forked from dart-code-checker/dart-code-metrics
-
Notifications
You must be signed in to change notification settings - Fork 0
/
avoid_banned_imports_rule.dart
51 lines (40 loc) · 1.45 KB
/
avoid_banned_imports_rule.dart
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
// ignore_for_file: public_member_api_docs
import 'package:analyzer/dart/ast/ast.dart';
import 'package:analyzer/dart/ast/visitor.dart';
import '../../../../../utils/node_utils.dart';
import '../../../lint_utils.dart';
import '../../../models/internal_resolved_unit_result.dart';
import '../../../models/issue.dart';
import '../../../models/severity.dart';
import '../../models/common_rule.dart';
import '../../rule_utils.dart';
part 'visitor.dart';
part 'utils/config_parser.dart';
class AvoidBannedImportsRule extends CommonRule {
static const String ruleId = 'avoid-banned-imports';
final List<_AvoidBannedImportsConfigEntry> _entries;
AvoidBannedImportsRule([Map<String, Object> config = const {}])
: _entries = _ConfigParser._parseEntryConfig(config),
super(
id: ruleId,
severity: readSeverity(config, Severity.style),
excludes: readExcludes(config),
);
@override
Iterable<Issue> check(InternalResolvedUnitResult source) {
final activeEntries = _entries
.where((entry) => entry.paths.any((path) => path.hasMatch(source.path)))
.toList();
final visitor = _Visitor(activeEntries);
source.unit.visitChildren(visitor);
return visitor.nodes
.map(
(node) => createIssue(
rule: this,
location: nodeLocation(node: node.node, source: source),
message: node.message,
),
)
.toList(growable: false);
}
}