eslint-plugin-sdl-2 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +5316 -0
- package/LICENSE +21 -0
- package/README.md +133 -0
- package/dist/_internal/ast-utils.d.ts +17 -0
- package/dist/_internal/ast-utils.d.ts.map +1 -0
- package/dist/_internal/ast-utils.js +93 -0
- package/dist/_internal/ast-utils.js.map +1 -0
- package/dist/_internal/config-references.d.ts +5 -0
- package/dist/_internal/config-references.d.ts.map +1 -0
- package/dist/_internal/config-references.js +13 -0
- package/dist/_internal/config-references.js.map +1 -0
- package/dist/_internal/create-rule.d.ts +9 -0
- package/dist/_internal/create-rule.d.ts.map +1 -0
- package/dist/_internal/create-rule.js +6 -0
- package/dist/_internal/create-rule.js.map +1 -0
- package/dist/_internal/domparser.d.ts +19 -0
- package/dist/_internal/domparser.d.ts.map +1 -0
- package/dist/_internal/domparser.js +45 -0
- package/dist/_internal/domparser.js.map +1 -0
- package/dist/_internal/electron-web-preferences.d.ts +14 -0
- package/dist/_internal/electron-web-preferences.d.ts.map +1 -0
- package/dist/_internal/electron-web-preferences.js +63 -0
- package/dist/_internal/electron-web-preferences.js.map +1 -0
- package/dist/_internal/estree-utils.d.ts +51 -0
- package/dist/_internal/estree-utils.d.ts.map +1 -0
- package/dist/_internal/estree-utils.js +112 -0
- package/dist/_internal/estree-utils.js.map +1 -0
- package/dist/_internal/node-tls-config.d.ts +44 -0
- package/dist/_internal/node-tls-config.d.ts.map +1 -0
- package/dist/_internal/node-tls-config.js +101 -0
- package/dist/_internal/node-tls-config.js.map +1 -0
- package/dist/_internal/rules-registry.d.ts +10 -0
- package/dist/_internal/rules-registry.d.ts.map +1 -0
- package/dist/_internal/rules-registry.js +148 -0
- package/dist/_internal/rules-registry.js.map +1 -0
- package/dist/_internal/script-element.d.ts +7 -0
- package/dist/_internal/script-element.d.ts.map +1 -0
- package/dist/_internal/script-element.js +46 -0
- package/dist/_internal/script-element.js.map +1 -0
- package/dist/_internal/worker-code-loading.d.ts +69 -0
- package/dist/_internal/worker-code-loading.d.ts.map +1 -0
- package/dist/_internal/worker-code-loading.js +134 -0
- package/dist/_internal/worker-code-loading.js.map +1 -0
- package/dist/plugin.cjs +6036 -0
- package/dist/plugin.cjs.map +7 -0
- package/dist/plugin.d.cts +11 -0
- package/dist/plugin.d.ts +11 -0
- package/dist/plugin.d.ts.map +1 -0
- package/dist/plugin.js +235 -0
- package/dist/plugin.js.map +1 -0
- package/dist/rules/no-angular-bypass-sanitizer.d.ts +5 -0
- package/dist/rules/no-angular-bypass-sanitizer.d.ts.map +1 -0
- package/dist/rules/no-angular-bypass-sanitizer.js +32 -0
- package/dist/rules/no-angular-bypass-sanitizer.js.map +1 -0
- package/dist/rules/no-angular-bypass-security-trust-html.d.ts +5 -0
- package/dist/rules/no-angular-bypass-security-trust-html.d.ts.map +1 -0
- package/dist/rules/no-angular-bypass-security-trust-html.js +51 -0
- package/dist/rules/no-angular-bypass-security-trust-html.js.map +1 -0
- package/dist/rules/no-angular-innerhtml-binding.d.ts +5 -0
- package/dist/rules/no-angular-innerhtml-binding.d.ts.map +1 -0
- package/dist/rules/no-angular-innerhtml-binding.js +57 -0
- package/dist/rules/no-angular-innerhtml-binding.js.map +1 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.d.ts +5 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.d.ts.map +1 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.js +32 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.js.map +1 -0
- package/dist/rules/no-angularjs-bypass-sce.d.ts +5 -0
- package/dist/rules/no-angularjs-bypass-sce.d.ts.map +1 -0
- package/dist/rules/no-angularjs-bypass-sce.js +80 -0
- package/dist/rules/no-angularjs-bypass-sce.js.map +1 -0
- package/dist/rules/no-angularjs-enable-svg.d.ts +5 -0
- package/dist/rules/no-angularjs-enable-svg.d.ts.map +1 -0
- package/dist/rules/no-angularjs-enable-svg.js +48 -0
- package/dist/rules/no-angularjs-enable-svg.js.map +1 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts +5 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts.map +1 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js +64 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js.map +1 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.d.ts +5 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.d.ts.map +1 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.js +32 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.js.map +1 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts +5 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts.map +1 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.js +69 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.js.map +1 -0
- package/dist/rules/no-child-process-exec.d.ts +5 -0
- package/dist/rules/no-child-process-exec.d.ts.map +1 -0
- package/dist/rules/no-child-process-exec.js +141 -0
- package/dist/rules/no-child-process-exec.js.map +1 -0
- package/dist/rules/no-child-process-shell-true.d.ts +5 -0
- package/dist/rules/no-child-process-shell-true.d.ts.map +1 -0
- package/dist/rules/no-child-process-shell-true.js +89 -0
- package/dist/rules/no-child-process-shell-true.js.map +1 -0
- package/dist/rules/no-cookies.d.ts +5 -0
- package/dist/rules/no-cookies.d.ts.map +1 -0
- package/dist/rules/no-cookies.js +38 -0
- package/dist/rules/no-cookies.js.map +1 -0
- package/dist/rules/no-document-domain.d.ts +5 -0
- package/dist/rules/no-document-domain.d.ts.map +1 -0
- package/dist/rules/no-document-domain.js +41 -0
- package/dist/rules/no-document-domain.js.map +1 -0
- package/dist/rules/no-document-execcommand-insert-html.d.ts +5 -0
- package/dist/rules/no-document-execcommand-insert-html.d.ts.map +1 -0
- package/dist/rules/no-document-execcommand-insert-html.js +57 -0
- package/dist/rules/no-document-execcommand-insert-html.js.map +1 -0
- package/dist/rules/no-document-parse-html-unsafe.d.ts +5 -0
- package/dist/rules/no-document-parse-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-document-parse-html-unsafe.js +67 -0
- package/dist/rules/no-document-parse-html-unsafe.js.map +1 -0
- package/dist/rules/no-document-write.d.ts +5 -0
- package/dist/rules/no-document-write.d.ts.map +1 -0
- package/dist/rules/no-document-write.js +40 -0
- package/dist/rules/no-document-write.js.map +1 -0
- package/dist/rules/no-domparser-html-without-sanitization.d.ts +5 -0
- package/dist/rules/no-domparser-html-without-sanitization.d.ts.map +1 -0
- package/dist/rules/no-domparser-html-without-sanitization.js +56 -0
- package/dist/rules/no-domparser-html-without-sanitization.js.map +1 -0
- package/dist/rules/no-domparser-svg-without-sanitization.d.ts +5 -0
- package/dist/rules/no-domparser-svg-without-sanitization.d.ts.map +1 -0
- package/dist/rules/no-domparser-svg-without-sanitization.js +56 -0
- package/dist/rules/no-domparser-svg-without-sanitization.js.map +1 -0
- package/dist/rules/no-dynamic-import-unsafe-url.d.ts +5 -0
- package/dist/rules/no-dynamic-import-unsafe-url.d.ts.map +1 -0
- package/dist/rules/no-dynamic-import-unsafe-url.js +47 -0
