-
-
Notifications
You must be signed in to change notification settings - Fork 4.6k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update: deprecate id-blacklist rule (#13465)
* Fix: deprecates id-blacklist (and documents deprecation) * Update docs/rules/id-blacklist.md Co-authored-by: Milos Djermanovic <milos.djermanovic@gmail.com> * copies contents of id-denylist to id-blacklist verbatim * deprecates id-blacklist and updates docs url * adds replacedBy metadata Co-authored-by: Milos Djermanovic <milos.djermanovic@gmail.com>
- Loading branch information
1 parent
e14a645
commit f4d7b9e
Showing
4 changed files
with
238 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# disallow specified identifiers (id-blacklist) | ||
|
||
This rule was **deprecated** in ESLint v7.5.0 and replaced by the [id-denylist](id-denylist.md) rule. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,233 @@ | ||
/** | ||
* @fileoverview Rule that warns when identifier names that are | ||
* specified in the configuration are used. | ||
* @author Keith Cirkel (http://keithcirkel.co.uk) | ||
*/ | ||
|
||
"use strict"; | ||
|
||
//------------------------------------------------------------------------------ | ||
// Helpers | ||
//------------------------------------------------------------------------------ | ||
|
||
/** | ||
* Checks whether the given node represents assignment target in a normal assignment or destructuring. | ||
* @param {ASTNode} node The node to check. | ||
* @returns {boolean} `true` if the node is assignment target. | ||
*/ | ||
function isAssignmentTarget(node) { | ||
const parent = node.parent; | ||
|
||
return ( | ||
|
||
// normal assignment | ||
( | ||
parent.type === "AssignmentExpression" && | ||
parent.left === node | ||
) || | ||
|
||
// destructuring | ||
parent.type === "ArrayPattern" || | ||
parent.type === "RestElement" || | ||
( | ||
parent.type === "Property" && | ||
parent.value === node && | ||
parent.parent.type === "ObjectPattern" | ||
) || | ||
( | ||
parent.type === "AssignmentPattern" && | ||
parent.left === node | ||
) | ||
); | ||
} | ||
|
||
/** | ||
* Checks whether the given node represents an imported name that is renamed in the same import/export specifier. | ||
* | ||
* Examples: | ||
* import { a as b } from 'mod'; // node `a` is renamed import | ||
* export { a as b } from 'mod'; // node `a` is renamed import | ||
* @param {ASTNode} node `Identifier` node to check. | ||
* @returns {boolean} `true` if the node is a renamed import. | ||
*/ | ||
function isRenamedImport(node) { | ||
const parent = node.parent; | ||
|
||
return ( | ||
( | ||
parent.type === "ImportSpecifier" && | ||
parent.imported !== parent.local && | ||
parent.imported === node | ||
) || | ||
( | ||
parent.type === "ExportSpecifier" && | ||
parent.parent.source && // re-export | ||
parent.local !== parent.exported && | ||
parent.local === node | ||
) | ||
); | ||
} | ||
|
||
/** | ||
* Checks whether the given node is a renamed identifier node in an ObjectPattern destructuring. | ||
* | ||
* Examples: | ||
* const { a : b } = foo; // node `a` is renamed node. | ||
* @param {ASTNode} node `Identifier` node to check. | ||
* @returns {boolean} `true` if the node is a renamed node in an ObjectPattern destructuring. | ||
*/ | ||
function isRenamedInDestructuring(node) { | ||
const parent = node.parent; | ||
|
||
return ( | ||
( | ||
!parent.computed && | ||
parent.type === "Property" && | ||
parent.parent.type === "ObjectPattern" && | ||
parent.value !== node && | ||
parent.key === node | ||
) | ||
); | ||
} | ||
|
||
/** | ||
* Checks whether the given node represents shorthand definition of a property in an object literal. | ||
* @param {ASTNode} node `Identifier` node to check. | ||
* @returns {boolean} `true` if the node is a shorthand property definition. | ||
