eslint-plugin-sdl-2 1.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +5316 -0
- package/LICENSE +21 -0
- package/README.md +133 -0
- package/dist/_internal/ast-utils.d.ts +17 -0
- package/dist/_internal/ast-utils.d.ts.map +1 -0
- package/dist/_internal/ast-utils.js +93 -0
- package/dist/_internal/ast-utils.js.map +1 -0
- package/dist/_internal/config-references.d.ts +5 -0
- package/dist/_internal/config-references.d.ts.map +1 -0
- package/dist/_internal/config-references.js +13 -0
- package/dist/_internal/config-references.js.map +1 -0
- package/dist/_internal/create-rule.d.ts +9 -0
- package/dist/_internal/create-rule.d.ts.map +1 -0
- package/dist/_internal/create-rule.js +6 -0
- package/dist/_internal/create-rule.js.map +1 -0
- package/dist/_internal/domparser.d.ts +19 -0
- package/dist/_internal/domparser.d.ts.map +1 -0
- package/dist/_internal/domparser.js +45 -0
- package/dist/_internal/domparser.js.map +1 -0
- package/dist/_internal/electron-web-preferences.d.ts +14 -0
- package/dist/_internal/electron-web-preferences.d.ts.map +1 -0
- package/dist/_internal/electron-web-preferences.js +63 -0
- package/dist/_internal/electron-web-preferences.js.map +1 -0
- package/dist/_internal/estree-utils.d.ts +51 -0
- package/dist/_internal/estree-utils.d.ts.map +1 -0
- package/dist/_internal/estree-utils.js +112 -0
- package/dist/_internal/estree-utils.js.map +1 -0
- package/dist/_internal/node-tls-config.d.ts +44 -0
- package/dist/_internal/node-tls-config.d.ts.map +1 -0
- package/dist/_internal/node-tls-config.js +101 -0
- package/dist/_internal/node-tls-config.js.map +1 -0
- package/dist/_internal/rules-registry.d.ts +10 -0
- package/dist/_internal/rules-registry.d.ts.map +1 -0
- package/dist/_internal/rules-registry.js +148 -0
- package/dist/_internal/rules-registry.js.map +1 -0
- package/dist/_internal/script-element.d.ts +7 -0
- package/dist/_internal/script-element.d.ts.map +1 -0
- package/dist/_internal/script-element.js +46 -0
- package/dist/_internal/script-element.js.map +1 -0
- package/dist/_internal/worker-code-loading.d.ts +69 -0
- package/dist/_internal/worker-code-loading.d.ts.map +1 -0
- package/dist/_internal/worker-code-loading.js +134 -0
- package/dist/_internal/worker-code-loading.js.map +1 -0
- package/dist/plugin.cjs +6036 -0
- package/dist/plugin.cjs.map +7 -0
- package/dist/plugin.d.cts +11 -0
- package/dist/plugin.d.ts +11 -0
- package/dist/plugin.d.ts.map +1 -0
- package/dist/plugin.js +235 -0
- package/dist/plugin.js.map +1 -0
- package/dist/rules/no-angular-bypass-sanitizer.d.ts +5 -0
- package/dist/rules/no-angular-bypass-sanitizer.d.ts.map +1 -0
- package/dist/rules/no-angular-bypass-sanitizer.js +32 -0
- package/dist/rules/no-angular-bypass-sanitizer.js.map +1 -0
- package/dist/rules/no-angular-bypass-security-trust-html.d.ts +5 -0
- package/dist/rules/no-angular-bypass-security-trust-html.d.ts.map +1 -0
- package/dist/rules/no-angular-bypass-security-trust-html.js +51 -0
- package/dist/rules/no-angular-bypass-security-trust-html.js.map +1 -0
- package/dist/rules/no-angular-innerhtml-binding.d.ts +5 -0
- package/dist/rules/no-angular-innerhtml-binding.d.ts.map +1 -0
- package/dist/rules/no-angular-innerhtml-binding.js +57 -0
- package/dist/rules/no-angular-innerhtml-binding.js.map +1 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.d.ts +5 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.d.ts.map +1 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.js +32 -0
- package/dist/rules/no-angular-sanitization-trusted-urls.js.map +1 -0
- package/dist/rules/no-angularjs-bypass-sce.d.ts +5 -0
- package/dist/rules/no-angularjs-bypass-sce.d.ts.map +1 -0
- package/dist/rules/no-angularjs-bypass-sce.js +80 -0
- package/dist/rules/no-angularjs-bypass-sce.js.map +1 -0
- package/dist/rules/no-angularjs-enable-svg.d.ts +5 -0
- package/dist/rules/no-angularjs-enable-svg.d.ts.map +1 -0
- package/dist/rules/no-angularjs-enable-svg.js +48 -0
- package/dist/rules/no-angularjs-enable-svg.js.map +1 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts +5 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts.map +1 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js +64 -0
- package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js.map +1 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.d.ts +5 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.d.ts.map +1 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.js +32 -0
- package/dist/rules/no-angularjs-sanitization-whitelist.js.map +1 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts +5 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts.map +1 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.js +69 -0
- package/dist/rules/no-angularjs-sce-resource-url-wildcard.js.map +1 -0
- package/dist/rules/no-child-process-exec.d.ts +5 -0
- package/dist/rules/no-child-process-exec.d.ts.map +1 -0
- package/dist/rules/no-child-process-exec.js +141 -0
- package/dist/rules/no-child-process-exec.js.map +1 -0
- package/dist/rules/no-child-process-shell-true.d.ts +5 -0
- package/dist/rules/no-child-process-shell-true.d.ts.map +1 -0
- package/dist/rules/no-child-process-shell-true.js +89 -0
- package/dist/rules/no-child-process-shell-true.js.map +1 -0
- package/dist/rules/no-cookies.d.ts +5 -0
- package/dist/rules/no-cookies.d.ts.map +1 -0
- package/dist/rules/no-cookies.js +38 -0
- package/dist/rules/no-cookies.js.map +1 -0
- package/dist/rules/no-document-domain.d.ts +5 -0
- package/dist/rules/no-document-domain.d.ts.map +1 -0
- package/dist/rules/no-document-domain.js +41 -0
- package/dist/rules/no-document-domain.js.map +1 -0
- package/dist/rules/no-document-execcommand-insert-html.d.ts +5 -0
- package/dist/rules/no-document-execcommand-insert-html.d.ts.map +1 -0
- package/dist/rules/no-document-execcommand-insert-html.js +57 -0
- package/dist/rules/no-document-execcommand-insert-html.js.map +1 -0
- package/dist/rules/no-document-parse-html-unsafe.d.ts +5 -0
- package/dist/rules/no-document-parse-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-document-parse-html-unsafe.js +67 -0
- package/dist/rules/no-document-parse-html-unsafe.js.map +1 -0
- package/dist/rules/no-document-write.d.ts +5 -0
- package/dist/rules/no-document-write.d.ts.map +1 -0
- package/dist/rules/no-document-write.js +40 -0
- package/dist/rules/no-document-write.js.map +1 -0
- package/dist/rules/no-domparser-html-without-sanitization.d.ts +5 -0
- package/dist/rules/no-domparser-html-without-sanitization.d.ts.map +1 -0
- package/dist/rules/no-domparser-html-without-sanitization.js +56 -0
- package/dist/rules/no-domparser-html-without-sanitization.js.map +1 -0
- package/dist/rules/no-domparser-svg-without-sanitization.d.ts +5 -0
- package/dist/rules/no-domparser-svg-without-sanitization.d.ts.map +1 -0
- package/dist/rules/no-domparser-svg-without-sanitization.js +56 -0
- package/dist/rules/no-domparser-svg-without-sanitization.js.map +1 -0
- package/dist/rules/no-dynamic-import-unsafe-url.d.ts +5 -0
- package/dist/rules/no-dynamic-import-unsafe-url.d.ts.map +1 -0
- package/dist/rules/no-dynamic-import-unsafe-url.js +47 -0
- package/dist/rules/no-dynamic-import-unsafe-url.js.map +1 -0
- package/dist/rules/no-electron-allow-running-insecure-content.d.ts +5 -0
