Skip to main content
Drupal API
User account menu
  • Log in

Breadcrumb

  1. Drupal Core 11.1.x
  2. ForbiddenFunctionsSniff.php

class ForbiddenFunctionsSniff

Hierarchy

  • class \PHP_CodeSniffer\Standards\Generic\Sniffs\PHP\ForbiddenFunctionsSniff implements \PHP_CodeSniffer\Sniffs\Sniff

Expanded class hierarchy of ForbiddenFunctionsSniff

2 files declare their use of ForbiddenFunctionsSniff
DiscouragedFunctionsSniff.php in vendor/drupal/coder/coder_sniffer/Drupal/Sniffs/Functions/DiscouragedFunctionsSniff.php
DiscouragedFunctionsSniff.php in vendor/squizlabs/php_codesniffer/src/Standards/Squiz/Sniffs/PHP/DiscouragedFunctionsSniff.php

File

vendor/squizlabs/php_codesniffer/src/Standards/Generic/Sniffs/PHP/ForbiddenFunctionsSniff.php, line 18

Namespace

PHP_CodeSniffer\Standards\Generic\Sniffs\PHP
View source
class ForbiddenFunctionsSniff implements Sniff {
    
    /**
     * A list of forbidden functions with their alternatives.
     *
     * The value is NULL if no alternative exists. IE, the
     * function should just not be used.
     *
     * @var array<string, string|null>
     */
    public $forbiddenFunctions = [
        'sizeof' => 'count',
        'delete' => 'unset',
    ];
    
    /**
     * A cache of forbidden function names, for faster lookups.
     *
     * @var string[]
     */
    protected $forbiddenFunctionNames = [];
    
    /**
     * If true, forbidden functions will be considered regular expressions.
     *
     * @var boolean
     */
    protected $patternMatch = false;
    
    /**
     * If true, an error will be thrown; otherwise a warning.
     *
     * @var boolean
     */
    public $error = true;
    
    /**
     * Returns an array of tokens this test wants to listen for.
     *
     * @return array<int|string>
     */
    public function register() {
        // Everyone has had a chance to figure out what forbidden functions
        // they want to check for, so now we can cache out the list.
        $this->forbiddenFunctionNames = array_keys($this->forbiddenFunctions);
        if ($this->patternMatch === true) {
            foreach ($this->forbiddenFunctionNames as $i => $name) {
                $this->forbiddenFunctionNames[$i] = '/' . $name . '/i';
            }
            return [
                T_STRING,
            ];
        }
        // If we are not pattern matching, we need to work out what
        // tokens to listen for.
        $hasHaltCompiler = false;
        $string = '<?php ';
        foreach ($this->forbiddenFunctionNames as $name) {
            if ($name === '__halt_compiler') {
                $hasHaltCompiler = true;
            }
            else {
                $string .= $name . '();';
            }
        }
        if ($hasHaltCompiler === true) {
            $string .= '__halt_compiler();';
        }
        $register = [];
        $tokens = token_get_all($string);
        array_shift($tokens);
        foreach ($tokens as $token) {
            if (is_array($token) === true) {
                $register[] = $token[0];
            }
        }
        $this->forbiddenFunctionNames = array_map('strtolower', $this->forbiddenFunctionNames);
        $this->forbiddenFunctions = array_combine($this->forbiddenFunctionNames, $this->forbiddenFunctions);
        return array_unique($register);
    }
    
    //end register()
    