- package/dist/rules/no-dynamic-import-unsafe-url.js.map +1 -0
- package/dist/rules/no-electron-allow-running-insecure-content.d.ts +5 -0
- package/dist/rules/no-electron-allow-running-insecure-content.d.ts.map +1 -0
- package/dist/rules/no-electron-allow-running-insecure-content.js +30 -0
- package/dist/rules/no-electron-allow-running-insecure-content.js.map +1 -0
- package/dist/rules/no-electron-dangerous-blink-features.d.ts +5 -0
- package/dist/rules/no-electron-dangerous-blink-features.d.ts.map +1 -0
- package/dist/rules/no-electron-dangerous-blink-features.js +89 -0
- package/dist/rules/no-electron-dangerous-blink-features.js.map +1 -0
- package/dist/rules/no-electron-disable-context-isolation.d.ts +5 -0
- package/dist/rules/no-electron-disable-context-isolation.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-context-isolation.js +30 -0
- package/dist/rules/no-electron-disable-context-isolation.js.map +1 -0
- package/dist/rules/no-electron-disable-sandbox.d.ts +5 -0
- package/dist/rules/no-electron-disable-sandbox.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-sandbox.js +30 -0
- package/dist/rules/no-electron-disable-sandbox.js.map +1 -0
- package/dist/rules/no-electron-disable-web-security.d.ts +5 -0
- package/dist/rules/no-electron-disable-web-security.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-web-security.js +30 -0
- package/dist/rules/no-electron-disable-web-security.js.map +1 -0
- package/dist/rules/no-electron-enable-remote-module.d.ts +5 -0
- package/dist/rules/no-electron-enable-remote-module.d.ts.map +1 -0
- package/dist/rules/no-electron-enable-remote-module.js +30 -0
- package/dist/rules/no-electron-enable-remote-module.js.map +1 -0
- package/dist/rules/no-electron-enable-webview-tag.d.ts +5 -0
- package/dist/rules/no-electron-enable-webview-tag.d.ts.map +1 -0
- package/dist/rules/no-electron-enable-webview-tag.js +30 -0
- package/dist/rules/no-electron-enable-webview-tag.js.map +1 -0
- package/dist/rules/no-electron-experimental-features.d.ts +5 -0
- package/dist/rules/no-electron-experimental-features.d.ts.map +1 -0
- package/dist/rules/no-electron-experimental-features.js +30 -0
- package/dist/rules/no-electron-experimental-features.js.map +1 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts +5 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts.map +1 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.js +108 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.js.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts +5 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.js +91 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.js.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts +5 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.js +75 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.js.map +1 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.d.ts +5 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.js +75 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.js.map +1 -0
- package/dist/rules/no-electron-node-integration.d.ts +5 -0
- package/dist/rules/no-electron-node-integration.d.ts.map +1 -0
- package/dist/rules/no-electron-node-integration.js +52 -0
- package/dist/rules/no-electron-node-integration.js.map +1 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts +5 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts.map +1 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.js +63 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.js.map +1 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.d.ts +5 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.d.ts.map +1 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.js +90 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.js.map +1 -0
- package/dist/rules/no-electron-unrestricted-navigation.d.ts +5 -0
- package/dist/rules/no-electron-unrestricted-navigation.d.ts.map +1 -0
- package/dist/rules/no-electron-unrestricted-navigation.js +100 -0
- package/dist/rules/no-electron-unrestricted-navigation.js.map +1 -0
- package/dist/rules/no-electron-untrusted-open-external.d.ts +5 -0
- package/dist/rules/no-electron-untrusted-open-external.d.ts.map +1 -0
- package/dist/rules/no-electron-untrusted-open-external.js +92 -0
- package/dist/rules/no-electron-untrusted-open-external.js.map +1 -0
- package/dist/rules/no-electron-webview-allowpopups.d.ts +5 -0
- package/dist/rules/no-electron-webview-allowpopups.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-allowpopups.js +85 -0
- package/dist/rules/no-electron-webview-allowpopups.js.map +1 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts +5 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.js +88 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.js.map +1 -0
- package/dist/rules/no-electron-webview-node-integration.d.ts +5 -0
- package/dist/rules/no-electron-webview-node-integration.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-node-integration.js +107 -0
- package/dist/rules/no-electron-webview-node-integration.js.map +1 -0
- package/dist/rules/no-html-method.d.ts +5 -0
- package/dist/rules/no-html-method.d.ts.map +1 -0
- package/dist/rules/no-html-method.js +42 -0
- package/dist/rules/no-html-method.js.map +1 -0
- package/dist/rules/no-http-request-to-insecure-protocol.d.ts +5 -0
- package/dist/rules/no-http-request-to-insecure-protocol.d.ts.map +1 -0
- package/dist/rules/no-http-request-to-insecure-protocol.js +94 -0
- package/dist/rules/no-http-request-to-insecure-protocol.js.map +1 -0
- package/dist/rules/no-iframe-srcdoc.d.ts +5 -0
- package/dist/rules/no-iframe-srcdoc.d.ts.map +1 -0
- package/dist/rules/no-iframe-srcdoc.js +144 -0
- package/dist/rules/no-iframe-srcdoc.js.map +1 -0
- package/dist/rules/no-inner-html.d.ts +5 -0
- package/dist/rules/no-inner-html.d.ts.map +1 -0
- package/dist/rules/no-inner-html.js +67 -0
- package/dist/rules/no-inner-html.js.map +1 -0
- package/dist/rules/no-insecure-random.d.ts +5 -0
- package/dist/rules/no-insecure-random.d.ts.map +1 -0
- package/dist/rules/no-insecure-random.js +95 -0
- package/dist/rules/no-insecure-random.js.map +1 -0
- package/dist/rules/no-insecure-tls-agent-options.d.ts +5 -0
- package/dist/rules/no-insecure-tls-agent-options.d.ts.map +1 -0
- package/dist/rules/no-insecure-tls-agent-options.js +73 -0
- package/dist/rules/no-insecure-tls-agent-options.js.map +1 -0
- package/dist/rules/no-insecure-url.d.ts +12 -0
- package/dist/rules/no-insecure-url.d.ts.map +1 -0
- package/dist/rules/no-insecure-url.js +142 -0
- package/dist/rules/no-insecure-url.js.map +1 -0
- package/dist/rules/no-location-javascript-url.d.ts +5 -0
- package/dist/rules/no-location-javascript-url.d.ts.map +1 -0
- package/dist/rules/no-location-javascript-url.js +98 -0
- package/dist/rules/no-location-javascript-url.js.map +1 -0
- package/dist/rules/no-message-event-without-origin-check.d.ts +5 -0
- package/dist/rules/no-message-event-without-origin-check.d.ts.map +1 -0
- package/dist/rules/no-message-event-without-origin-check.js +183 -0
- package/dist/rules/no-message-event-without-origin-check.js.map +1 -0
- package/dist/rules/no-msapp-exec-unsafe.d.ts +5 -0
