getMemberPropertyName = (memberExpression) => {
4
+ if (!memberExpression.computed &&
5
+ memberExpression.property.type === "Identifier") {
6
+ return memberExpression.property.name;
7
+ }
8
+ if (memberExpression.property.type === "Literal" &&
9
+ typeof memberExpression.property.value === "string") {
10
+ return memberExpression.property.value;
11
+ }
12
+ return undefined;
13
+ };
14
+ const getStaticStringValue = (node) => {
15
+ if (node.type === "Literal" && typeof node.value === "string") {
16
+ return node.value;
17
+ }
18
+ if (node.type === "TemplateLiteral" && node.expressions.length === 0) {
19
+ return arrayFirst(node.quasis)?.value.cooked ?? undefined;
20
+ }
21
+ return undefined;
22
+ };
23
+ const isInsecureHttpUrl = (value) => /^http:\/\//iu.test(value.trim());
24
+ const isTargetRequestMethod = (node) => {
25
+ if (node.callee.type === "Identifier") {
26
+ return node.callee.name === "fetch";
27
+ }
28
+ if (node.callee.type !== "MemberExpression") {
29
+ return false;
30
+ }
31
+ const methodName = getMemberPropertyName(node.callee);
32
+ if (methodName !== "request" && methodName !== "get") {
33
+ return false;
34
+ }
35
+ if (node.callee.object.type !== "Identifier") {
36
+ return false;
37
+ }
38
+ return (node.callee.object.name === "http" ||
39
+ node.callee.object.name === "https");
40
+ };
41
+ /** Rule implementation. */
42
+ const rule = createRule({
43
+ create(context) {
44
+ return {
45
+ CallExpression(node) {
46
+ if (!isTargetRequestMethod(node)) {
47
+ return;
48
+ }
49
+ const [firstArgument] = node.arguments;
50
+ if (firstArgument === undefined ||
51
+ firstArgument.type === "SpreadElement") {
52
+ return;
53
+ }
54
+ const firstArgumentValue = getStaticStringValue(firstArgument);
55
+ if (typeof firstArgumentValue !== "string" ||
56
+ !isInsecureHttpUrl(firstArgumentValue)) {
57
+ return;
58
+ }
59
+ context.report({
60
+ fix(fixer) {
61
+ const sourceText = context.sourceCode.getText(firstArgument);
62
+ const fixedSourceText = sourceText.replace(/^(?<quote>["'`]?)http:\/\//iu, "$<quote>https://");
63
+ if (fixedSourceText === sourceText) {
64
+ return null;
65
+ }
66
+ return fixer.replaceText(firstArgument, fixedSourceText);
67
+ },
68
+ messageId: "default",
69
+ node: firstArgument,
70
+ });
71
+ },
72
+ };
73
+ },
74
+ defaultOptions: [],
75
+ meta: {
76
+ deprecated: false,
77
+ docs: {
78
+ description: "disallow Node HTTP client calls that use insecure http:// URLs.",
79
+ frozen: false,
80
+ recommended: false,
81
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-http-request-to-insecure-protocol",
82
+ },
83
+ fixable: "code",
84
+ messages: {
85
+ default: "Use HTTPS endpoints instead of insecure http:// URLs.",
86
+ },
87
+ schema: [],
88
+ type: "problem",
89
+ },
90
+ name: "no-http-request-to-insecure-protocol",
91
+ });
92
+ export default rule;
93
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
94
+ //# sourceMappingURL=no-http-request-to-insecure-protocol.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-http-request-to-insecure-protocol.js","sourceRoot":"","sources":["../../src/rules/no-http-request-to-insecure-protocol.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,WAAW,CAAC;AAEvC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,qBAAqB,GAAG,CAC1B,gBAA2C,EACzB,EAAE;IACpB,IACI,CAAC,gBAAgB,CAAC,QAAQ;QAC1B,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EACjD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,IAAI,CAAC;IAC1C,CAAC;IAED,IACI,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,KAAK,QAAQ,EACrD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG,CACzB,IAAyB,EACP,EAAE;IACpB,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,IAAI,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC5D,OAAO,IAAI,CAAC,KAAK,CAAC;IACtB,CAAC;IAED,IAAI,IAAI,CAAC,IAAI,KAAK,iBAAiB,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACnE,OAAO,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,CAAC,MAAM,IAAI,SAAS,CAAC;IAC9D,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,iBAAiB,GAAG,CAAC,KAAa,EAAW,EAAE,CACjD,cAAc,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,CAAC;AAEtC,MAAM,qBAAqB,GAAG,CAAC,IAA6B,EAAW,EAAE;IACrE,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACpC,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,OAAO,CAAC;IACxC,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,MAAM,UAAU,GAAG,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAEtD,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,KAAK,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QAC3C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,CACH,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,MAAM;QAClC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,OAAO,CACtC,CAAC;AACN,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC/B,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe,EACxC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,kBAAkB,GAAG,oBAAoB,CAAC,aAAa,CAAC,CAAC;gBAE/D,IACI,OAAO,kBAAkB,KAAK,QAAQ;oBACtC,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,EACxC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,GAAG,CAAC,KAAK;wBACL,MAAM,UAAU,GACZ,OAAO,CAAC,UAAU,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC;wBAC9C,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CACtC,8BAA8B,EAC9B,kBAAkB,CACrB,CAAC;wBAEF,IAAI,eAAe,KAAK,UAAU,EAAE,CAAC;4BACjC,OAAO,IAAI,CAAC;wBAChB,CAAC;wBAED,OAAO,KAAK,CAAC,WAAW,CACpB,aAAa,EACb,eAAe,CAClB,CAAC;oBACN,CAAC;oBACD,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,iEAAiE;YACrE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,kGAAkG;SAC1G;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EAAE,uDAAuD;SACnE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,sCAAsC;CAC/C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-iframe-srcdoc.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-iframe-srcdoc.d.ts","sourceRoot":"","sources":["../../src/rules/no-iframe-srcdoc.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAqFzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAgItC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,144 @@
