Permalink
Cannot retrieve contributors at this time
228 lines (199 sloc)
7.04 KB
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
codeql-action/node_modules/eslint/lib/rules/id-denylist.js
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* @fileoverview Rule that warns when identifier names that are | |
* specified in the configuration are used. | |
* @author Keith Cirkel (http://keithcirkel.co.uk) | |
*/ | |
"use strict"; | |
//------------------------------------------------------------------------------ | |
// Helpers | |
//------------------------------------------------------------------------------ | |
/** | |
* Checks whether the given node represents assignment target in a normal assignment or destructuring. | |
* @param {ASTNode} node The node to check. | |
* @returns {boolean} `true` if the node is assignment target. | |
*/ | |
function isAssignmentTarget(node) { | |
const parent = node.parent; | |
return ( | |
// normal assignment | |
( | |
parent.type === "AssignmentExpression" && | |
parent.left === node | |
) || | |
// destructuring | |
parent.type === "ArrayPattern" || | |
parent.type === "RestElement" || | |
( | |
parent.type === "Property" && | |
parent.value === node && | |
parent.parent.type === "ObjectPattern" | |
) || | |
( | |
parent.type === "AssignmentPattern" && | |
parent.left === node | |
) | |
); | |
} | |
/** | |
* Checks whether the given node represents an imported name that is renamed in the same import/export specifier. | |
* | |
* Examples: | |
* import { a as b } from 'mod'; // node `a` is renamed import | |
* export { a as b } from 'mod'; // node `a` is renamed import | |
* @param {ASTNode} node `Identifier` node to check. | |
* @returns {boolean} `true` if the node is a renamed import. | |
*/ | |
function isRenamedImport(node) { | |
const parent = node.parent; | |
return ( | |
( | |
parent.type === "ImportSpecifier" && | |
parent.imported !== parent.local && | |
parent.imported === node | |
) || | |
( | |
parent.type === "ExportSpecifier" && | |
parent.parent.source && // re-export | |
parent.local !== parent.exported && | |
parent.local === node | |
) | |
); | |
} | |
/** | |
* Checks whether the given node is an ObjectPattern destructuring. | |
* | |
* Examples: | |
* const { a : b } = foo; | |
* @param {ASTNode} node `Identifier` node to check. | |
* @returns {boolean} `true` if the node is in an ObjectPattern destructuring. | |
*/ | |
function isPropertyNameInDestructuring(node) { | |
const parent = node.parent; | |
return ( | |
( | |
!parent.computed && | |
parent.type === "Property" && | |
parent.parent.type === "ObjectPattern" && | |
parent.key === node | |
) | |
); | |
} | |
//------------------------------------------------------------------------------ | |
// Rule Definition | |
//------------------------------------------------------------------------------ | |
/** @type {import('../shared/types').Rule} */ | |
module.exports = { | |
meta: { | |
type: "suggestion", | |
docs: { | |
description: "Disallow specified identifiers", | |
recommended: false, | |
url: "https://eslint.org/docs/latest/rules/id-denylist" | |
}, | |
schema: { | |
type: "array", | |
items: { | |
type: "string" | |
}, | |
uniqueItems: true | |
}, | |
messages: { | |
restricted: "Identifier '{{name}}' is restricted.", | |
restrictedPrivate: "Identifier '#{{name}}' is restricted." | |
} | |
}, | |
create(context) { | |
const denyList = new Set(context.options); | |
const reportedNodes = new Set(); | |
const sourceCode = context.sourceCode; | |
let globalScope; | |
/** | |
* Checks whether the given name is restricted. | |
* @param {string} name The name to check. | |
* @returns {boolean} `true` if the name is restricted. | |
* @private | |
*/ | |
function isRestricted(name) { | |
return denyList.has(name); | |
} | |
/** | |
* Checks whether the given node represents a reference to a global variable that is not declared in the source code. | |
* These identifiers will be allowed, as it is assumed that user has no control over the names of external global variables. | |
* @param {ASTNode} node `Identifier` node to check. | |
* @returns {boolean} `true` if the node is a reference to a global variable. | |
*/ | |
function isReferenceToGlobalVariable(node) { | |
const variable = globalScope.set.get(node.name); | |
return variable && variable.defs.length === 0 && | |
variable.references.some(ref => ref.identifier === node); | |
} | |
/** | |
* Determines whether the given node should be checked. | |
* @param {ASTNode} node `Identifier` node. | |
* @returns {boolean} `true` if the node should be checked. | |
*/ | |
function shouldCheck(node) { | |
const parent = node.parent; | |
/* | |
* Member access has special rules for checking property names. | |
* Read access to a property with a restricted name is allowed, because it can be on an object that user has no control over. | |
* Write access isn't allowed, because it potentially creates a new property with a restricted name. | |
*/ | |
if ( | |
parent.type === "MemberExpression" && | |
parent.property === node && | |
!parent.computed | |
) { | |
return isAssignmentTarget(parent); | |
} | |
return ( | |
parent.type !== "CallExpression" && | |
parent.type !== "NewExpression" && | |
!isRenamedImport(node) && | |
!isPropertyNameInDestructuring(node) && | |
!isReferenceToGlobalVariable(node) | |
); | |
} | |
/** | |
* Reports an AST node as a rule violation. | |
* @param {ASTNode} node The node to report. | |
* @returns {void} | |
* @private | |
*/ | |
function report(node) { | |
/* | |
* We used the range instead of the node because it's possible | |
* for the same identifier to be represented by two different | |
* nodes, with the most clear example being shorthand properties: | |
* { foo } | |
* In this case, "foo" is represented by one node for the name | |
* and one for the value. The only way to know they are the same | |
* is to look at the range. | |
*/ | |
if (!reportedNodes.has(node.range.toString())) { | |
const isPrivate = node.type === "PrivateIdentifier"; | |
context.report({ | |
node, | |
messageId: isPrivate ? "restrictedPrivate" : "restricted", | |
data: { | |
name: node.name | |
} | |
}); | |
reportedNodes.add(node.range.toString()); | |
} | |
} | |
return { | |
Program(node) { | |
globalScope = sourceCode.getScope(node); | |
}, | |
[[ | |
"Identifier", | |
"PrivateIdentifier" | |
]](node) { | |
if (isRestricted(node.name) && shouldCheck(node)) { | |
report(node); | |
} | |
} | |
}; | |
} | |
}; |