- package/dist/rules/no-electron-allow-running-insecure-content.d.ts.map +1 -0
- package/dist/rules/no-electron-allow-running-insecure-content.js +30 -0
- package/dist/rules/no-electron-allow-running-insecure-content.js.map +1 -0
- package/dist/rules/no-electron-dangerous-blink-features.d.ts +5 -0
- package/dist/rules/no-electron-dangerous-blink-features.d.ts.map +1 -0
- package/dist/rules/no-electron-dangerous-blink-features.js +89 -0
- package/dist/rules/no-electron-dangerous-blink-features.js.map +1 -0
- package/dist/rules/no-electron-disable-context-isolation.d.ts +5 -0
- package/dist/rules/no-electron-disable-context-isolation.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-context-isolation.js +30 -0
- package/dist/rules/no-electron-disable-context-isolation.js.map +1 -0
- package/dist/rules/no-electron-disable-sandbox.d.ts +5 -0
- package/dist/rules/no-electron-disable-sandbox.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-sandbox.js +30 -0
- package/dist/rules/no-electron-disable-sandbox.js.map +1 -0
- package/dist/rules/no-electron-disable-web-security.d.ts +5 -0
- package/dist/rules/no-electron-disable-web-security.d.ts.map +1 -0
- package/dist/rules/no-electron-disable-web-security.js +30 -0
- package/dist/rules/no-electron-disable-web-security.js.map +1 -0
- package/dist/rules/no-electron-enable-remote-module.d.ts +5 -0
- package/dist/rules/no-electron-enable-remote-module.d.ts.map +1 -0
- package/dist/rules/no-electron-enable-remote-module.js +30 -0
- package/dist/rules/no-electron-enable-remote-module.js.map +1 -0
- package/dist/rules/no-electron-enable-webview-tag.d.ts +5 -0
- package/dist/rules/no-electron-enable-webview-tag.d.ts.map +1 -0
- package/dist/rules/no-electron-enable-webview-tag.js +30 -0
- package/dist/rules/no-electron-enable-webview-tag.js.map +1 -0
- package/dist/rules/no-electron-experimental-features.d.ts +5 -0
- package/dist/rules/no-electron-experimental-features.d.ts.map +1 -0
- package/dist/rules/no-electron-experimental-features.js +30 -0
- package/dist/rules/no-electron-experimental-features.js.map +1 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts +5 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts.map +1 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.js +108 -0
- package/dist/rules/no-electron-expose-raw-ipc-renderer.js.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts +5 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.js +91 -0
- package/dist/rules/no-electron-insecure-certificate-error-handler.js.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts +5 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.js +75 -0
- package/dist/rules/no-electron-insecure-certificate-verify-proc.js.map +1 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.d.ts +5 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.d.ts.map +1 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.js +75 -0
- package/dist/rules/no-electron-insecure-permission-request-handler.js.map +1 -0
- package/dist/rules/no-electron-node-integration.d.ts +5 -0
- package/dist/rules/no-electron-node-integration.d.ts.map +1 -0
- package/dist/rules/no-electron-node-integration.js +52 -0
- package/dist/rules/no-electron-node-integration.js.map +1 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts +5 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts.map +1 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.js +63 -0
- package/dist/rules/no-electron-permission-check-handler-allow-all.js.map +1 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.d.ts +5 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.d.ts.map +1 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.js +90 -0
- package/dist/rules/no-electron-unchecked-ipc-sender.js.map +1 -0
- package/dist/rules/no-electron-unrestricted-navigation.d.ts +5 -0
- package/dist/rules/no-electron-unrestricted-navigation.d.ts.map +1 -0
- package/dist/rules/no-electron-unrestricted-navigation.js +100 -0
- package/dist/rules/no-electron-unrestricted-navigation.js.map +1 -0
- package/dist/rules/no-electron-untrusted-open-external.d.ts +5 -0
- package/dist/rules/no-electron-untrusted-open-external.d.ts.map +1 -0
- package/dist/rules/no-electron-untrusted-open-external.js +92 -0
- package/dist/rules/no-electron-untrusted-open-external.js.map +1 -0
- package/dist/rules/no-electron-webview-allowpopups.d.ts +5 -0
- package/dist/rules/no-electron-webview-allowpopups.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-allowpopups.js +85 -0
- package/dist/rules/no-electron-webview-allowpopups.js.map +1 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts +5 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.js +88 -0
- package/dist/rules/no-electron-webview-insecure-webpreferences.js.map +1 -0
- package/dist/rules/no-electron-webview-node-integration.d.ts +5 -0
- package/dist/rules/no-electron-webview-node-integration.d.ts.map +1 -0
- package/dist/rules/no-electron-webview-node-integration.js +107 -0
- package/dist/rules/no-electron-webview-node-integration.js.map +1 -0
- package/dist/rules/no-html-method.d.ts +5 -0
- package/dist/rules/no-html-method.d.ts.map +1 -0
- package/dist/rules/no-html-method.js +42 -0
- package/dist/rules/no-html-method.js.map +1 -0
- package/dist/rules/no-http-request-to-insecure-protocol.d.ts +5 -0
- package/dist/rules/no-http-request-to-insecure-protocol.d.ts.map +1 -0
- package/dist/rules/no-http-request-to-insecure-protocol.js +94 -0
- package/dist/rules/no-http-request-to-insecure-protocol.js.map +1 -0
- package/dist/rules/no-iframe-srcdoc.d.ts +5 -0
- package/dist/rules/no-iframe-srcdoc.d.ts.map +1 -0
- package/dist/rules/no-iframe-srcdoc.js +144 -0
- package/dist/rules/no-iframe-srcdoc.js.map +1 -0
- package/dist/rules/no-inner-html.d.ts +5 -0
- package/dist/rules/no-inner-html.d.ts.map +1 -0
- package/dist/rules/no-inner-html.js +67 -0
- package/dist/rules/no-inner-html.js.map +1 -0
- package/dist/rules/no-insecure-random.d.ts +5 -0
- package/dist/rules/no-insecure-random.d.ts.map +1 -0
- package/dist/rules/no-insecure-random.js +95 -0
- package/dist/rules/no-insecure-random.js.map +1 -0
- package/dist/rules/no-insecure-tls-agent-options.d.ts +5 -0
- package/dist/rules/no-insecure-tls-agent-options.d.ts.map +1 -0
- package/dist/rules/no-insecure-tls-agent-options.js +73 -0
- package/dist/rules/no-insecure-tls-agent-options.js.map +1 -0
- package/dist/rules/no-insecure-url.d.ts +12 -0
- package/dist/rules/no-insecure-url.d.ts.map +1 -0
- package/dist/rules/no-insecure-url.js +142 -0
- package/dist/rules/no-insecure-url.js.map +1 -0
- package/dist/rules/no-location-javascript-url.d.ts +5 -0
- package/dist/rules/no-location-javascript-url.d.ts.map +1 -0
- package/dist/rules/no-location-javascript-url.js +98 -0
- package/dist/rules/no-location-javascript-url.js.map +1 -0
- package/dist/rules/no-message-event-without-origin-check.d.ts +5 -0
- package/dist/rules/no-message-event-without-origin-check.d.ts.map +1 -0
- package/dist/rules/no-message-event-without-origin-check.js +183 -0
- package/dist/rules/no-message-event-without-origin-check.js.map +1 -0
- package/dist/rules/no-msapp-exec-unsafe.d.ts +5 -0
- package/dist/rules/no-msapp-exec-unsafe.d.ts.map +1 -0
- package/dist/rules/no-msapp-exec-unsafe.js +32 -0