- package/dist/rules/no-msapp-exec-unsafe.d.ts.map +1 -0
- package/dist/rules/no-msapp-exec-unsafe.js +32 -0
- package/dist/rules/no-msapp-exec-unsafe.js.map +1 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts +5 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts.map +1 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.js +95 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.js.map +1 -0
- package/dist/rules/no-node-tls-legacy-protocol.d.ts +5 -0
- package/dist/rules/no-node-tls-legacy-protocol.d.ts.map +1 -0
- package/dist/rules/no-node-tls-legacy-protocol.js +106 -0
- package/dist/rules/no-node-tls-legacy-protocol.js.map +1 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts +5 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts.map +1 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.js +93 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.js.map +1 -0
- package/dist/rules/no-node-tls-security-level-zero.d.ts +5 -0
- package/dist/rules/no-node-tls-security-level-zero.d.ts.map +1 -0
- package/dist/rules/no-node-tls-security-level-zero.js +80 -0
- package/dist/rules/no-node-tls-security-level-zero.js.map +1 -0
- package/dist/rules/no-node-vm-run-in-context.d.ts +5 -0
- package/dist/rules/no-node-vm-run-in-context.d.ts.map +1 -0
- package/dist/rules/no-node-vm-run-in-context.js +186 -0
- package/dist/rules/no-node-vm-run-in-context.js.map +1 -0
- package/dist/rules/no-node-vm-source-text-module.d.ts +5 -0
- package/dist/rules/no-node-vm-source-text-module.d.ts.map +1 -0
- package/dist/rules/no-node-vm-source-text-module.js +126 -0
- package/dist/rules/no-node-vm-source-text-module.js.map +1 -0
- package/dist/rules/no-node-worker-threads-eval.d.ts +5 -0
- package/dist/rules/no-node-worker-threads-eval.d.ts.map +1 -0
- package/dist/rules/no-node-worker-threads-eval.js +151 -0
- package/dist/rules/no-node-worker-threads-eval.js.map +1 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.d.ts +5 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.d.ts.map +1 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.js +48 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.js.map +1 -0
- package/dist/rules/no-postmessage-star-origin.d.ts +5 -0
- package/dist/rules/no-postmessage-star-origin.d.ts.map +1 -0
- package/dist/rules/no-postmessage-star-origin.js +58 -0
- package/dist/rules/no-postmessage-star-origin.js.map +1 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.d.ts +5 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.d.ts.map +1 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.js +80 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.js.map +1 -0
- package/dist/rules/no-range-create-contextual-fragment.d.ts +5 -0
- package/dist/rules/no-range-create-contextual-fragment.d.ts.map +1 -0
- package/dist/rules/no-range-create-contextual-fragment.js +64 -0
- package/dist/rules/no-range-create-contextual-fragment.js.map +1 -0
- package/dist/rules/no-script-src-data-url.d.ts +5 -0
- package/dist/rules/no-script-src-data-url.d.ts.map +1 -0
- package/dist/rules/no-script-src-data-url.js +108 -0
- package/dist/rules/no-script-src-data-url.js.map +1 -0
- package/dist/rules/no-script-text.d.ts +5 -0
- package/dist/rules/no-script-text.d.ts.map +1 -0
- package/dist/rules/no-script-text.js +52 -0
- package/dist/rules/no-script-text.js.map +1 -0
- package/dist/rules/no-service-worker-unsafe-script-url.d.ts +5 -0
- package/dist/rules/no-service-worker-unsafe-script-url.d.ts.map +1 -0
- package/dist/rules/no-service-worker-unsafe-script-url.js +52 -0
- package/dist/rules/no-service-worker-unsafe-script-url.js.map +1 -0
- package/dist/rules/no-set-html-unsafe.d.ts +5 -0
- package/dist/rules/no-set-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-set-html-unsafe.js +48 -0
- package/dist/rules/no-set-html-unsafe.js.map +1 -0
- package/dist/rules/no-trusted-types-policy-pass-through.d.ts +5 -0
- package/dist/rules/no-trusted-types-policy-pass-through.d.ts.map +1 -0
- package/dist/rules/no-trusted-types-policy-pass-through.js +115 -0
- package/dist/rules/no-trusted-types-policy-pass-through.js.map +1 -0
- package/dist/rules/no-unsafe-alloc.d.ts +5 -0
- package/dist/rules/no-unsafe-alloc.d.ts.map +1 -0
- package/dist/rules/no-unsafe-alloc.js +51 -0
- package/dist/rules/no-unsafe-alloc.js.map +1 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts +5 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts.map +1 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.js +89 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.js.map +1 -0
- package/dist/rules/no-window-open-without-noopener.d.ts +5 -0
- package/dist/rules/no-window-open-without-noopener.d.ts.map +1 -0
- package/dist/rules/no-window-open-without-noopener.js +84 -0
- package/dist/rules/no-window-open-without-noopener.js.map +1 -0
- package/dist/rules/no-winjs-html-unsafe.d.ts +5 -0
- package/dist/rules/no-winjs-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-winjs-html-unsafe.js +32 -0
- package/dist/rules/no-winjs-html-unsafe.js.map +1 -0
- package/dist/rules/no-worker-blob-url.d.ts +5 -0
- package/dist/rules/no-worker-blob-url.d.ts.map +1 -0
- package/dist/rules/no-worker-blob-url.js +64 -0
- package/dist/rules/no-worker-blob-url.js.map +1 -0
- package/dist/rules/no-worker-data-url.d.ts +5 -0
- package/dist/rules/no-worker-data-url.d.ts.map +1 -0
- package/dist/rules/no-worker-data-url.js +67 -0
- package/dist/rules/no-worker-data-url.js.map +1 -0
- package/docs/rules/getting-started.md +70 -0
- package/docs/rules/no-angular-bypass-sanitizer.md +69 -0
- package/docs/rules/no-angular-bypass-security-trust-html.md +59 -0
- package/docs/rules/no-angular-innerhtml-binding.md +59 -0
- package/docs/rules/no-angular-sanitization-trusted-urls.md +64 -0
- package/docs/rules/no-angularjs-bypass-sce.md +64 -0
- package/docs/rules/no-angularjs-enable-svg.md +59 -0
- package/docs/rules/no-angularjs-ng-bind-html-without-sanitize.md +59 -0
- package/docs/rules/no-angularjs-sanitization-whitelist.md +63 -0
- package/docs/rules/no-angularjs-sce-resource-url-wildcard.md +62 -0
- package/docs/rules/no-child-process-exec.md +101 -0
- package/docs/rules/no-child-process-shell-true.md +59 -0
- package/docs/rules/no-cookies.md +61 -0
- package/docs/rules/no-document-domain.md +59 -0
- package/docs/rules/no-document-execcommand-insert-html.md +69 -0
- package/docs/rules/no-document-parse-html-unsafe.md +72 -0
- package/docs/rules/no-document-write.md +64 -0
- package/docs/rules/no-domparser-html-without-sanitization.md +59 -0
- package/docs/rules/no-domparser-svg-without-sanitization.md +71 -0
- package/docs/rules/no-dynamic-import-unsafe-url.md +81 -0
- package/docs/rules/no-electron-allow-running-insecure-content.md +69 -0
- package/docs/rules/no-electron-dangerous-blink-features.md +77 -0
- package/docs/rules/no-electron-disable-context-isolation.md +69 -0
- package/docs/rules/no-electron-disable-sandbox.md +69 -0
- package/docs/rules/no-electron-disable-web-security.md +69 -0
- package/docs/rules/no-electron-enable-remote-module.md +69 -0
