UNPKG

eslint-plugin-sonarjs

Version:
97 lines (96 loc) 4.22 kB
"use strict"; /* * SonarQube JavaScript Plugin * Copyright (C) 2011-2024 SonarSource SA * mailto:info AT sonarsource DOT com * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 3 of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program; if not, write to the Free Software Foundation, * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. */ // https://sonarsource.github.io/rspec/#/rspec/S4502/javascript Object.defineProperty(exports, "__esModule", { value: true }); exports.rule = void 0; const helpers_1 = require("../helpers"); const meta_1 = require("./meta"); const CSURF_MODULE = 'csurf'; const SAFE_METHODS = ['GET', 'HEAD', 'OPTIONS']; exports.rule = { meta: (0, helpers_1.generateMeta)(meta_1.meta, undefined, true), create(context) { let globalCsrfProtection = false; let importedCsrfMiddleware = false; function checkIgnoredMethods(node) { if (node.value.type === 'ArrayExpression') { const arrayExpr = node.value; const unsafeMethods = arrayExpr.elements .filter(helpers_1.isLiteral) .filter(e => typeof e.value === 'string' && !SAFE_METHODS.includes(e.value)); if (unsafeMethods.length > 0) { const [first, ...rest] = unsafeMethods; (0, helpers_1.report)(context, { message: 'Make sure disabling CSRF protection is safe here.', node: first, }, rest.map(node => (0, helpers_1.toSecondaryLocation)(node))); } } } function isCsurfMiddleware(node) { return node && (0, helpers_1.getFullyQualifiedName)(context, node) === CSURF_MODULE; } function checkCallExpression(callExpression) { const { callee } = callExpression; // require('csurf') if ((0, helpers_1.isRequireModule)(callExpression, CSURF_MODULE)) { importedCsrfMiddleware = true; } // csurf(...) if ((0, helpers_1.getFullyQualifiedName)(context, callee) === CSURF_MODULE) { const [args] = callExpression.arguments; const ignoredMethods = (0, helpers_1.getProperty)(args, 'ignoreMethods', context); if (ignoredMethods) { checkIgnoredMethods(ignoredMethods); } } // app.use(csurf(...)) if (callee.type === 'MemberExpression') { if ((0, helpers_1.isIdentifier)(callee.property, 'use') && (0, helpers_1.flattenArgs)(context, callExpression.arguments).find(isCsurfMiddleware)) { globalCsrfProtection = true; } if ((0, helpers_1.isIdentifier)(callee.property, 'post', 'put', 'delete', 'patch') && !globalCsrfProtection && importedCsrfMiddleware && !callExpression.arguments.some(arg => isCsurfMiddleware(arg))) { (0, helpers_1.report)(context, { message: 'Make sure not using CSRF protection is safe here.', node: callee, }); } } } return { Program() { globalCsrfProtection = false; }, CallExpression(node) { checkCallExpression(node); }, ImportDeclaration(node) { if (node.source.value === CSURF_MODULE) { importedCsrfMiddleware = true; } }, }; }, };