- package/dist/rules/no-msapp-exec-unsafe.js.map +1 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts +5 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts.map +1 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.js +95 -0
- package/dist/rules/no-node-tls-check-server-identity-bypass.js.map +1 -0
- package/dist/rules/no-node-tls-legacy-protocol.d.ts +5 -0
- package/dist/rules/no-node-tls-legacy-protocol.d.ts.map +1 -0
- package/dist/rules/no-node-tls-legacy-protocol.js +106 -0
- package/dist/rules/no-node-tls-legacy-protocol.js.map +1 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts +5 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts.map +1 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.js +93 -0
- package/dist/rules/no-node-tls-reject-unauthorized-zero.js.map +1 -0
- package/dist/rules/no-node-tls-security-level-zero.d.ts +5 -0
- package/dist/rules/no-node-tls-security-level-zero.d.ts.map +1 -0
- package/dist/rules/no-node-tls-security-level-zero.js +80 -0
- package/dist/rules/no-node-tls-security-level-zero.js.map +1 -0
- package/dist/rules/no-node-vm-run-in-context.d.ts +5 -0
- package/dist/rules/no-node-vm-run-in-context.d.ts.map +1 -0
- package/dist/rules/no-node-vm-run-in-context.js +186 -0
- package/dist/rules/no-node-vm-run-in-context.js.map +1 -0
- package/dist/rules/no-node-vm-source-text-module.d.ts +5 -0
- package/dist/rules/no-node-vm-source-text-module.d.ts.map +1 -0
- package/dist/rules/no-node-vm-source-text-module.js +126 -0
- package/dist/rules/no-node-vm-source-text-module.js.map +1 -0
- package/dist/rules/no-node-worker-threads-eval.d.ts +5 -0
- package/dist/rules/no-node-worker-threads-eval.d.ts.map +1 -0
- package/dist/rules/no-node-worker-threads-eval.js +151 -0
- package/dist/rules/no-node-worker-threads-eval.js.map +1 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.d.ts +5 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.d.ts.map +1 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.js +48 -0
- package/dist/rules/no-nonnull-assertion-on-security-input.js.map +1 -0
- package/dist/rules/no-postmessage-star-origin.d.ts +5 -0
- package/dist/rules/no-postmessage-star-origin.d.ts.map +1 -0
- package/dist/rules/no-postmessage-star-origin.js +58 -0
- package/dist/rules/no-postmessage-star-origin.js.map +1 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.d.ts +5 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.d.ts.map +1 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.js +80 -0
- package/dist/rules/no-postmessage-without-origin-allowlist.js.map +1 -0
- package/dist/rules/no-range-create-contextual-fragment.d.ts +5 -0
- package/dist/rules/no-range-create-contextual-fragment.d.ts.map +1 -0
- package/dist/rules/no-range-create-contextual-fragment.js +64 -0
- package/dist/rules/no-range-create-contextual-fragment.js.map +1 -0
- package/dist/rules/no-script-src-data-url.d.ts +5 -0
- package/dist/rules/no-script-src-data-url.d.ts.map +1 -0
- package/dist/rules/no-script-src-data-url.js +108 -0
- package/dist/rules/no-script-src-data-url.js.map +1 -0
- package/dist/rules/no-script-text.d.ts +5 -0
- package/dist/rules/no-script-text.d.ts.map +1 -0
- package/dist/rules/no-script-text.js +52 -0
- package/dist/rules/no-script-text.js.map +1 -0
- package/dist/rules/no-service-worker-unsafe-script-url.d.ts +5 -0
- package/dist/rules/no-service-worker-unsafe-script-url.d.ts.map +1 -0
- package/dist/rules/no-service-worker-unsafe-script-url.js +52 -0
- package/dist/rules/no-service-worker-unsafe-script-url.js.map +1 -0
- package/dist/rules/no-set-html-unsafe.d.ts +5 -0
- package/dist/rules/no-set-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-set-html-unsafe.js +48 -0
- package/dist/rules/no-set-html-unsafe.js.map +1 -0
- package/dist/rules/no-trusted-types-policy-pass-through.d.ts +5 -0
- package/dist/rules/no-trusted-types-policy-pass-through.d.ts.map +1 -0
- package/dist/rules/no-trusted-types-policy-pass-through.js +115 -0
- package/dist/rules/no-trusted-types-policy-pass-through.js.map +1 -0
- package/dist/rules/no-unsafe-alloc.d.ts +5 -0
- package/dist/rules/no-unsafe-alloc.d.ts.map +1 -0
- package/dist/rules/no-unsafe-alloc.js +51 -0
- package/dist/rules/no-unsafe-alloc.js.map +1 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts +5 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts.map +1 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.js +89 -0
- package/dist/rules/no-unsafe-cast-to-trusted-types.js.map +1 -0
- package/dist/rules/no-window-open-without-noopener.d.ts +5 -0
- package/dist/rules/no-window-open-without-noopener.d.ts.map +1 -0
- package/dist/rules/no-window-open-without-noopener.js +84 -0
- package/dist/rules/no-window-open-without-noopener.js.map +1 -0
- package/dist/rules/no-winjs-html-unsafe.d.ts +5 -0
- package/dist/rules/no-winjs-html-unsafe.d.ts.map +1 -0
- package/dist/rules/no-winjs-html-unsafe.js +32 -0
- package/dist/rules/no-winjs-html-unsafe.js.map +1 -0
- package/dist/rules/no-worker-blob-url.d.ts +5 -0
- package/dist/rules/no-worker-blob-url.d.ts.map +1 -0
- package/dist/rules/no-worker-blob-url.js +64 -0
- package/dist/rules/no-worker-blob-url.js.map +1 -0
- package/dist/rules/no-worker-data-url.d.ts +5 -0
- package/dist/rules/no-worker-data-url.d.ts.map +1 -0
- package/dist/rules/no-worker-data-url.js +67 -0
- package/dist/rules/no-worker-data-url.js.map +1 -0
- package/docs/rules/getting-started.md +70 -0
- package/docs/rules/no-angular-bypass-sanitizer.md +69 -0
- package/docs/rules/no-angular-bypass-security-trust-html.md +59 -0
- package/docs/rules/no-angular-innerhtml-binding.md +59 -0
- package/docs/rules/no-angular-sanitization-trusted-urls.md +64 -0
- package/docs/rules/no-angularjs-bypass-sce.md +64 -0
- package/docs/rules/no-angularjs-enable-svg.md +59 -0
- package/docs/rules/no-angularjs-ng-bind-html-without-sanitize.md +59 -0
- package/docs/rules/no-angularjs-sanitization-whitelist.md +63 -0
- package/docs/rules/no-angularjs-sce-resource-url-wildcard.md +62 -0
- package/docs/rules/no-child-process-exec.md +101 -0
- package/docs/rules/no-child-process-shell-true.md +59 -0
- package/docs/rules/no-cookies.md +61 -0
- package/docs/rules/no-document-domain.md +59 -0
- package/docs/rules/no-document-execcommand-insert-html.md +69 -0
- package/docs/rules/no-document-parse-html-unsafe.md +72 -0
- package/docs/rules/no-document-write.md +64 -0
- package/docs/rules/no-domparser-html-without-sanitization.md +59 -0
- package/docs/rules/no-domparser-svg-without-sanitization.md +71 -0
- package/docs/rules/no-dynamic-import-unsafe-url.md +81 -0
- package/docs/rules/no-electron-allow-running-insecure-content.md +69 -0
- package/docs/rules/no-electron-dangerous-blink-features.md +77 -0
- package/docs/rules/no-electron-disable-context-isolation.md +69 -0
- package/docs/rules/no-electron-disable-sandbox.md +69 -0
- package/docs/rules/no-electron-disable-web-security.md +69 -0
- package/docs/rules/no-electron-enable-remote-module.md +69 -0
- package/docs/rules/no-electron-enable-webview-tag.md +77 -0
- package/docs/rules/no-electron-experimental-features.md +77 -0
- package/docs/rules/no-electron-expose-raw-ipc-renderer.md +79 -0
- package/docs/rules/no-electron-insecure-certificate-error-handler.md +72 -0
- package/docs/rules/no-electron-insecure-certificate-verify-proc.md +63 -0