- package/docs/rules/no-electron-enable-webview-tag.md +77 -0
- package/docs/rules/no-electron-experimental-features.md +77 -0
- package/docs/rules/no-electron-expose-raw-ipc-renderer.md +79 -0
- package/docs/rules/no-electron-insecure-certificate-error-handler.md +72 -0
- package/docs/rules/no-electron-insecure-certificate-verify-proc.md +63 -0
- package/docs/rules/no-electron-insecure-permission-request-handler.md +67 -0
- package/docs/rules/no-electron-node-integration.md +70 -0
- package/docs/rules/no-electron-permission-check-handler-allow-all.md +66 -0
- package/docs/rules/no-electron-unchecked-ipc-sender.md +62 -0
- package/docs/rules/no-electron-unrestricted-navigation.md +64 -0
- package/docs/rules/no-electron-untrusted-open-external.md +65 -0
- package/docs/rules/no-electron-webview-allowpopups.md +59 -0
- package/docs/rules/no-electron-webview-insecure-webpreferences.md +84 -0
- package/docs/rules/no-electron-webview-node-integration.md +59 -0
- package/docs/rules/no-html-method.md +58 -0
- package/docs/rules/no-http-request-to-insecure-protocol.md +59 -0
- package/docs/rules/no-iframe-srcdoc.md +76 -0
- package/docs/rules/no-inner-html.md +65 -0
- package/docs/rules/no-insecure-random.md +66 -0
- package/docs/rules/no-insecure-tls-agent-options.md +59 -0
- package/docs/rules/no-insecure-url.md +72 -0
- package/docs/rules/no-location-javascript-url.md +59 -0
- package/docs/rules/no-message-event-without-origin-check.md +82 -0
- package/docs/rules/no-msapp-exec-unsafe.md +59 -0
- package/docs/rules/no-node-tls-check-server-identity-bypass.md +88 -0
- package/docs/rules/no-node-tls-legacy-protocol.md +80 -0
- package/docs/rules/no-node-tls-reject-unauthorized-zero.md +61 -0
- package/docs/rules/no-node-tls-security-level-zero.md +77 -0
- package/docs/rules/no-node-vm-run-in-context.md +89 -0
- package/docs/rules/no-node-vm-source-text-module.md +79 -0
- package/docs/rules/no-node-worker-threads-eval.md +82 -0
- package/docs/rules/no-nonnull-assertion-on-security-input.md +59 -0
- package/docs/rules/no-postmessage-star-origin.md +59 -0
- package/docs/rules/no-postmessage-without-origin-allowlist.md +59 -0
- package/docs/rules/no-range-create-contextual-fragment.md +64 -0
- package/docs/rules/no-script-src-data-url.md +83 -0
- package/docs/rules/no-script-text.md +80 -0
- package/docs/rules/no-service-worker-unsafe-script-url.md +85 -0
- package/docs/rules/no-set-html-unsafe.md +64 -0
- package/docs/rules/no-trusted-types-policy-pass-through.md +68 -0
- package/docs/rules/no-unsafe-alloc.md +62 -0
- package/docs/rules/no-unsafe-cast-to-trusted-types.md +59 -0
- package/docs/rules/no-window-open-without-noopener.md +63 -0
- package/docs/rules/no-winjs-html-unsafe.md +60 -0
- package/docs/rules/no-worker-blob-url.md +86 -0
- package/docs/rules/no-worker-data-url.md +85 -0
- package/docs/rules/overview.md +111 -0
- package/docs/rules/presets/angular.md +35 -0
- package/docs/rules/presets/angularjs.md +36 -0
- package/docs/rules/presets/common.md +59 -0
- package/docs/rules/presets/electron.md +51 -0
- package/docs/rules/presets/index.md +26 -0
- package/docs/rules/presets/node.md +43 -0
- package/docs/rules/presets/react.md +33 -0
- package/docs/rules/presets/recommended.md +104 -0
- package/docs/rules/presets/required.md +99 -0
- package/docs/rules/presets/typescript.md +34 -0
- package/package.json +583 -0
|
@@ -0,0 +1,85 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
const isJsxWebviewElement = (node) => {
|
|
3
|
+
if (node.name.type === "JSXIdentifier") {
|
|
4
|
+
return node.name.name.toLowerCase() === "webview";
|
|
5
|
+
}
|
|
6
|
+
return false;
|
|
7
|
+
};
|
|
8
|
+
const getJsxAttributeName = (attributeNode) => {
|
|
9
|
+
if (attributeNode.name.type !== "JSXIdentifier") {
|
|
10
|
+
return undefined;
|
|
11
|
+
}
|
|
12
|
+
return attributeNode.name.name.toLowerCase();
|
|
13
|
+
};
|
|
14
|
+
const isTruthyJsxAttributeValue = (attributeValue) => {
|
|
15
|
+
if (attributeValue === null) {
|
|
16
|
+
return true;
|
|
17
|
+
}
|
|
18
|
+
if (attributeValue.type === "Literal") {
|
|
19
|
+
if (typeof attributeValue.value === "boolean") {
|
|
20
|
+
return attributeValue.value;
|
|
21
|
+
}
|
|
22
|
+
if (typeof attributeValue.value === "string") {
|
|
23
|
+
return attributeValue.value.toLowerCase() !== "false";
|
|
24
|
+
}
|
|
25
|
+
return false;
|
|
26
|
+
}
|
|
27
|
+
if (attributeValue.type !== "JSXExpressionContainer") {
|
|
28
|
+
return false;
|
|
29
|
+
}
|
|
30
|
+
if (attributeValue.expression.type === "Literal" &&
|
|
31
|
+
typeof attributeValue.expression.value === "boolean") {
|
|
32
|
+
return attributeValue.expression.value;
|
|
33
|
+
}
|
|
34
|
+
return true;
|
|
35
|
+
};
|
|
36
|
+
/** Rule implementation. */
|
|
37
|
+
const rule = createRule({
|
|
38
|
+
create(context) {
|
|
39
|
+
return {
|
|
40
|
+
JSXOpeningElement(node) {
|
|
41
|
+
if (!isJsxWebviewElement(node)) {
|
|
42
|
+
return;
|
|
43
|
+
}
|
|
44
|
+
for (const attributeNode of node.attributes) {
|
|
45
|
+
if (attributeNode.type !== "JSXAttribute") {
|
|
46
|
+
continue;
|
|
47
|
+
}
|
|
48
|
+
if (getJsxAttributeName(attributeNode) !== "allowpopups") {
|
|
49
|
+
continue;
|
|
50
|
+
}
|
|
51
|
+
if (!isTruthyJsxAttributeValue(attributeNode.value)) {
|
|
52
|
+
continue;
|
|
53
|
+
}
|
|
54
|
+
context.report({
|
|
55
|
+
fix(fixer) {
|
|
56
|
+
return fixer.remove(attributeNode);
|
|
57
|
+
},
|
|
58
|
+
messageId: "default",
|
|
59
|
+
node: attributeNode,
|
|
60
|
+
});
|
|
61
|
+
}
|
|
62
|
+
},
|
|
63
|
+
};
|
|
64
|
+
},
|
|
65
|
+
defaultOptions: [],
|
|
66
|
+
meta: {
|
|
67
|
+
deprecated: false,
|
|
68
|
+
docs: {
|
|
69
|
+
description: "disallow enabling allowpopups in Electron webview elements.",
|
|
70
|
+
frozen: false,
|
|
71
|
+
recommended: false,
|
|
72
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-allowpopups",
|
|
73
|
+
},
|
|
74
|
+
fixable: "code",
|
|
75
|
+
messages: {
|
|
76
|
+
default: "Do not enable allowpopups on Electron webview elements.",
|
|
77
|
+
},
|
|
78
|
+
schema: [],
|
|
79
|
+
type: "problem",
|
|
80
|
+
},
|
|
81
|
+
name: "no-electron-webview-allowpopups",
|
|
82
|
+
});
|
|
83
|
+
export default rule;
|
|
84
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
85
|
+