    /**
     * Processes this test, when one of its tokens is encountered.
     *
     * @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned.
     * @param int                         $stackPtr  The position of the current token in
     *                                               the stack passed in $tokens.
     *
     * @return void
     */
    public function process(File $phpcsFile, $stackPtr) {
        $tokens = $phpcsFile->getTokens();
        $ignore = [
            T_DOUBLE_COLON => true,
            T_OBJECT_OPERATOR => true,
            T_NULLSAFE_OBJECT_OPERATOR => true,
            T_FUNCTION => true,
            T_CONST => true,
            T_PUBLIC => true,
            T_PRIVATE => true,
            T_PROTECTED => true,
            T_AS => true,
            T_NEW => true,
            T_INSTEADOF => true,
            T_NS_SEPARATOR => true,
            T_IMPLEMENTS => true,
        ];
        $prevToken = $phpcsFile->findPrevious(T_WHITESPACE, $stackPtr - 1, null, true);
        // If function call is directly preceded by a NS_SEPARATOR it points to the
        // global namespace, so we should still catch it.
        if ($tokens[$prevToken]['code'] === T_NS_SEPARATOR) {
            $prevToken = $phpcsFile->findPrevious(T_WHITESPACE, $prevToken - 1, null, true);
            if ($tokens[$prevToken]['code'] === T_STRING) {
                // Not in the global namespace.
                return;
            }
        }
        if (isset($ignore[$tokens[$prevToken]['code']]) === true) {
            // Not a call to a PHP function.
            return;
        }
        $nextToken = $phpcsFile->findNext(T_WHITESPACE, $stackPtr + 1, null, true);
        if (isset($ignore[$tokens[$nextToken]['code']]) === true) {
            // Not a call to a PHP function.
            return;
        }
        if ($tokens[$stackPtr]['code'] === T_STRING && $tokens[$nextToken]['code'] !== T_OPEN_PARENTHESIS) {
            // Not a call to a PHP function.
            return;
        }
        if (empty($tokens[$stackPtr]['nested_attributes']) === false) {
            // Class instantiation in attribute, not function call.
            return;
        }
        $function = strtolower($tokens[$stackPtr]['content']);
        $pattern = null;
        if ($this->patternMatch === true) {
            $count = 0;
            $pattern = preg_replace($this->forbiddenFunctionNames, $this->forbiddenFunctionNames, $function, 1, $count);
            if ($count === 0) {
                return;
            }
            // Remove the pattern delimiters and modifier.
            $pattern = substr($pattern, 1, -2);
        }
        else {
            if (in_array($function, $this->forbiddenFunctionNames, true) === false) {
                return;
            }
        }
        
        //end if
        $this->addError($phpcsFile, $stackPtr, $tokens[$stackPtr]['content'], $pattern);
    }
    
    //end process()
    
    /**
     * Generates the error or warning for this sniff.
     *
     * @param \PHP_CodeSniffer\Files\File $phpcsFile The file being scanned.
     * @param int                         $stackPtr  The position of the forbidden function
     *                                               in the token array.
     * @param string                      $function  The name of the forbidden function.
     * @param string                      $pattern   The pattern used for the match.
     *
     * @return void
     */
    protected function addError($phpcsFile, $stackPtr, $function, $pattern = null) {
        $data = [
            $function,
        ];
        $error = 'The use of function %s() is ';
        if ($this->error === true) {
            $type = 'Found';
            $error .= 'forbidden';
        }
        else {
            $type = 'Discouraged';
            $error .= 'discouraged';
        }
        if ($pattern === null) {
            $pattern = strtolower($function);
        }
        if ($this->forbiddenFunctions[$pattern] !== null && $this->forbiddenFunctions[$pattern] !== 'null') {
            $type .= 'WithAlternative';
            $data[] = $this->forbiddenFunctions[$pattern];
            $error .= '; use %s() instead';
        }
        if ($this->error === true) {
            $phpcsFile->addError($error, $stackPtr, $type, $data);
        }
        else {
            $phpcsFile->addWarning($error, $stackPtr, $type, $data);
        }
    }
    
    //end addError()

}

Members

Title Sort descending Modifiers Object type Summary Overriden Title Overrides
ForbiddenFunctionsSniff::$error public property If true, an error will be thrown; otherwise a warning. 2
ForbiddenFunctionsSniff::$forbiddenFunctionNames protected property A cache of forbidden function names, for faster lookups.
ForbiddenFunctionsSniff::$forbiddenFunctions public property A list of forbidden functions with their alternatives. 3
ForbiddenFunctionsSniff::$patternMatch protected property If true, forbidden functions will be considered regular expressions.
ForbiddenFunctionsSniff::addError protected function Generates the error or warning for this sniff. 1
ForbiddenFunctionsSniff::process public function Processes this test, when one of its tokens is encountered. Overrides Sniff::process
ForbiddenFunctionsSniff::register public function Returns an array of tokens this test wants to listen for. Overrides Sniff::register
RSS feed
Powered by Drupal