- package/docs/rules/no-electron-insecure-permission-request-handler.md +67 -0
- package/docs/rules/no-electron-node-integration.md +70 -0
- package/docs/rules/no-electron-permission-check-handler-allow-all.md +66 -0
- package/docs/rules/no-electron-unchecked-ipc-sender.md +62 -0
- package/docs/rules/no-electron-unrestricted-navigation.md +64 -0
- package/docs/rules/no-electron-untrusted-open-external.md +65 -0
- package/docs/rules/no-electron-webview-allowpopups.md +59 -0
- package/docs/rules/no-electron-webview-insecure-webpreferences.md +84 -0
- package/docs/rules/no-electron-webview-node-integration.md +59 -0
- package/docs/rules/no-html-method.md +58 -0
- package/docs/rules/no-http-request-to-insecure-protocol.md +59 -0
- package/docs/rules/no-iframe-srcdoc.md +76 -0
- package/docs/rules/no-inner-html.md +65 -0
- package/docs/rules/no-insecure-random.md +66 -0
- package/docs/rules/no-insecure-tls-agent-options.md +59 -0
- package/docs/rules/no-insecure-url.md +72 -0
- package/docs/rules/no-location-javascript-url.md +59 -0
- package/docs/rules/no-message-event-without-origin-check.md +82 -0
- package/docs/rules/no-msapp-exec-unsafe.md +59 -0
- package/docs/rules/no-node-tls-check-server-identity-bypass.md +88 -0
- package/docs/rules/no-node-tls-legacy-protocol.md +80 -0
- package/docs/rules/no-node-tls-reject-unauthorized-zero.md +61 -0
- package/docs/rules/no-node-tls-security-level-zero.md +77 -0
- package/docs/rules/no-node-vm-run-in-context.md +89 -0
- package/docs/rules/no-node-vm-source-text-module.md +79 -0
- package/docs/rules/no-node-worker-threads-eval.md +82 -0
- package/docs/rules/no-nonnull-assertion-on-security-input.md +59 -0
- package/docs/rules/no-postmessage-star-origin.md +59 -0
- package/docs/rules/no-postmessage-without-origin-allowlist.md +59 -0
- package/docs/rules/no-range-create-contextual-fragment.md +64 -0
- package/docs/rules/no-script-src-data-url.md +83 -0
- package/docs/rules/no-script-text.md +80 -0
- package/docs/rules/no-service-worker-unsafe-script-url.md +85 -0
- package/docs/rules/no-set-html-unsafe.md +64 -0
- package/docs/rules/no-trusted-types-policy-pass-through.md +68 -0
- package/docs/rules/no-unsafe-alloc.md +62 -0
- package/docs/rules/no-unsafe-cast-to-trusted-types.md +59 -0
- package/docs/rules/no-window-open-without-noopener.md +63 -0
- package/docs/rules/no-winjs-html-unsafe.md +60 -0
- package/docs/rules/no-worker-blob-url.md +86 -0
- package/docs/rules/no-worker-data-url.md +85 -0
- package/docs/rules/overview.md +111 -0
- package/docs/rules/presets/angular.md +35 -0
- package/docs/rules/presets/angularjs.md +36 -0
- package/docs/rules/presets/common.md +59 -0
- package/docs/rules/presets/electron.md +51 -0
- package/docs/rules/presets/index.md +26 -0
- package/docs/rules/presets/node.md +43 -0
- package/docs/rules/presets/react.md +33 -0
- package/docs/rules/presets/recommended.md +104 -0
- package/docs/rules/presets/required.md +99 -0
- package/docs/rules/presets/typescript.md +34 -0
- package/package.json +583 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-domain.js","sourceRoot":"","sources":["../../src/rules/no-document-domain.ts"],"names":[],"mappings":"AAGA,OAAO,EACH,kBAAkB,EAClB,gBAAgB,GACnB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAC;IACnD,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,iEAAiE,CAC7D,IAAmC;gBAEnC,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,gBAAgB,CACb,IAAI,CAAC,IAAI,CAAC,MAAM,EAChB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,mFAAmF;YACvF,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,gFAAgF;SACxF;QACD,QAAQ,EAAE;YACN,OAAO,EAAE,kCAAkC;SAC9C;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,oBAAoB;CAC7B,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-execcommand-insert-html.d.ts","sourceRoot":"","sources":["../../src/rules/no-document-execcommand-insert-html.ts"],"names":[],"mappings":"AAOA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAWzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAuEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
import { getFullTypeChecker, isDocumentObject, } from "../_internal/ast-utils.js";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
import { getMemberPropertyName, getStaticStringValue, } from "../_internal/estree-utils.js";
|
|
4
|
+
const isInsertHtmlCommand = (expression) => getStaticStringValue(expression)?.toLowerCase() === "inserthtml";
|
|
5
|
+
/** Rule implementation. */
|
|
6
|
+
const rule = createRule({
|
|
7
|
+
create(context) {
|
|
8
|
+
const fullTypeChecker = getFullTypeChecker(context);
|
|
9
|
+
return {
|
|
10
|
+
CallExpression(node) {
|
|
11
|
+
if (node.callee.type !== "MemberExpression") {
|
|
12
|
+
return;
|
|
13
|
+
}
|
|
14
|
+
if (getMemberPropertyName(node.callee) !== "execCommand") {
|
|
15
|
+
return;
|
|
16
|
+
}
|
|
17
|
+
if (!isDocumentObject(node.callee.object, context, fullTypeChecker)) {
|
|
18
|
+
return;
|
|
19
|
+
}
|
|
20
|
+
const [firstArgument, , thirdArgument,] = node.arguments;
|
|
21
|
+
if (firstArgument === undefined ||
|
|
22
|
+
firstArgument.type === "SpreadElement" ||
|
|
23
|
+
!isInsertHtmlCommand(firstArgument)) {
|
|
24
|
+
return;
|
|
25
|
+
}
|
|
26
|
+
if (thirdArgument === undefined ||
|
|
27
|
+
thirdArgument.type === "SpreadElement" ||
|
|
28
|
+
getStaticStringValue(thirdArgument) === "") {
|
|
29
|
+
return;
|
|
30
|
+
}
|
|
31
|
+
context.report({
|
|
32
|
+
messageId: "default",
|
|
33
|
+
node: thirdArgument,
|
|
34
|
+
});
|
|
35
|
+
},
|
|
36
|
+
};
|
|
37
|
+
},
|
|
38
|
+
defaultOptions: [],
|
|
39
|
+
meta: {
|
|
40
|
+
deprecated: false,
|
|
41
|
+
docs: {
|
|
42
|
+
description: "disallow document.execCommand('insertHTML', ...) HTML insertion sinks.",
|
|
43
|
+
frozen: false,
|
|
44
|
+
recommended: false,
|
|
45
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-document-execcommand-insert-html",
|
|
46
|
+
},
|
|
47
|
+
messages: {
|
|
48
|
+
default: "Do not inject HTML with document.execCommand('insertHTML', ...); build DOM nodes safely or use text-only insertion APIs instead.",
|
|
49
|
+
},
|
|
50
|
+
schema: [],
|
|
51
|
+
type: "problem",
|
|
52
|
+
},
|
|
53
|
+
name: "no-document-execcommand-insert-html",
|
|
54
|
+
});
|
|
55
|
+
export default rule;
|
|
56
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
57
|
+
//# sourceMappingURL=no-document-execcommand-insert-html.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-execcommand-insert-html.js","sourceRoot":"","sources":["../../src/rules/no-document-execcommand-insert-html.ts"],"names":[],"mappings":"AAGA,OAAO,EACH,kBAAkB,EAClB,gBAAgB,GACnB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AAItC,MAAM,mBAAmB,GAAG,CAAC,UAA+B,EAAW,EAAE,CACrE,oBAAoB,CAAC,UAAU,CAAC,EAAE,WAAW,EAAE,KAAK,YAAY,CAAC;AAErE,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC1C,OAAO;gBACX,CAAC;gBAED,IAAI,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,aAAa,EAAE,CAAC;oBACvD,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,gBAAgB,CACb,IAAI,CAAC,MAAM,CAAC,MAAM,EAClB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,CACF,aAAa,EACb,AADc,EAEd,aAAa,EAChB,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEnB,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,CAAC,mBAAmB,CAAC,aAAa,CAAC,EACrC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,oBAAoB,CAAC,aAAa,CAAC,KAAK,EAAE,EAC5C,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,wEAAwE;YAC5E,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,iGAAiG;SACzG;QACD,QAAQ,EAAE;YACN,OAAO,EACH,kIAAkI;SACzI;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,qCAAqC;CAC9C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-parse-html-unsafe.d.ts","sourceRoot":"","sources":["../../src/rules/no-document-parse-html-unsafe.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA6CzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA2CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