//# sourceMappingURL=no-electron-webview-allowpopups.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-webview-allowpopups.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-allowpopups.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE;IACtE,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QACrC,OAAO,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;IACtD,CAAC;IAED,OAAO,KAAK,CAAC;AACjB,CAAC,CAAC;AAEF,MAAM,mBAAmB,GAAG,CACxB,aAAoC,EAClB,EAAE;IACpB,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;AACjD,CAAC,CAAC;AAEF,MAAM,yBAAyB,GAAG,CAC9B,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACpC,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5C,OAAO,cAAc,CAAC,KAAK,CAAC;QAChC,CAAC;QAED,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC3C,OAAO,cAAc,CAAC,KAAK,CAAC,WAAW,EAAE,KAAK,OAAO,CAAC;QAC1D,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,wBAAwB,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,UAAU,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,KAAK,SAAS,EACtD,CAAC;QACC,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,IAAI,CAAC;AAChB,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,IAAI,mBAAmB,CAAC,aAAa,CAAC,KAAK,aAAa,EAAE,CAAC;wBACvD,SAAS;oBACb,CAAC;oBAED,IAAI,CAAC,yBAAyB,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;wBAClD,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,GAAG,CAAC,KAAK;4BACL,OAAO,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;wBACvC,CAAC;wBACD,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,6DAA6D;YACjE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,6FAA6F;SACrG;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EAAE,yDAAyD;SACrE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,iCAAiC;CAC1C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-webview-insecure-webpreferences.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-webview-insecure-webpreferences.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA+CzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA+DtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,88 @@
|
|
|
1
|
+
import { arrayJoin, isEmpty } from "ts-extras";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
import { getStaticJsxAttributeStringValue } from "../_internal/estree-utils.js";
|
|
4
|
+
const UNSAFE_WEBPREFERENCES_PATTERNS = [
|
|
5
|
+
{
|
|
6
|
+
flagName: "allowRunningInsecureContent",
|
|
7
|
+
pattern: /\ballowrunninginsecurecontent\s*=\s*(?:1|on|true|yes)\b/iu,
|
|
8
|
+
},
|
|
9
|
+
{
|
|
10
|
+
flagName: "contextIsolation",
|
|
11
|
+
pattern: /\bcontextisolation\s*=\s*(?:0|false|no|off)\b/iu,
|
|
12
|
+
},
|
|
13
|
+
{
|
|
14
|
+
flagName: "experimentalFeatures",
|
|
15
|
+
pattern: /\bexperimentalfeatures\s*=\s*(?:1|on|true|yes)\b/iu,
|
|
16
|
+
},
|
|
17
|
+
{
|
|
18
|
+
flagName: "sandbox",
|
|
19
|
+
pattern: /\bsandbox\s*=\s*(?:0|false|no|off)\b/iu,
|
|
20
|
+
},
|
|
21
|
+
{
|
|
22
|
+
flagName: "webSecurity",
|
|
23
|
+
pattern: /\bwebsecurity\s*=\s*(?:0|false|no|off)\b/iu,
|
|
24
|
+
},
|
|
25
|
+
];
|
|
26
|
+
const isJsxWebviewElement = (node) => node.name.type === "JSXIdentifier" &&
|
|
27
|
+
node.name.name.toLowerCase() === "webview";
|
|
28
|
+
const getJsxAttributeName = (attributeNode) => {
|
|
29
|
+
if (attributeNode.name.type === "JSXIdentifier") {
|
|
30
|
+
return attributeNode.name.name.toLowerCase();
|
|
31
|
+
}
|
|
32
|
+
return `${attributeNode.name.namespace.name}:${attributeNode.name.name.name}`.toLowerCase();
|
|
33
|
+
};
|
|
34
|
+
const getUnsafeWebPreferencesFlags = (attributeValue) => UNSAFE_WEBPREFERENCES_PATTERNS.flatMap(({ flagName, pattern }) => pattern.test(attributeValue) ? [flagName] : []);
|
|
35
|
+
/** Rule implementation. */
|
|
36
|
+
const rule = createRule({
|
|
37
|
+
create(context) {
|
|
38
|
+
return {
|
|
39
|
+
JSXOpeningElement(node) {
|
|
40
|
+
if (!isJsxWebviewElement(node)) {
|
|
41
|
+
return;
|
|
42
|
+
}
|
|
43
|
+
for (const attributeNode of node.attributes) {
|
|
44
|
+
if (attributeNode.type !== "JSXAttribute") {
|
|
45
|
+
continue;
|
|
46
|
+
}
|
|
47
|
+
if (getJsxAttributeName(attributeNode) !== "webpreferences") {
|
|
48
|
+
continue;
|
|
49
|
+
}
|
|
50
|
+
const staticValue = getStaticJsxAttributeStringValue(attributeNode.value);
|
|
51
|
+
if (typeof staticValue !== "string") {
|
|
52
|
+
continue;
|
|
53
|
+
}
|
|
54
|
+
const unsafeFlags = getUnsafeWebPreferencesFlags(staticValue);
|
|
55
|
+
if (isEmpty(unsafeFlags)) {
|
|
56
|
+
continue;
|
|
57
|
+
}
|
|
58
|
+
context.report({
|
|
59
|
+
data: {
|
|
60
|
+
flags: arrayJoin(unsafeFlags, ", "),
|
|
61
|
+
},
|
|
62
|
+
messageId: "default",
|
|
63
|
+
node: attributeNode,
|
|
64
|
+
});
|
|
65
|
+
}
|
|
66
|
+
},
|
|
67
|
+
};
|
|
68
|
+
},
|
|
69
|
+
defaultOptions: [],
|
|
70
|
+
meta: {
|
|
71
|
+
deprecated: false,
|
|
72
|
+
docs: {
|
|
73
|
+
description: "disallow unsafe Electron webview webpreferences string flags.",
|
|
74
|
+
frozen: false,
|
|
75
|
+
recommended: false,
|
|
76
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-insecure-webpreferences",
|
|
77
|
+
},
|
|
78
|
+
messages: {
|
|
79
|
+
default: "Do not enable unsafe Electron webview webpreferences flags: {{flags}}.",
|
|
80
|
+
},
|
|
81
|
+
schema: [],
|
|
82
|
+
type: "problem",
|
|
83
|
+
},
|
|
84
|
+
name: "no-electron-webview-insecure-webpreferences",
|
|
85
|
+
});
|
|
86
|
+
export default rule;
|
|
87
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
88
|
+
//# sourceMappingURL=no-electron-webview-insecure-webpreferences.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-webview-insecure-webpreferences.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-insecure-webpreferences.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,SAAS,EAAE,OAAO,EAAE,MAAM,WAAW,CAAC;AAE/C,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,gCAAgC,EAAE,MAAM,8BAA8B,CAAC;AAIhF,MAAM,8BAA8B,GAAG;IACnC;QACI,QAAQ,EAAE,6BAA6B;QACvC,OAAO,EAAE,2DAA2D;KACvE;IACD;QACI,QAAQ,EAAE,kBAAkB;QAC5B,OAAO,EAAE,iDAAiD;KAC7D;IACD;QACI,QAAQ,EAAE,sBAAsB;QAChC,OAAO,EAAE,oDAAoD;KAChE;IACD;QACI,QAAQ,EAAE,SAAS;QACnB,OAAO,EAAE,wCAAwC;KACpD;IACD;QACI,QAAQ,EAAE,aAAa;QACvB,OAAO,EAAE,4CAA4C;KACxD;CACK,CAAC;AAEX,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE,CACtE,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe;IAClC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;AAE/C,MAAM,mBAAmB,GAAG,CAAC,aAAoC,EAAU,EAAE;IACzE,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IACjD,CAAC;IAED,OAAO,GAAG,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;AAChG,CAAC,CAAC;AAEF,MAAM,4BAA4B,GAAG,CACjC,cAAsB,EACL,EAAE,CACnB,8BAA8B,CAAC,OAAO,CAAC,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,EAAE,EAAE,CAC7D,OAAO,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,EAAE,CACjD,CAAC;AAEN,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,IACI,mBAAmB,CAAC,aAAa,CAAC,KAAK,gBAAgB,EACzD,CAAC;wBACC,SAAS;oBACb,CAAC;oBAED,MAAM,WAAW,GAAG,gCAAgC,CAChD,aAAa,CAAC,KAAK,CACtB,CAAC;oBAEF,IAAI,OAAO,WAAW,KAAK,QAAQ,EAAE,CAAC;wBAClC,SAAS;oBACb,CAAC;oBAED,MAAM,WAAW,GACb,4BAA4B,CAAC,WAAW,CAAC,CAAC;oBAE9C,IAAI,OAAO,CAAC,WAAW,CAAC,EAAE,CAAC;wBACvB,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,IAAI,EAAE;4BACF,KAAK,EAAE,SAAS,CAAC,WAAW,EAAE,IAAI,CAAC;yBACtC;wBACD,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+DAA+D;YACnE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,yGAAyG;SACjH;QACD,QAAQ,EAAE;YACN,OAAO,EACH,wEAAwE;SAC/E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,6CAA6C;CACtD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-webview-node-integration.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-webview-node-integration.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA2EzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAoEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
const isJsxWebviewElement = (node) => node.name.type === "JSXIdentifier" &&
|
|
3
|
+
node.name.name.toLowerCase() === "webview";
|
|
4
|
+
const getJsxAttributeName = (attributeNode) => {
|