*/ | ||
function isShorthandPropertyDefinition(node) { | ||
const parent = node.parent; | ||
|
||
return ( | ||
parent.type === "Property" && | ||
parent.parent.type === "ObjectExpression" && | ||
parent.shorthand | ||
); | ||
} | ||
|
||
//------------------------------------------------------------------------------ | ||
// Rule Definition | ||
//------------------------------------------------------------------------------ | ||
|
||
module.exports = { | ||
meta: { | ||
deprecated: true, | ||
replacedBy: ["id-denylist"], | ||
|
||
type: "suggestion", | ||
|
||
docs: { | ||
description: "disallow specified identifiers", | ||
category: "Stylistic Issues", | ||
recommended: false, | ||
url: "https://eslint.org/docs/rules/id-blacklist" | ||
}, | ||
|
||
schema: { | ||
type: "array", | ||
items: { | ||
type: "string" | ||
}, | ||
uniqueItems: true | ||
}, | ||
messages: { | ||
restricted: "Identifier '{{name}}' is restricted." | ||
} | ||
}, | ||
|
||
create(context) { | ||
|
||
const denyList = new Set(context.options); | ||
const reportedNodes = new Set(); | ||
|
||
let globalScope; | ||
|
||
/** | ||
* Checks whether the given name is restricted. | ||
* @param {string} name The name to check. | ||
* @returns {boolean} `true` if the name is restricted. | ||
* @private | ||
*/ | ||
function isRestricted(name) { | ||
return denyList.has(name); | ||
} | ||
|
||
/** | ||
* Checks whether the given node represents a reference to a global variable that is not declared in the source code. | ||
* These identifiers will be allowed, as it is assumed that user has no control over the names of external global variables. | ||
* @param {ASTNode} node `Identifier` node to check. | ||
* @returns {boolean} `true` if the node is a reference to a global variable. | ||
*/ | ||
function isReferenceToGlobalVariable(node) { | ||
const variable = globalScope.set.get(node.name); | ||
|
||
return variable && variable.defs.length === 0 && | ||
variable.references.some(ref => ref.identifier === node); | ||
} | ||
|
||
/** | ||
* Determines whether the given node should be checked. | ||
* @param {ASTNode} node `Identifier` node. | ||
* @returns {boolean} `true` if the node should be checked. | ||
*/ | ||
function shouldCheck(node) { | ||
const parent = node.parent; | ||
|
||
/* | ||
* Member access has special rules for checking property names. | ||
* Read access to a property with a restricted name is allowed, because it can be on an object that user has no control over. | ||
* Write access isn't allowed, because it potentially creates a new property with a restricted name. | ||
*/ | ||
if ( | ||
parent.type === "MemberExpression" && | ||
parent.property === node && | ||
!parent.computed | ||
) { | ||
return isAssignmentTarget(parent); | ||
} | ||
|
||
return ( | ||
parent.type !== "CallExpression" && | ||
parent.type !== "NewExpression" && | ||
!isRenamedImport(node) && | ||
!isRenamedInDestructuring(node) && | ||
!( | ||
isReferenceToGlobalVariable(node) && | ||
!isShorthandPropertyDefinition(node) | ||
) | ||
); | ||
} | ||
|
||
/** | ||
* Reports an AST node as a rule violation. | ||
* @param {ASTNode} node The node to report. | ||
* @returns {void} | ||
* @private | ||
*/ | ||
function report(node) { | ||
if (!reportedNodes.has(node)) { | ||
context.report({ | ||
node, | ||
messageId: "restricted", | ||
data: { | ||
name: node.name | ||
} | ||
}); | ||
reportedNodes.add(node); | ||
} | ||
} | ||
|
||
return { | ||
|
||
Program() { | ||
globalScope = context.getScope(); | ||
}, | ||
|
||
Identifier(node) { | ||
if (isRestricted(node.name) && shouldCheck(node)) { | ||
report(node); | ||
} | ||
} | ||
}; | ||
} | ||
}; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
f4d7b9e
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#BlackListsMatter