import { getMemberPropertyName, getStaticStringValue, } from "../_internal/estree-utils.js";
|
|
3
|
+
const isDocumentConstructorReference = (expression) => {
|
|
4
|
+
if (expression.type === "Identifier") {
|
|
5
|
+
return expression.name === "Document";
|
|
6
|
+
}
|
|
7
|
+
if (expression.type !== "MemberExpression") {
|
|
8
|
+
return false;
|
|
9
|
+
}
|
|
10
|
+
if (getMemberPropertyName(expression) !== "Document") {
|
|
11
|
+
return false;
|
|
12
|
+
}
|
|
13
|
+
return (expression.object.type === "Identifier" &&
|
|
14
|
+
(expression.object.name === "globalThis" ||
|
|
15
|
+
expression.object.name === "self" ||
|
|
16
|
+
expression.object.name === "window"));
|
|
17
|
+
};
|
|
18
|
+
const isDocumentParseHtmlUnsafeCall = (node) => {
|
|
19
|
+
if (node.callee.type !== "MemberExpression") {
|
|
20
|
+
return false;
|
|
21
|
+
}
|
|
22
|
+
if (getMemberPropertyName(node.callee) !== "parseHTMLUnsafe") {
|
|
23
|
+
return false;
|
|
24
|
+
}
|
|
25
|
+
return isDocumentConstructorReference(node.callee.object);
|
|
26
|
+
};
|
|
27
|
+
/** Rule implementation. */
|
|
28
|
+
const rule = createRule({
|
|
29
|
+
create(context) {
|
|
30
|
+
return {
|
|
31
|
+
CallExpression(node) {
|
|
32
|
+
if (!isDocumentParseHtmlUnsafeCall(node)) {
|
|
33
|
+
return;
|
|
34
|
+
}
|
|
35
|
+
const [firstArgument] = node.arguments;
|
|
36
|
+
if (firstArgument !== undefined &&
|
|
37
|
+
firstArgument.type !== "SpreadElement" &&
|
|
38
|
+
getStaticStringValue(firstArgument) === "") {
|
|
39
|
+
return;
|
|
40
|
+
}
|
|
41
|
+
context.report({
|
|
42
|
+
messageId: "default",
|
|
43
|
+
node: firstArgument ?? node,
|
|
44
|
+
});
|
|
45
|
+
},
|
|
46
|
+
};
|
|
47
|
+
},
|
|
48
|
+
defaultOptions: [],
|
|
49
|
+
meta: {
|
|
50
|
+
deprecated: false,
|
|
51
|
+
docs: {
|
|
52
|
+
description: "disallow Document.parseHTMLUnsafe() because it preserves unsafe HTML unless a reviewed sanitization path is enforced separately.",
|
|
53
|
+
frozen: false,
|
|
54
|
+
recommended: false,
|
|
55
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-document-parse-html-unsafe",
|
|
56
|
+
},
|
|
57
|
+
messages: {
|
|
58
|
+
default: "Do not call Document.parseHTMLUnsafe(); prefer Document.parseHTML() or a reviewed sanitization pipeline.",
|
|
59
|
+
},
|
|
60
|
+
schema: [],
|
|
61
|
+
type: "problem",
|
|
62
|
+
},
|
|
63
|
+
name: "no-document-parse-html-unsafe",
|
|
64
|
+
});
|
|
65
|
+
export default rule;
|
|
66
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
67
|
+
//# sourceMappingURL=no-document-parse-html-unsafe.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-parse-html-unsafe.js","sourceRoot":"","sources":["../../src/rules/no-document-parse-html-unsafe.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AAItC,MAAM,8BAA8B,GAAG,CACnC,UAA+B,EACxB,EAAE;IACT,IAAI,UAAU,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACnC,OAAO,UAAU,CAAC,IAAI,KAAK,UAAU,CAAC;IAC1C,CAAC;IAED,IAAI,UAAU,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QACzC,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,qBAAqB,CAAC,UAAU,CAAC,KAAK,UAAU,EAAE,CAAC;QACnD,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,CACH,UAAU,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY;QACvC,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY;YACpC,UAAU,CAAC,MAAM,CAAC,IAAI,KAAK,MAAM;YACjC,UAAU,CAAC,MAAM,CAAC,IAAI,KAAK,QAAQ,CAAC,CAC3C,CAAC;AACN,CAAC,CAAC;AAEF,MAAM,6BAA6B,GAAG,CAClC,IAA6B,EACtB,EAAE;IACT,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,iBAAiB,EAAE,CAAC;QAC3D,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,8BAA8B,CAAC,IAAI,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;AAC9D,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,6BAA6B,CAAC,IAAI,CAAC,EAAE,CAAC;oBACvC,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,oBAAoB,CAAC,aAAa,CAAC,KAAK,EAAE,EAC5C,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa,IAAI,IAAI;iBAC9B,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,kIAAkI;YACtI,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,2FAA2F;SACnG;QACD,QAAQ,EAAE;YACN,OAAO,EACH,0GAA0G;SACjH;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,+BAA+B;CACxC,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-write.d.ts","sourceRoot":"","sources":["../../src/rules/no-document-write.ts"],"names":[],"mappings":"AAMA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA+CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
import { getFullTypeChecker, isDocumentObject, } from "../_internal/ast-utils.js";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
/** Rule implementation. */
|
|
4
|
+
const rule = createRule({
|
|
5
|
+
create(context) {
|
|
6
|
+
const fullTypeChecker = getFullTypeChecker(context);
|
|
7
|
+
return {
|
|
8
|
+
"CallExpression[arguments.length=1][callee.property.name=/^(?:write|writeln)$/]"(node) {
|
|
9
|
+
if (node.callee.type !== "MemberExpression") {
|
|
10
|
+
return;
|
|
11
|
+
}
|
|
12
|
+
if (!isDocumentObject(node.callee.object, context, fullTypeChecker)) {
|
|
13
|
+
return;
|
|
14
|
+
}
|
|
15
|
+
context.report({
|
|
16
|
+
messageId: "default",
|
|
17
|
+
node,
|
|
18
|
+
});
|
|
19
|
+
},
|
|
20
|
+
};
|
|
21
|
+
},
|
|
22
|
+
defaultOptions: [],
|
|
23
|
+
meta: {
|
|
24
|
+
deprecated: false,
|
|
25
|
+
docs: {
|
|
26
|
+
description: "disallow document.write/document.writeln because they bypass safe DOM construction patterns.",
|
|
27
|
+
frozen: false,
|
|
28
|
+
recommended: false,
|
|
29
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-document-write",
|
|
30
|
+
},
|
|
31
|
+
messages: {
|
|
32
|
+
default: "Do not write to the DOM directly using document.write/document.writeln.",
|
|
33
|
+
},
|
|
34
|
+
schema: [],
|
|
35
|
+
type: "problem",
|
|
36
|
+
},
|
|
37
|
+
name: "no-document-write",
|
|
38
|
+
});
|
|
39
|
+
export default rule;
|
|
40
|
+
//# sourceMappingURL=no-document-write.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-document-write.js","sourceRoot":"","sources":["../../src/rules/no-document-write.ts"],"names":[],"mappings":"AAEA,OAAO,EACH,kBAAkB,EAClB,gBAAgB,GACnB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAEzD,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAC;IACnD,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,gFAAgF,CAC5E,IAA6B;gBAE7B,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC1C,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,gBAAgB,CACb,IAAI,CAAC,MAAM,CAAC,MAAM,EAClB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,8FAA8F;YAClG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,+EAA+E;SACvF;QACD,QAAQ,EAAE;YACN,OAAO,EACH,yEAAyE;SAChF;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,mBAAmB;CAC5B,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-domparser-html-without-sanitization.d.ts","sourceRoot":"","sources":["../../src/rules/no-domparser-html-without-sanitization.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AASzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA4DtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