|
5
|
+
if (attributeNode.name.type === "JSXIdentifier") {
|
|
6
|
+
return attributeNode.name.name.toLowerCase();
|
|
7
|
+
}
|
|
8
|
+
return `${attributeNode.name.namespace.name}:${attributeNode.name.name.name}`.toLowerCase();
|
|
9
|
+
};
|
|
10
|
+
const isNodeIntegrationAttribute = (attributeName) => {
|
|
11
|
+
const normalizedName = attributeName.toLowerCase();
|
|
12
|
+
return (normalizedName === "nodeintegration" ||
|
|
13
|
+
normalizedName === "nodeintegrationinsubframes");
|
|
14
|
+
};
|
|
15
|
+
const isTruthyJsxAttributeValue = (attributeValue) => {
|
|
16
|
+
if (attributeValue === null) {
|
|
17
|
+
return true;
|
|
18
|
+
}
|
|
19
|
+
if (attributeValue.type === "Literal") {
|
|
20
|
+
if (typeof attributeValue.value === "boolean") {
|
|
21
|
+
return attributeValue.value;
|
|
22
|
+
}
|
|
23
|
+
if (typeof attributeValue.value === "string") {
|
|
24
|
+
return attributeValue.value.toLowerCase() !== "false";
|
|
25
|
+
}
|
|
26
|
+
return false;
|
|
27
|
+
}
|
|
28
|
+
if (attributeValue.type !== "JSXExpressionContainer") {
|
|
29
|
+
return false;
|
|
30
|
+
}
|
|
31
|
+
if (attributeValue.expression.type === "Literal" &&
|
|
32
|
+
typeof attributeValue.expression.value === "boolean") {
|
|
33
|
+
return attributeValue.expression.value;
|
|
34
|
+
}
|
|
35
|
+
return true;
|
|
36
|
+
};
|
|
37
|
+
const webPreferencesHasNodeIntegration = (attributeValue) => {
|
|
38
|
+
if (attributeValue === null) {
|
|
39
|
+
return false;
|
|
40
|
+
}
|
|
41
|
+
if (attributeValue.type === "Literal" &&
|
|
42
|
+
typeof attributeValue.value === "string") {
|
|
43
|
+
return /\bnodeintegration\b/iu.test(attributeValue.value);
|
|
44
|
+
}
|
|
45
|
+
return false;
|
|
46
|
+
};
|
|
47
|
+
/** Rule implementation. */
|
|
48
|
+
const rule = createRule({
|
|
49
|
+
create(context) {
|
|
50
|
+
return {
|
|
51
|
+
JSXOpeningElement(node) {
|
|
52
|
+
if (!isJsxWebviewElement(node)) {
|
|
53
|
+
return;
|
|
54
|
+
}
|
|
55
|
+
for (const attributeNode of node.attributes) {
|
|
56
|
+
if (attributeNode.type !== "JSXAttribute") {
|
|
57
|
+
continue;
|
|
58
|
+
}
|
|
59
|
+
const attributeName = getJsxAttributeName(attributeNode);
|
|
60
|
+
if (isNodeIntegrationAttribute(attributeName)) {
|
|
61
|
+
if (!isTruthyJsxAttributeValue(attributeNode.value)) {
|
|
62
|
+
continue;
|
|
63
|
+
}
|
|
64
|
+
context.report({
|
|
65
|
+
fix(fixer) {
|
|
66
|
+
return fixer.remove(attributeNode);
|
|
67
|
+
},
|
|
68
|
+
messageId: "default",
|
|
69
|
+
node: attributeNode,
|
|
70
|
+
});
|
|
71
|
+
continue;
|
|
72
|
+
}
|
|
73
|
+
if (attributeName !== "webpreferences") {
|
|
74
|
+
continue;
|
|
75
|
+
}
|
|
76
|
+
if (!webPreferencesHasNodeIntegration(attributeNode.value)) {
|
|
77
|
+
continue;
|
|
78
|
+
}
|
|
79
|
+
context.report({
|
|
80
|
+
messageId: "default",
|
|
81
|
+
node: attributeNode,
|
|
82
|
+
});
|
|
83
|
+
}
|
|
84
|
+
},
|
|
85
|
+
};
|
|
86
|
+
},
|
|
87
|
+
defaultOptions: [],
|
|
88
|
+
meta: {
|
|
89
|
+
deprecated: false,
|
|
90
|
+
docs: {
|
|
91
|
+
description: "disallow node integration flags on Electron webview elements.",
|
|
92
|
+
frozen: false,
|
|
93
|
+
recommended: false,
|
|
94
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-webview-node-integration",
|
|
95
|
+
},
|
|
96
|
+
fixable: "code",
|
|
97
|
+
messages: {
|
|
98
|
+
default: "Do not enable node integration options on Electron webview elements.",
|
|
99
|
+
},
|
|
100
|
+
schema: [],
|
|
101
|
+
type: "problem",
|
|
102
|
+
},
|
|
103
|
+
name: "no-electron-webview-node-integration",
|
|
104
|
+
});
|
|
105
|
+
export default rule;
|
|
106
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
107
|
+
//# sourceMappingURL=no-electron-webview-node-integration.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-webview-node-integration.js","sourceRoot":"","sources":["../../src/rules/no-electron-webview-node-integration.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,mBAAmB,GAAG,CAAC,IAAgC,EAAW,EAAE,CACtE,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe;IAClC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,SAAS,CAAC;AAE/C,MAAM,mBAAmB,GAAG,CAAC,aAAoC,EAAU,EAAE;IACzE,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;IACjD,CAAC;IAED,OAAO,GAAG,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,IAAI,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,CAAC,WAAW,EAAE,CAAC;AAChG,CAAC,CAAC;AAEF,MAAM,0BAA0B,GAAG,CAAC,aAAqB,EAAW,EAAE;IAClE,MAAM,cAAc,GAAG,aAAa,CAAC,WAAW,EAAE,CAAC;IAEnD,OAAO,CACH,cAAc,KAAK,iBAAiB;QACpC,cAAc,KAAK,4BAA4B,CAClD,CAAC;AACN,CAAC,CAAC;AAEF,MAAM,yBAAyB,GAAG,CAC9B,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,IAAI,CAAC;IAChB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;QACpC,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,SAAS,EAAE,CAAC;YAC5C,OAAO,cAAc,CAAC,KAAK,CAAC;QAChC,CAAC;QAED,IAAI,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;YAC3C,OAAO,cAAc,CAAC,KAAK,CAAC,WAAW,EAAE,KAAK,OAAO,CAAC;QAC1D,CAAC;QAED,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,cAAc,CAAC,IAAI,KAAK,wBAAwB,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,UAAU,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,KAAK,SAAS,EACtD,CAAC;QACC,OAAO,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,IAAI,CAAC;AAChB,CAAC,CAAC;AAEF,MAAM,gCAAgC,GAAG,CACrC,cAA8C,EACvC,EAAE;IACT,IAAI,cAAc,KAAK,IAAI,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IACI,cAAc,CAAC,IAAI,KAAK,SAAS;QACjC,OAAO,cAAc,CAAC,KAAK,KAAK,QAAQ,EAC1C,CAAC;QACC,OAAO,uBAAuB,CAAC,IAAI,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;IAC9D,CAAC;IAED,OAAO,KAAK,CAAC;AACjB,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,MAAM,aAAa,GAAG,mBAAmB,CAAC,aAAa,CAAC,CAAC;oBAEzD,IAAI,0BAA0B,CAAC,aAAa,CAAC,EAAE,CAAC;wBAC5C,IAAI,CAAC,yBAAyB,CAAC,aAAa,CAAC,KAAK,CAAC,EAAE,CAAC;4BAClD,SAAS;wBACb,CAAC;wBAED,OAAO,CAAC,MAAM,CAAC;4BACX,GAAG,CAAC,KAAK;gCACL,OAAO,KAAK,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;4BACvC,CAAC;4BACD,SAAS,EAAE,SAAS;4BACpB,IAAI,EAAE,aAAa;yBACtB,CAAC,CAAC;wBAEH,SAAS;oBACb,CAAC;oBAED,IAAI,aAAa,KAAK,gBAAgB,EAAE,CAAC;wBACrC,SAAS;oBACb,CAAC;oBAED,IACI,CAAC,gCAAgC,CAAC,aAAa,CAAC,KAAK,CAAC,EACxD,CAAC;wBACC,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+DAA+D;YACnE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,kGAAkG;SAC1G;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EACH,sEAAsE;SAC7E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,sCAAsC;CAC/C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-html-method.d.ts","sourceRoot":"","sources":["../../src/rules/no-html-method.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA6CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
/** Rule implementation. */
|
|
3
|
+
const rule = createRule({
|
|
4
|
+
create(context) {
|
|
5
|
+
return {
|
|
6
|
+
"CallExpression[arguments.length=1] > MemberExpression.callee[property.name='html']"(node) {
|
|
7
|
+
const parentCall = node.parent;
|
|
8
|
+
if (parentCall.type !== "CallExpression") {
|
|
9
|
+
return;
|
|
10
|
+
}
|
|
11
|
+
const [firstArgument] = parentCall.arguments;
|
|
12
|
+
if (firstArgument?.type === "Literal" &&
|
|
13
|