1
+ import { getFullTypeChecker, getNodeTypeAsString, } from "../_internal/ast-utils.js";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ import { getMemberPropertyName, getStaticJsxAttributeStringValue, getStaticStringValue, } from "../_internal/estree-utils.js";
4
+ const isJsxIframeElement = (node) => {
5
+ if (node.name.type !== "JSXIdentifier") {
6
+ return false;
7
+ }
8
+ return node.name.name.toLowerCase() === "iframe";
9
+ };
10
+ const getJsxAttributeName = (attributeNode) => {
11
+ if (attributeNode.name.type !== "JSXIdentifier") {
12
+ return undefined;
13
+ }
14
+ return attributeNode.name.name.toLowerCase();
15
+ };
16
+ const isCreateElementIFrameCall = (node) => {
17
+ if (node.type !== "CallExpression" ||
18
+ node.callee.type !== "MemberExpression") {
19
+ return false;
20
+ }
21
+ if (getMemberPropertyName(node.callee) !== "createElement") {
22
+ return false;
23
+ }
24
+ const [firstArgument] = node.arguments;
25
+ return (firstArgument !== undefined &&
26
+ firstArgument.type !== "SpreadElement" &&
27
+ getStaticStringValue(firstArgument) === "iframe");
28
+ };
29
+ const isLikelyIFrameElement = (node, context, fullTypeChecker) => {
30
+ if (fullTypeChecker !== undefined) {
31
+ const nodeType = getNodeTypeAsString(fullTypeChecker, node, context);
32
+ if (nodeType === "any" || nodeType.includes("HTMLIFrameElement")) {
33
+ return true;
34
+ }
35
+ }
36
+ if (isCreateElementIFrameCall(node)) {
37
+ return true;
38
+ }
39
+ if (node.type === "Identifier") {
40
+ const normalizedName = node.name.toLowerCase();
41
+ return normalizedName === "frame" || normalizedName.endsWith("iframe");
42
+ }
43
+ if (node.type !== "MemberExpression") {
44
+ return false;
45
+ }
46
+ const propertyName = getMemberPropertyName(node);
47
+ if (typeof propertyName !== "string") {
48
+ return false;
49
+ }
50
+ return propertyName.toLowerCase().endsWith("iframe");
51
+ };
52
+ /** Rule implementation. */
53
+ const rule = createRule({
54
+ create(context) {
55
+ const fullTypeChecker = getFullTypeChecker(context);
56
+ return {
57
+ AssignmentExpression(node) {
58
+ if (node.left.type !== "MemberExpression") {
59
+ return;
60
+ }
61
+ if (getMemberPropertyName(node.left) !== "srcdoc") {
62
+ return;
63
+ }
64
+ if (getStaticStringValue(node.right) === "") {
65
+ return;
66
+ }
67
+ if (!isLikelyIFrameElement(node.left.object, context, fullTypeChecker)) {
68
+ return;
69
+ }
70
+ context.report({
71
+ messageId: "default",
72
+ node: node.right,
73
+ });
74
+ },
75
+ CallExpression(node) {
76
+ if (node.callee.type !== "MemberExpression") {
77
+ return;
78
+ }
79
+ const methodName = getMemberPropertyName(node.callee);
80
+ if (methodName !== "setAttribute" &&
81
+ methodName !== "setAttributeNS") {
82
+ return;
83
+ }
84
+ const [firstArgument, secondArgument] = node.arguments;
85
+ if (firstArgument === undefined ||
86
+ firstArgument.type === "SpreadElement" ||
87
+ getStaticStringValue(firstArgument) !== "srcdoc") {
88
+ return;
89
+ }
90
+ if (secondArgument === undefined ||
91
+ secondArgument.type === "SpreadElement" ||
92
+ getStaticStringValue(secondArgument) === "") {
93
+ return;
94
+ }
95
+ if (!isLikelyIFrameElement(node.callee.object, context, fullTypeChecker)) {
96
+ return;
97
+ }
98
+ context.report({
99
+ messageId: "default",
100
+ node: secondArgument,
101
+ });
102
+ },
103
+ JSXOpeningElement(node) {
104
+ if (!isJsxIframeElement(node)) {
105
+ return;
106
+ }
107
+ for (const attributeNode of node.attributes) {
108
+ if (attributeNode.type !== "JSXAttribute") {
109
+ continue;
110
+ }
111
+ if (getJsxAttributeName(attributeNode) !== "srcdoc") {
112
+ continue;
113
+ }
114
+ if (getStaticJsxAttributeStringValue(attributeNode.value) === "") {
115
+ continue;
116
+ }
117
+ context.report({
118
+ messageId: "default",
119
+ node: attributeNode,
120
+ });
121
+ }
122
+ },
123
+ };
124
+ },
125
+ defaultOptions: [],
126
+ meta: {
127
+ deprecated: false,
128
+ docs: {
129
+ description: "disallow iframe srcdoc assignments and JSX srcDoc attributes that embed inline HTML documents.",
130
+ frozen: false,
131
+ recommended: false,
132
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-iframe-srcdoc",
133
+ },
134
+ messages: {
135
+ default: "Do not populate iframe srcdoc with inline HTML; load a reviewed document URL instead.",
136
+ },
137
+ schema: [],
138
+ type: "problem",
139
+ },
140
+ name: "no-iframe-srcdoc",
141
+ });
142
+ export default rule;
143
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
144
+ //# sourceMappingURL=no-iframe-srcdoc.js.map