import { isDefined } from "ts-extras";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
import { isDomParserParseFromStringCall, isSanitizedExpression, } from "../_internal/domparser.js";
|
|
4
|
+
import { getStaticStringValue } from "../_internal/estree-utils.js";
|
|
5
|
+
/** Rule implementation. */
|
|
6
|
+
const rule = createRule({
|
|
7
|
+
create(context) {
|
|
8
|
+
return {
|
|
9
|
+
CallExpression(node) {
|
|
10
|
+
if (!isDomParserParseFromStringCall(node)) {
|
|
11
|
+
return;
|
|
12
|
+
}
|
|
13
|
+
if (node.arguments.length < 2) {
|
|
14
|
+
return;
|
|
15
|
+
}
|
|
16
|
+
const [firstArgument, secondArgument] = node.arguments;
|
|
17
|
+
if (!isDefined(firstArgument) || !isDefined(secondArgument)) {
|
|
18
|
+
return;
|
|
19
|
+
}
|
|
20
|
+
if (firstArgument.type === "SpreadElement" ||
|
|
21
|
+
secondArgument.type === "SpreadElement") {
|
|
22
|
+
return;
|
|
23
|
+
}
|
|
24
|
+
const mimeTypeValue = getStaticStringValue(secondArgument);
|
|
25
|
+
if (mimeTypeValue !== "text/html") {
|
|
26
|
+
return;
|
|
27
|
+
}
|
|
28
|
+
if (isSanitizedExpression(firstArgument)) {
|
|
29
|
+
return;
|
|
30
|
+
}
|
|
31
|
+
context.report({
|
|
32
|
+
messageId: "default",
|
|
33
|
+
node: firstArgument,
|
|
34
|
+
});
|
|
35
|
+
},
|
|
36
|
+
};
|
|
37
|
+
},
|
|
38
|
+
defaultOptions: [],
|
|
39
|
+
meta: {
|
|
40
|
+
deprecated: false,
|
|
41
|
+
docs: {
|
|
42
|
+
description: "disallow DOMParser.parseFromString(..., 'text/html') calls on unsanitized input.",
|
|
43
|
+
frozen: false,
|
|
44
|
+
recommended: false,
|
|
45
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-domparser-html-without-sanitization",
|
|
46
|
+
},
|
|
47
|
+
messages: {
|
|
48
|
+
default: "Sanitize HTML input before parsing with DOMParser.parseFromString(..., 'text/html').",
|
|
49
|
+
},
|
|
50
|
+
schema: [],
|
|
51
|
+
type: "problem",
|
|
52
|
+
},
|
|
53
|
+
name: "no-domparser-html-without-sanitization",
|
|
54
|
+
});
|
|
55
|
+
export default rule;
|
|
56
|
+
//# sourceMappingURL=no-domparser-html-without-sanitization.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-domparser-html-without-sanitization.js","sourceRoot":"","sources":["../../src/rules/no-domparser-html-without-sanitization.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AAEtC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,8BAA8B,EAC9B,qBAAqB,GACxB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,oBAAoB,EAAE,MAAM,8BAA8B,CAAC;AAIpE,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,8BAA8B,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,IAAI,IAAI,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,EAAE,cAAc,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvD,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,EAAE,CAAC;oBAC1D,OAAO;gBACX,CAAC;gBAED,IACI,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,cAAc,CAAC,IAAI,KAAK,eAAe,EACzC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,aAAa,GAAG,oBAAoB,CAAC,cAAc,CAAC,CAAC;gBAE3D,IAAI,aAAa,KAAK,WAAW,EAAE,CAAC;oBAChC,OAAO;gBACX,CAAC;gBAED,IAAI,qBAAqB,CAAC,aAAa,CAAC,EAAE,CAAC;oBACvC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,kFAAkF;YACtF,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,oGAAoG;SAC5G;QACD,QAAQ,EAAE;YACN,OAAO,EACH,sFAAsF;SAC7F;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,wCAAwC;CACjD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-domparser-svg-without-sanitization.d.ts","sourceRoot":"","sources":["../../src/rules/no-domparser-svg-without-sanitization.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AASzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA4DtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
import { isDefined } from "ts-extras";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
import { isDomParserParseFromStringCall, isSanitizedExpression, } from "../_internal/domparser.js";
|
|
4
|
+
import { getStaticStringValue } from "../_internal/estree-utils.js";
|
|
5
|
+
/** Rule implementation. */
|
|
6
|
+
const rule = createRule({
|
|
7
|
+
create(context) {
|
|
8
|
+
return {
|
|
9
|
+
CallExpression(node) {
|
|
10
|
+
if (!isDomParserParseFromStringCall(node)) {
|
|
11
|
+
return;
|
|
12
|
+
}
|
|
13
|
+
if (node.arguments.length < 2) {
|
|
14
|
+
return;
|
|
15
|
+
}
|
|
16
|
+
const [firstArgument, secondArgument] = node.arguments;
|
|
17
|
+
if (!isDefined(firstArgument) || !isDefined(secondArgument)) {
|
|
18
|
+
return;
|
|
19
|
+
}
|
|
20
|
+
if (firstArgument.type === "SpreadElement" ||
|
|
21
|
+
secondArgument.type === "SpreadElement") {
|
|
22
|
+
return;
|
|
23
|
+
}
|
|
24
|
+
const mimeTypeValue = getStaticStringValue(secondArgument);
|
|
25
|
+
if (mimeTypeValue !== "image/svg+xml") {
|
|
26
|
+
return;
|
|
27
|
+
}
|
|
28
|
+
if (isSanitizedExpression(firstArgument)) {
|
|
29
|
+
return;
|
|
30
|
+
}
|
|
31
|
+
context.report({
|
|
32
|
+
messageId: "default",
|
|
33
|
+
node: firstArgument,
|
|
34
|
+
});
|
|
35
|
+
},
|
|
36
|
+
};
|
|
37
|
+
},
|
|
38
|
+
defaultOptions: [],
|
|
39
|
+
meta: {
|
|
40
|
+
deprecated: false,
|
|
41
|
+
docs: {
|
|
42
|
+
description: "disallow DOMParser.parseFromString(..., 'image/svg+xml') calls on unsanitized input.",
|
|
43
|
+
frozen: false,
|
|
44
|
+
recommended: false,
|
|
45
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-domparser-svg-without-sanitization",
|
|
46
|
+
},
|
|
47
|
+
messages: {
|
|
48
|
+
default: "Sanitize SVG input before parsing with DOMParser.parseFromString(..., 'image/svg+xml').",
|
|
49
|
+
},
|
|
50
|
+
schema: [],
|
|
51
|
+
type: "problem",
|
|
52
|
+
},
|
|
53
|
+
name: "no-domparser-svg-without-sanitization",
|
|
54
|
+
});
|
|
55
|
+
export default rule;
|
|
56
|
+
//# sourceMappingURL=no-domparser-svg-without-sanitization.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-domparser-svg-without-sanitization.js","sourceRoot":"","sources":["../../src/rules/no-domparser-svg-without-sanitization.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AAEtC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,8BAA8B,EAC9B,qBAAqB,GACxB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,oBAAoB,EAAE,MAAM,8BAA8B,CAAC;AAIpE,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,8BAA8B,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,IAAI,IAAI,CAAC,SAAS,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAC5B,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,EAAE,cAAc,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvD,IAAI,CAAC,SAAS,CAAC,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,EAAE,CAAC;oBAC1D,OAAO;gBACX,CAAC;gBAED,IACI,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,cAAc,CAAC,IAAI,KAAK,eAAe,EACzC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,aAAa,GAAG,oBAAoB,CAAC,cAAc,CAAC,CAAC;gBAE3D,IAAI,aAAa,KAAK,eAAe,EAAE,CAAC;oBACpC,OAAO;gBACX,CAAC;gBAED,IAAI,qBAAqB,CAAC,aAAa,CAAC,EAAE,CAAC;oBACvC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,sFAAsF;YAC1F,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,mGAAmG;SAC3G;QACD,QAAQ,EAAE;YACN,OAAO,EACH,yFAAyF;SAChG;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,uCAAuC;CAChD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-dynamic-import-unsafe-url.d.ts","sourceRoot":"","sources":["../../src/rules/no-dynamic-import-unsafe-url.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA2BzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAiCtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