+
(firstArgument.value === "" || firstArgument.value === null)) {
|
|
14
|
+
return;
|
|
15
|
+
}
|
|
16
|
+
context.report({
|
|
17
|
+
messageId: "default",
|
|
18
|
+
node,
|
|
19
|
+
});
|
|
20
|
+
},
|
|
21
|
+
};
|
|
22
|
+
},
|
|
23
|
+
defaultOptions: [],
|
|
24
|
+
meta: {
|
|
25
|
+
deprecated: false,
|
|
26
|
+
docs: {
|
|
27
|
+
description: "disallow direct html(...) DOM writes (for example jQuery html()) that bypass sanitization.",
|
|
28
|
+
frozen: false,
|
|
29
|
+
recommended: false,
|
|
30
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-html-method",
|
|
31
|
+
},
|
|
32
|
+
messages: {
|
|
33
|
+
default: "Do not write to the DOM directly using html(...).",
|
|
34
|
+
},
|
|
35
|
+
schema: [],
|
|
36
|
+
type: "problem",
|
|
37
|
+
},
|
|
38
|
+
name: "no-html-method",
|
|
39
|
+
});
|
|
40
|
+
export default rule;
|
|
41
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
42
|
+
//# sourceMappingURL=no-html-method.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-html-method.js","sourceRoot":"","sources":["../../src/rules/no-html-method.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAC;IACnD,MAAM,CAAC,OAAO;QACV,OAAO;YACH,oFAAoF,CAChF,IAA+B;gBAE/B,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC;gBAE/B,IAAI,UAAU,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;oBACvC,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,UAAU,CAAC,SAAS,CAAC;gBAE7C,IACI,aAAa,EAAE,IAAI,KAAK,SAAS;oBACjC,CAAC,aAAa,CAAC,KAAK,KAAK,EAAE,IAAI,aAAa,CAAC,KAAK,KAAK,IAAI,CAAC,EAC9D,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,4FAA4F;YAChG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,4EAA4E;SACpF;QACD,QAAQ,EAAE;YACN,OAAO,EAAE,mDAAmD;SAC/D;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,gBAAgB;CACzB,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-http-request-to-insecure-protocol.d.ts","sourceRoot":"","sources":["../../src/rules/no-http-request-to-insecure-protocol.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAkEzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAoEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
import { arrayFirst } from "ts-extras";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
const getMemberPropertyName = (memberExpression) => {
|
|
4
|
+
if (!memberExpression.computed &&
|
|
5
|
+
memberExpression.property.type === "Identifier") {
|
|
6
|
+
return memberExpression.property.name;
|
|
7
|
+
}
|
|
8
|
+
if (memberExpression.property.type === "Literal" &&
|
|
9
|
+
typeof memberExpression.property.value === "string") {
|
|
10
|
+
return memberExpression.property.value;
|
|
11
|
+
}
|
|
12
|
+
return undefined;
|
|
13
|
+
};
|
|
14
|
+
const getStaticStringValue = (node) => {
|
|
15
|
+
if (node.type === "Literal" && typeof node.value === "string") {
|
|
16
|
+
return node.value;
|
|
17
|
+
}
|
|
18
|
+
if (node.type === "TemplateLiteral" && node.expressions.length === 0) {
|
|
19
|
+
return arrayFirst(node.quasis)?.value.cooked ?? undefined;
|
|
20
|
+
}
|
|
21
|
+
return undefined;
|
|
22
|
+
};
|
|
23
|
+
const isInsecureHttpUrl = (value) => /^http:\/\//iu.test(value.trim());
|
|
24
|
+
const isTargetRequestMethod = (node) => {
|
|
25
|
+
if (node.callee.type === "Identifier") {
|
|
26
|
+
return node.callee.name === "fetch";
|
|
27
|
+
}
|
|
28
|
+
if (node.callee.type !== "MemberExpression") {
|
|
29
|
+
return false;
|
|
30
|
+
}
|
|
31
|
+
const methodName = getMemberPropertyName(node.callee);
|
|
32
|
+
if (methodName !== "request" && methodName !== "get") {
|
|
33
|
+
return false;
|
|
34
|
+
}
|
|
35
|
+
if (node.callee.object.type !== "Identifier") {
|
|
36
|
+
return false;
|
|
37
|
+
}
|
|
38
|
+
return (node.callee.object.name === "http" ||
|
|
39
|
+
node.callee.object.name === "https");
|
|
40
|
+
};
|
|
41
|
+
/** Rule implementation. */
|
|
42
|
+
const rule = createRule({
|
|
43
|
+
create(context) {
|
|
44
|
+
return {
|
|
45
|
+
CallExpression(node) {
|
|
46
|
+
if (!isTargetRequestMethod(node)) {
|
|
47
|
+
return;
|
|
48
|
+
}
|
|
49
|
+
const [firstArgument] = node.arguments;
|
|
50
|
+
if (firstArgument === undefined ||
|
|
51
|
+
firstArgument.type === "SpreadElement") {
|
|
52
|
+
return;
|
|
53
|
+
}
|
|
54
|
+
const firstArgumentValue = getStaticStringValue(firstArgument);
|
|
55
|
+
if (typeof firstArgumentValue !== "string" ||
|
|
56
|
+
!isInsecureHttpUrl(firstArgumentValue)) {
|
|
57
|
+
return;
|
|
58
|
+
}
|
|
59
|
+
context.report({
|
|
60
|
+
fix(fixer) {
|
|
61
|
+
const sourceText = context.sourceCode.getText(firstArgument);
|
|
62
|
+
const fixedSourceText = sourceText.replace(/^(?<quote>["'`]?)http:\/\//iu, "$<quote>https://");
|
|
63
|
+
if (fixedSourceText === sourceText) {
|
|
64
|
+
return null;
|
|
65
|
+
}
|
|
66
|
+
return fixer.replaceText(firstArgument, fixedSourceText);
|
|
67
|
+
},
|
|
68
|
+
messageId: "default",
|
|
69
|
+
node: firstArgument,
|
|
70
|
+
});
|
|
71
|
+
},
|
|
72
|
+
};
|
|
73
|
+
},
|
|
74
|
+
defaultOptions: [],
|
|
75
|
+
meta: {
|
|
76
|
+
deprecated: false,
|
|
77
|
+
docs: {
|
|
78
|
+
description: "disallow Node HTTP client calls that use insecure http:// URLs.",
|
|
79
|
+
frozen: false,
|
|
80
|
+
recommended: false,
|
|
81
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-http-request-to-insecure-protocol",
|
|
82
|
+
},
|
|
83
|
+
fixable: "code",
|
|
84
|
+
messages: {
|
|
85
|
+
default: "Use HTTPS endpoints instead of insecure http:// URLs.",
|
|
86
|
+
},
|
|
87
|
+
schema: [],
|
|
88
|
+
type: "problem",
|
|
89
|
+
},
|
|
90
|
+
name: "no-http-request-to-insecure-protocol",
|
|
91
|
+
});
|
|
92
|
+
export default rule;
|
|
93
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
94
|
+
//# sourceMappingURL=no-http-request-to-insecure-protocol.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-http-request-to-insecure-protocol.js","sourceRoot":"","sources":["../../src/rules/no-http-request-to-insecure-protocol.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,WAAW,CAAC;AAEvC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,qBAAqB,GAAG,CAC1B,gBAA2C,EACzB,EAAE;IACpB,IACI,CAAC,gBAAgB,CAAC,QAAQ;QAC1B,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EACjD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,IAAI,CAAC;IAC1C,CAAC;IAED,IACI,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,KAAK,QAAQ,EACrD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG,CACzB,IAAyB,EACP,EAAE;IACpB,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,IAAI,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC5D,OAAO,IAAI,CAAC,KAAK,CAAC;IACtB,CAAC;IAED,IAAI,IAAI,CAAC,IAAI,KAAK,iBAAiB,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACnE,OAAO,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,CAAC,MAAM,IAAI,SAAS,CAAC;IAC9D,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,iBAAiB,GAAG,CAAC,KAAa,EAAW,EAAE,CACjD,cAAc,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,EAAE,CAAC,CAAC;AAEtC,MAAM,qBAAqB,GAAG,CAAC,IAA6B,EAAW,EAAE;IACrE,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACpC,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,OAAO,CAAC;IACxC,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