import { getStaticStringValue } from "../_internal/estree-utils.js";
|
|
3
|
+
import { isBlobUrl, isDataUrl, isUrlCreateObjectUrlCall, } from "../_internal/worker-code-loading.js";
|
|
4
|
+
const isJavaScriptUrl = (value) => /^\s*javascript\s*:/iu.test(value);
|
|
5
|
+
const isUnsafeDynamicImportSource = (expression) => {
|
|
6
|
+
const configuredValue = getStaticStringValue(expression);
|
|
7
|
+
return ((typeof configuredValue === "string" &&
|
|
8
|
+
(isBlobUrl(configuredValue) ||
|
|
9
|
+
isDataUrl(configuredValue) ||
|
|
10
|
+
isJavaScriptUrl(configuredValue))) ||
|
|
11
|
+
isUrlCreateObjectUrlCall(expression));
|
|
12
|
+
};
|
|
13
|
+
/** Rule implementation. */
|
|
14
|
+
const rule = createRule({
|
|
15
|
+
create(context) {
|
|
16
|
+
return {
|
|
17
|
+
ImportExpression(node) {
|
|
18
|
+
if (!isUnsafeDynamicImportSource(node.source)) {
|
|
19
|
+
return;
|
|
20
|
+
}
|
|
21
|
+
context.report({
|
|
22
|
+
messageId: "default",
|
|
23
|
+
node: node.source,
|
|
24
|
+
});
|
|
25
|
+
},
|
|
26
|
+
};
|
|
27
|
+
},
|
|
28
|
+
defaultOptions: [],
|
|
29
|
+
meta: {
|
|
30
|
+
deprecated: false,
|
|
31
|
+
docs: {
|
|
32
|
+
description: "disallow dynamic import() calls that load code from data:, blob:, javascript:, or direct URL.createObjectURL(...) URLs.",
|
|
33
|
+
frozen: false,
|
|
34
|
+
recommended: false,
|
|
35
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-dynamic-import-unsafe-url",
|
|
36
|
+
},
|
|
37
|
+
messages: {
|
|
38
|
+
default: "Do not dynamically import code from data:, blob:, javascript:, or URL.createObjectURL(...) URLs.",
|
|
39
|
+
},
|
|
40
|
+
schema: [],
|
|
41
|
+
type: "problem",
|
|
42
|
+
},
|
|
43
|
+
name: "no-dynamic-import-unsafe-url",
|
|
44
|
+
});
|
|
45
|
+
export default rule;
|
|
46
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
47
|
+
//# sourceMappingURL=no-dynamic-import-unsafe-url.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-dynamic-import-unsafe-url.js","sourceRoot":"","sources":["../../src/rules/no-dynamic-import-unsafe-url.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,oBAAoB,EAAE,MAAM,8BAA8B,CAAC;AACpE,OAAO,EACH,SAAS,EACT,SAAS,EACT,wBAAwB,GAC3B,MAAM,qCAAqC,CAAC;AAI7C,MAAM,eAAe,GAAG,CAAC,KAAa,EAAW,EAAE,CAC/C,sBAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAEvC,MAAM,2BAA2B,GAAG,CAChC,UAAyC,EAClC,EAAE;IACT,MAAM,eAAe,GAAG,oBAAoB,CAAC,UAAU,CAAC,CAAC;IAEzD,OAAO,CACH,CAAC,OAAO,eAAe,KAAK,QAAQ;QAChC,CAAC,SAAS,CAAC,eAAe,CAAC;YACvB,SAAS,CAAC,eAAe,CAAC;YAC1B,eAAe,CAAC,eAAe,CAAC,CAAC,CAAC;QAC1C,wBAAwB,CAAC,UAAU,CAAC,CACvC,CAAC;AACN,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,gBAAgB,CAAC,IAA+B;gBAC5C,IAAI,CAAC,2BAA2B,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;oBAC5C,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,IAAI,CAAC,MAAM;iBACpB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,yHAAyH;YAC7H,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,0FAA0F;SAClG;QACD,QAAQ,EAAE;YACN,OAAO,EACH,kGAAkG;SACzG;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,8BAA8B;CACvC,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-allow-running-insecure-content.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-allow-running-insecure-content.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAKzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA0BtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
import { createElectronWebPreferencesBooleanListener } from "../_internal/electron-web-preferences.js";
|
|
3
|
+
/** Rule implementation. */
|
|
4
|
+
const rule = createRule({
|
|
5
|
+
create(context) {
|
|
6
|
+
return createElectronWebPreferencesBooleanListener(context, {
|
|
7
|
+
disallowedValue: true,
|
|
8
|
+
preferenceName: "allowRunningInsecureContent",
|
|
9
|
+
});
|
|
10
|
+
},
|
|
11
|
+
defaultOptions: [],
|
|
12
|
+
meta: {
|
|
13
|
+
deprecated: false,
|
|
14
|
+
docs: {
|
|
15
|
+
description: "disallow enabling allowRunningInsecureContent in Electron webPreferences.",
|
|
16
|
+
frozen: false,
|
|
17
|
+
recommended: false,
|
|
18
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-allow-running-insecure-content",
|
|
19
|
+
},
|
|
20
|
+
fixable: "code",
|
|
21
|
+
messages: {
|
|
22
|
+
default: "Do not set webPreferences.allowRunningInsecureContent to true.",
|
|
23
|
+
},
|
|
24
|
+
schema: [],
|
|
25
|
+
type: "problem",
|
|
26
|
+
},
|
|
27
|
+
name: "no-electron-allow-running-insecure-content",
|
|
28
|
+
});
|
|
29
|
+
export default rule;
|
|
30
|
+
//# sourceMappingURL=no-electron-allow-running-insecure-content.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-allow-running-insecure-content.js","sourceRoot":"","sources":["../../src/rules/no-electron-allow-running-insecure-content.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,2CAA2C,EAAE,MAAM,0CAA0C,CAAC;AAIvG,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO,2CAA2C,CAAC,OAAO,EAAE;YACxD,eAAe,EAAE,IAAI;YACrB,cAAc,EAAE,6BAA6B;SAChD,CAAC,CAAC;IACP,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,2EAA2E;YAC/E,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,wGAAwG;SAChH;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EACH,gEAAgE;SACvE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,4CAA4C;CACrD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-dangerous-blink-features.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-dangerous-blink-features.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA8DzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA+DtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,89 @@
|
|
|
1
|
+
import { arrayFirst } from "ts-extras";
|
|
2
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
3
|
+
const getPropertyName = (property) => {
|
|
4
|
+
if (property.computed) {
|
|
5
|
+
return undefined;
|
|
6
|
+
}
|
|
7
|
+
if (property.key.type === "Identifier") {
|
|
8
|
+
return property.key.name;
|
|
9
|
+
}
|
|
10
|
+
if (property.key.type === "Literal" &&
|
|
11
|
+
typeof property.key.value === "string") {
|
|
12
|
+
return property.key.value;
|
|
13
|
+
}
|
|
14
|
+
return undefined;
|
|
15
|
+
};
|
|
16
|
+
const getPropertyByName = (objectExpression, propertyName) => {
|
|
17
|
+
for (const propertyNode of objectExpression.properties) {
|
|
18
|
+
if (propertyNode.type !== "Property" || propertyNode.kind !== "init") {
|
|
19
|
+
continue;
|
|
20
|
+
}
|
|
21
|
+
if (getPropertyName(propertyNode) === propertyName) {
|
|
22
|
+
return propertyNode;
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
return undefined;
|
|
26
|
+
};
|
|
27
|
+
const getStaticStringValue = (node) => {
|
|
28
|
+
if (node.type === "Literal" && typeof node.value === "string") {
|
|
29
|
+
return node.value;
|
|
30
|
+
}
|
|
31
|
+