,MAAM,UAAU,GAAG,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAEtD,IAAI,UAAU,KAAK,SAAS,IAAI,UAAU,KAAK,KAAK,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QAC3C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,CACH,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,MAAM;QAClC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,OAAO,CACtC,CAAC;AACN,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,qBAAqB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC/B,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe,EACxC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,kBAAkB,GAAG,oBAAoB,CAAC,aAAa,CAAC,CAAC;gBAE/D,IACI,OAAO,kBAAkB,KAAK,QAAQ;oBACtC,CAAC,iBAAiB,CAAC,kBAAkB,CAAC,EACxC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,GAAG,CAAC,KAAK;wBACL,MAAM,UAAU,GACZ,OAAO,CAAC,UAAU,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC;wBAC9C,MAAM,eAAe,GAAG,UAAU,CAAC,OAAO,CACtC,8BAA8B,EAC9B,kBAAkB,CACrB,CAAC;wBAEF,IAAI,eAAe,KAAK,UAAU,EAAE,CAAC;4BACjC,OAAO,IAAI,CAAC;wBAChB,CAAC;wBAED,OAAO,KAAK,CAAC,WAAW,CACpB,aAAa,EACb,eAAe,CAClB,CAAC;oBACN,CAAC;oBACD,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,iEAAiE;YACrE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,kGAAkG;SAC1G;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EAAE,uDAAuD;SACnE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,sCAAsC;CAC/C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-iframe-srcdoc.d.ts","sourceRoot":"","sources":["../../src/rules/no-iframe-srcdoc.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAqFzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAgItC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,144 @@
|
|
|
1
|
+
import { getFullTypeChecker, getNodeTypeAsString, } from "../_internal/ast-utils.js";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
import { getMemberPropertyName, getStaticJsxAttributeStringValue, getStaticStringValue, } from "../_internal/estree-utils.js";
|
|
4
|
+
const isJsxIframeElement = (node) => {
|
|
5
|
+
if (node.name.type !== "JSXIdentifier") {
|
|
6
|
+
return false;
|
|
7
|
+
}
|
|
8
|
+
return node.name.name.toLowerCase() === "iframe";
|
|
9
|
+
};
|
|
10
|
+
const getJsxAttributeName = (attributeNode) => {
|
|
11
|
+
if (attributeNode.name.type !== "JSXIdentifier") {
|
|
12
|
+
return undefined;
|
|
13
|
+
}
|
|
14
|
+
return attributeNode.name.name.toLowerCase();
|
|
15
|
+
};
|
|
16
|
+
const isCreateElementIFrameCall = (node) => {
|
|
17
|
+
if (node.type !== "CallExpression" ||
|
|
18
|
+
node.callee.type !== "MemberExpression") {
|
|
19
|
+
return false;
|
|
20
|
+
}
|
|
21
|
+
if (getMemberPropertyName(node.callee) !== "createElement") {
|
|
22
|
+
return false;
|
|
23
|
+
}
|
|
24
|
+
const [firstArgument] = node.arguments;
|
|
25
|
+
return (firstArgument !== undefined &&
|
|
26
|
+
firstArgument.type !== "SpreadElement" &&
|
|
27
|
+
getStaticStringValue(firstArgument) === "iframe");
|
|
28
|
+
};
|
|
29
|
+
const isLikelyIFrameElement = (node, context, fullTypeChecker) => {
|
|
30
|
+
if (fullTypeChecker !== undefined) {
|
|
31
|
+
const nodeType = getNodeTypeAsString(fullTypeChecker, node, context);
|
|
32
|
+
if (nodeType === "any" || nodeType.includes("HTMLIFrameElement")) {
|
|
33
|
+
return true;
|
|
34
|
+
}
|
|
35
|
+
}
|
|
36
|
+
if (isCreateElementIFrameCall(node)) {
|
|
37
|
+
return true;
|
|
38
|
+
}
|
|
39
|
+
if (node.type === "Identifier") {
|
|
40
|
+
const normalizedName = node.name.toLowerCase();
|
|
41
|
+
return normalizedName === "frame" || normalizedName.endsWith("iframe");
|
|
42
|
+
}
|
|
43
|
+
if (node.type !== "MemberExpression") {
|
|
44
|
+
return false;
|
|
45
|
+
}
|
|
46
|
+
const propertyName = getMemberPropertyName(node);
|
|
47
|
+
if (typeof propertyName !== "string") {
|
|
48
|
+
return false;
|
|
49
|
+
}
|
|
50
|
+
return propertyName.toLowerCase().endsWith("iframe");
|
|
51
|
+
};
|
|
52
|
+
/** Rule implementation. */
|
|
53
|
+
const rule = createRule({
|
|
54
|
+
create(context) {
|
|
55
|
+
const fullTypeChecker = getFullTypeChecker(context);
|
|
56
|
+
return {
|
|
57
|
+
AssignmentExpression(node) {
|
|
58
|
+
if (node.left.type !== "MemberExpression") {
|
|
59
|
+
return;
|
|
60
|
+
}
|
|
61
|
+
if (getMemberPropertyName(node.left) !== "srcdoc") {
|
|
62
|
+
return;
|
|
63
|
+
}
|
|
64
|
+
if (getStaticStringValue(node.right) === "") {
|
|
65
|
+
return;
|
|
66
|
+
}
|
|
67
|
+
if (!isLikelyIFrameElement(node.left.object, context, fullTypeChecker)) {
|
|
68
|
+
return;
|
|
69
|
+
}
|
|
70
|
+
context.report({
|
|
71
|
+
messageId: "default",
|
|
72
|
+
node: node.right,
|
|
73
|
+
});
|
|
74
|
+
},
|
|
75
|
+
CallExpression(node) {
|
|
76
|
+
if (node.callee.type !== "MemberExpression") {
|
|
77
|
+
return;
|
|
78
|
+
}
|
|
79
|
+
const methodName = getMemberPropertyName(node.callee);
|
|
80
|
+
if (methodName !== "setAttribute" &&
|
|
81
|
+
methodName !== "setAttributeNS") {
|
|
82
|
+
return;
|
|
83
|
+
}
|
|
84
|
+
const [firstArgument, secondArgument] = node.arguments;
|
|
85
|
+
if (firstArgument === undefined ||
|
|
86
|
+
firstArgument.type === "SpreadElement" ||
|
|
87
|
+
getStaticStringValue(firstArgument) !== "srcdoc") {
|
|
88
|
+
return;
|
|
89
|
+
}
|
|
90
|
+
if (secondArgument === undefined ||
|
|
91
|
+
secondArgument.type === "SpreadElement" ||
|
|
92
|
+
getStaticStringValue(secondArgument) === "") {
|
|
93
|
+
return;
|
|
94
|
+
}
|
|
95
|
+
if (!isLikelyIFrameElement(node.callee.object, context, fullTypeChecker)) {
|
|
96
|
+
return;
|
|
97
|
+
}
|
|
98
|
+
context.report({
|
|
99
|
+
messageId: "default",
|
|
100
|
+
node: secondArgument,
|
|
101
|
+
});
|
|
102
|
+
},
|
|
103
|
+
JSXOpeningElement(node) {
|
|
104
|
+
if (!isJsxIframeElement(node)) {
|
|
105
|
+
return;
|
|
106
|
+
}
|
|
107
|
+
for (const attributeNode of node.attributes) {
|
|
108
|
+
if (attributeNode.type !== "JSXAttribute") {
|
|
109
|
+
continue;
|
|
110
|
+
}
|
|
111
|
+
if (getJsxAttributeName(attributeNode) !== "srcdoc") {
|
|
112
|
+
continue;
|
|
113
|
+
}
|
|
114
|
+
if (getStaticJsxAttributeStringValue(attributeNode.value) === "") {
|
|
115
|
+
continue;
|
|
116
|
+
}
|
|
117
|
+
context.report({
|
|
118
|
+
messageId: "default",
|
|
119
|
+
node: attributeNode,
|
|
120
|
+
});
|
|
121
|
+
}
|
|
122
|
+
},
|
|
123
|
+
};
|
|
124
|
+
},
|
|
125
|
+
defaultOptions: [],
|
|
126
|
+
meta: {
|
|
127
|
+
deprecated: false,
|
|
128
|
+
docs: {
|
|
129
|
+
description: "disallow iframe srcdoc assignments and JSX srcDoc attributes that embed inline HTML documents.",
|
|
130
|
+
frozen: false,
|
|
131
|
+
recommended: false,
|
|
132
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-iframe-srcdoc",
|
|
133
|
+
},
|
|
134
|
+
messages: {
|
|
135
|
+
default: "Do not populate iframe srcdoc with inline HTML; load a reviewed document URL instead.",
|
|
136
|
+
},
|
|
137
|
+
schema: [],
|
|
138
|
+
type: "problem",
|
|
139
|
+
},
|
|
140
|
+
name: "no-iframe-srcdoc",
|
|
141
|
+
});
|
|
142
|
+
export default rule;
|
|
143
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
144
|
+
//# sourceMappingURL=no-iframe-srcdoc.js.map
|