if (node.type === "TemplateLiteral" && node.expressions.length === 0) {
|
|
32
|
+
return arrayFirst(node.quasis)?.value.cooked ?? undefined;
|
|
33
|
+
}
|
|
34
|
+
return undefined;
|
|
35
|
+
};
|
|
36
|
+
const isDangerousBlinkFeaturesValue = (node) => {
|
|
37
|
+
const staticStringValue = getStaticStringValue(node);
|
|
38
|
+
if (typeof staticStringValue !== "string") {
|
|
39
|
+
return false;
|
|
40
|
+
}
|
|
41
|
+
return staticStringValue.trim().length > 0;
|
|
42
|
+
};
|
|
43
|
+
/** Rule implementation. */
|
|
44
|
+
const rule = createRule({
|
|
45
|
+
create(context) {
|
|
46
|
+
return {
|
|
47
|
+
"NewExpression[callee.name=/^(?:BrowserWindow|BrowserView)$/]"(node) {
|
|
48
|
+
const [firstArgument] = node.arguments;
|
|
49
|
+
if (firstArgument?.type !== "ObjectExpression") {
|
|
50
|
+
return;
|
|
51
|
+
}
|
|
52
|
+
const webPreferencesProperty = getPropertyByName(firstArgument, "webPreferences");
|
|
53
|
+
if (webPreferencesProperty?.value.type !== "ObjectExpression") {
|
|
54
|
+
return;
|
|
55
|
+
}
|
|
56
|
+
const enableBlinkFeaturesProperty = getPropertyByName(webPreferencesProperty.value, "enableBlinkFeatures");
|
|
57
|
+
if (enableBlinkFeaturesProperty === undefined) {
|
|
58
|
+
return;
|
|
59
|
+
}
|
|
60
|
+
if (!isDangerousBlinkFeaturesValue(enableBlinkFeaturesProperty.value)) {
|
|
61
|
+
return;
|
|
62
|
+
}
|
|
63
|
+
context.report({
|
|
64
|
+
messageId: "default",
|
|
65
|
+
node: enableBlinkFeaturesProperty,
|
|
66
|
+
});
|
|
67
|
+
},
|
|
68
|
+
};
|
|
69
|
+
},
|
|
70
|
+
defaultOptions: [],
|
|
71
|
+
meta: {
|
|
72
|
+
deprecated: false,
|
|
73
|
+
docs: {
|
|
74
|
+
description: "disallow enabling risky Blink runtime features through Electron webPreferences.enableBlinkFeatures.",
|
|
75
|
+
frozen: false,
|
|
76
|
+
recommended: false,
|
|
77
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-dangerous-blink-features",
|
|
78
|
+
},
|
|
79
|
+
messages: {
|
|
80
|
+
default: "Do not set webPreferences.enableBlinkFeatures to a non-empty value.",
|
|
81
|
+
},
|
|
82
|
+
schema: [],
|
|
83
|
+
type: "problem",
|
|
84
|
+
},
|
|
85
|
+
name: "no-electron-dangerous-blink-features",
|
|
86
|
+
});
|
|
87
|
+
export default rule;
|
|
88
|
+
/* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
|
|
89
|
+
//# sourceMappingURL=no-electron-dangerous-blink-features.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-dangerous-blink-features.js","sourceRoot":"","sources":["../../src/rules/no-electron-dangerous-blink-features.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,WAAW,CAAC;AAEvC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,eAAe,GAAG,CAAC,QAA2B,EAAsB,EAAE;IACxE,IAAI,QAAQ,CAAC,QAAQ,EAAE,CAAC;QACpB,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,IAAI,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACrC,OAAO,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC;IAC7B,CAAC;IAED,IACI,QAAQ,CAAC,GAAG,CAAC,IAAI,KAAK,SAAS;QAC/B,OAAO,QAAQ,CAAC,GAAG,CAAC,KAAK,KAAK,QAAQ,EACxC,CAAC;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,KAAK,CAAC;IAC9B,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,iBAAiB,GAAG,CACtB,gBAA2C,EAC3C,YAAoB,EACS,EAAE;IAC/B,KAAK,MAAM,YAAY,IAAI,gBAAgB,CAAC,UAAU,EAAE,CAAC;QACrD,IAAI,YAAY,CAAC,IAAI,KAAK,UAAU,IAAI,YAAY,CAAC,IAAI,KAAK,MAAM,EAAE,CAAC;YACnE,SAAS;QACb,CAAC;QAED,IAAI,eAAe,CAAC,YAAY,CAAC,KAAK,YAAY,EAAE,CAAC;YACjD,OAAO,YAAY,CAAC;QACxB,CAAC;IACL,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG,CAAC,IAAmB,EAAsB,EAAE;IACrE,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,IAAI,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC5D,OAAO,IAAI,CAAC,KAAK,CAAC;IACtB,CAAC;IAED,IAAI,IAAI,CAAC,IAAI,KAAK,iBAAiB,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACnE,OAAO,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,CAAC,MAAM,IAAI,SAAS,CAAC;IAC9D,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,6BAA6B,GAAG,CAAC,IAAmB,EAAW,EAAE;IACnE,MAAM,iBAAiB,GAAG,oBAAoB,CAAC,IAAI,CAAC,CAAC;IAErD,IAAI,OAAO,iBAAiB,KAAK,QAAQ,EAAE,CAAC;QACxC,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,iBAAiB,CAAC,IAAI,EAAE,CAAC,MAAM,GAAG,CAAC,CAAC;AAC/C,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,8DAA8D,CAC1D,IAA4B;gBAE5B,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IAAI,aAAa,EAAE,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC7C,OAAO;gBACX,CAAC;gBAED,MAAM,sBAAsB,GAAG,iBAAiB,CAC5C,aAAa,EACb,gBAAgB,CACnB,CAAC;gBAEF,IAAI,sBAAsB,EAAE,KAAK,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC5D,OAAO;gBACX,CAAC;gBAED,MAAM,2BAA2B,GAAG,iBAAiB,CACjD,sBAAsB,CAAC,KAAK,EAC5B,qBAAqB,CACxB,CAAC;gBAEF,IAAI,2BAA2B,KAAK,SAAS,EAAE,CAAC;oBAC5C,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,6BAA6B,CAC1B,2BAA2B,CAAC,KAAK,CACpC,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,2BAA2B;iBACpC,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,qGAAqG;YACzG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,kGAAkG;SAC1G;QACD,QAAQ,EAAE;YACN,OAAO,EACH,qEAAqE;SAC5E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,sCAAsC;CAC/C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-disable-context-isolation.d.ts","sourceRoot":"","sources":["../../src/rules/no-electron-disable-context-isolation.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAKzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAyBtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
import { createRule } from "../_internal/create-rule.js";
|
|
2
|
+
import { createElectronWebPreferencesBooleanListener } from "../_internal/electron-web-preferences.js";
|
|
3
|
+
/** Rule implementation. */
|
|
4
|
+
const rule = createRule({
|
|
5
|
+
create(context) {
|
|
6
|
+
return createElectronWebPreferencesBooleanListener(context, {
|
|
7
|
+
disallowedValue: false,
|
|
8
|
+
preferenceName: "contextIsolation",
|
|
9
|
+
});
|
|
10
|
+
},
|
|
11
|
+
defaultOptions: [],
|
|
12
|
+
meta: {
|
|
13
|
+
deprecated: false,
|
|
14
|
+
docs: {
|
|
15
|
+
description: "disallow disabling contextIsolation in Electron webPreferences.",
|
|
16
|
+
frozen: false,
|
|
17
|
+
recommended: false,
|
|
18
|
+
url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-electron-disable-context-isolation",
|
|
19
|
+
},
|
|
20
|
+
fixable: "code",
|
|
21
|
+
messages: {
|
|
22
|
+
default: "Do not set webPreferences.contextIsolation to false.",
|
|
23
|
+
},
|
|
24
|
+
schema: [],
|
|
25
|
+
type: "problem",
|
|
26
|
+
},
|
|
27
|
+
name: "no-electron-disable-context-isolation",
|
|
28
|
+
});
|
|
29
|
+
export default rule;
|
|
30
|
+
//# sourceMappingURL=no-electron-disable-context-isolation.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"no-electron-disable-context-isolation.js","sourceRoot":"","sources":["../../src/rules/no-electron-disable-context-isolation.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,2CAA2C,EAAE,MAAM,0CAA0C,CAAC;AAIvG,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO,2CAA2C,CAAC,OAAO,EAAE;YACxD,eAAe,EAAE,KAAK;YACtB,cAAc,EAAE,kBAAkB;SACrC,CAAC,CAAC;IACP,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,iEAAiE;YACrE,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,mGAAmG;SAC3G;QACD,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE;YACN,OAAO,EAAE,sDAAsD;SAClE;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,uCAAuC;CAChD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
|