package resolver import ( "fmt" "net/url" "path" "regexp" "sort" "strings" "github.com/evanw/esbuild/internal/config" "github.com/evanw/esbuild/internal/js_ast" "github.com/evanw/esbuild/internal/js_lexer" "github.com/evanw/esbuild/internal/js_parser" "github.com/evanw/esbuild/internal/logger" ) type packageJSON struct { source logger.Source mainFields map[string]string moduleType config.ModuleType // Present if the "browser" field is present. This field is intended to be // used by bundlers and lets you redirect the paths of certain 3rd-party // modules that don't work in the browser to other modules that shim that // functionality. That way you don't have to rewrite the code for those 3rd- // party modules. For example, you might remap the native "util" node module // to something like https://www.npmjs.com/package/util so it works in the // browser. // // This field contains a mapping of absolute paths to absolute paths. Mapping // to an empty path indicates that the module is disabled. As far as I can // tell, the official spec is an abandoned GitHub repo hosted by a user account: // https://github.com/defunctzombie/package-browser-field-spec. The npm docs // say almost nothing: https://docs.npmjs.com/files/package.json. // // Note that the non-package "browser" map has to be checked twice to match // Webpack's behavior: once before resolution and once after resolution. It // leads to some unintuitive failure cases that we must emulate around missing // file extensions: // // * Given the mapping "./no-ext": "./no-ext-browser.js" the query "./no-ext" // should match but the query "./no-ext.js" should NOT match. // // * Given the mapping "./ext.js": "./ext-browser.js" the query "./ext.js" // should match and the query "./ext" should ALSO match. // browserMap map[string]*string // If this is non-nil, each entry in this map is the absolute path of a file // with side effects. Any entry not in this map should be considered to have // no side effects, which means import statements for these files can be // removed if none of the imports are used. This is a convention from Webpack: // https://webpack.js.org/guides/tree-shaking/. // // Note that if a file is included, all statements that can't be proven to be // free of side effects must be included. This convention does not say // anything about whether any statements within the file have side effects or // not. sideEffectsMap map[string]bool sideEffectsRegexps []*regexp.Regexp sideEffectsData *SideEffectsData // This represents the "exports" field in this package.json file. exportsMap *peMap } func (r resolverQuery) checkBrowserMap(pj *packageJSON, inputPath string) (remapped *string, ok bool) { // Normalize the path so we can compare against it without getting confused by "./" cleanPath := path.Clean(strings.ReplaceAll(inputPath, "\\", "/")) if cleanPath == "." { // No bundler supports remapping ".", so we don't either return nil, false } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking for %q in the \"browser\" map in %q", inputPath, pj.source.KeyPath.Text)) } // Check for equality if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking for %q", cleanPath)) } remapped, ok = pj.browserMap[cleanPath] // If that failed, try adding implicit extensions if !ok { for _, ext := range r.options.ExtensionOrder { extPath := cleanPath + ext if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking for %q", extPath)) } remapped, ok = pj.browserMap[extPath] if ok { cleanPath = extPath break } } } if r.debugLogs != nil { if ok { if remapped == nil { r.debugLogs.addNote(fmt.Sprintf("Found %q marked as disabled", inputPath)) } else { r.debugLogs.addNote(fmt.Sprintf("Found %q mapping to %q", cleanPath, *remapped)) } } else { r.debugLogs.addNote(fmt.Sprintf("Failed to find %q", inputPath)) } } return } func (r resolverQuery) parsePackageJSON(inputPath string) *packageJSON { packageJSONPath := r.fs.Join(inputPath, "package.json") contents, err, originalError := r.caches.FSCache.ReadFile(r.fs, packageJSONPath) if r.debugLogs != nil && originalError != nil { r.debugLogs.addNote(fmt.Sprintf("Failed to read file %q: %s", packageJSONPath, originalError.Error())) } if err != nil { r.log.AddError(nil, logger.Loc{}, fmt.Sprintf("Cannot read file %q: %s", r.PrettyPath(logger.Path{Text: packageJSONPath, Namespace: "file"}), err.Error())) return nil } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The file %q exists", packageJSONPath)) } keyPath := logger.Path{Text: packageJSONPath, Namespace: "file"} jsonSource := logger.Source{ KeyPath: keyPath, PrettyPath: r.PrettyPath(keyPath), Contents: contents, } json, ok := r.caches.JSONCache.Parse(r.log, jsonSource, js_parser.JSONOptions{}) if !ok { return nil } packageJSON := &packageJSON{source: jsonSource} // Read the "type" field if typeJSON, _, ok := getProperty(json, "type"); ok { if typeValue, ok := getString(typeJSON); ok { switch typeValue { case "commonjs": packageJSON.moduleType = config.ModuleCommonJS case "module": packageJSON.moduleType = config.ModuleESM default: r.log.AddRangeWarning(&jsonSource, jsonSource.RangeOfString(typeJSON.Loc), fmt.Sprintf("%q is not a valid value for the \"type\" field (must be either \"commonjs\" or \"module\")", typeValue)) } } else { r.log.AddWarning(&jsonSource, typeJSON.Loc, "The value for \"type\" must be a string") } } // Read the "main" fields mainFields := r.options.MainFields if mainFields == nil { mainFields = defaultMainFields[r.options.Platform] } for _, field := range mainFields { if mainJSON, _, ok := getProperty(json, field); ok { if main, ok := getString(mainJSON); ok && main != "" { if packageJSON.mainFields == nil { packageJSON.mainFields = make(map[string]string) } packageJSON.mainFields[field] = main } } } // Read the "browser" property, but only when targeting the browser if browserJSON, _, ok := getProperty(json, "browser"); ok && r.options.Platform == config.PlatformBrowser { // We both want the ability to have the option of CJS vs. ESM and the // option of having node vs. browser. The way to do this is to use the // object literal form of the "browser" field like this: // // "main": "dist/index.node.cjs.js", // "module": "dist/index.node.esm.js", // "browser": { // "./dist/index.node.cjs.js": "./dist/index.browser.cjs.js", // "./dist/index.node.esm.js": "./dist/index.browser.esm.js" // }, // if browser, ok := browserJSON.Data.(*js_ast.EObject); ok { // The value is an object browserMap := make(map[string]*string) // Remap all files in the browser field for _, prop := range browser.Properties { if key, ok := getString(prop.Key); ok && prop.Value != nil { // Normalize the path so we can compare against it without getting // confused by "./". There is no distinction between package paths and // relative paths for these values because some tools (i.e. Browserify) // don't make such a distinction. // // This leads to weird things like a mapping for "./foo" matching an // import of "foo", but that's actually not a bug. Or arguably it's a // bug in Browserify but we have to replicate this bug because packages // do this in the wild. key = path.Clean(key) if value, ok := getString(*prop.Value); ok { // If this is a string, it's a replacement package browserMap[key] = &value } else if value, ok := getBool(*prop.Value); ok { // If this is false, it means the package is disabled if !value { browserMap[key] = nil } } else { r.log.AddWarning(&jsonSource, prop.Value.Loc, "Each \"browser\" mapping must be a string or a boolean") } } } packageJSON.browserMap = browserMap } } // Read the "sideEffects" property if sideEffectsJSON, sideEffectsLoc, ok := getProperty(json, "sideEffects"); ok { switch data := sideEffectsJSON.Data.(type) { case *js_ast.EBoolean: if !data.Value { // Make an empty map for "sideEffects: false", which indicates all // files in this module can be considered to not have side effects. packageJSON.sideEffectsMap = make(map[string]bool) packageJSON.sideEffectsData = &SideEffectsData{ IsSideEffectsArrayInJSON: false, Source: &jsonSource, Range: jsonSource.RangeOfString(sideEffectsLoc), } } case *js_ast.EArray: // The "sideEffects: []" format means all files in this module but not in // the array can be considered to not have side effects. packageJSON.sideEffectsMap = make(map[string]bool) packageJSON.sideEffectsData = &SideEffectsData{ IsSideEffectsArrayInJSON: true, Source: &jsonSource, Range: jsonSource.RangeOfString(sideEffectsLoc), } for _, itemJSON := range data.Items { item, ok := itemJSON.Data.(*js_ast.EString) if !ok || item.Value == nil { r.log.AddWarning(&jsonSource, itemJSON.Loc, "Expected string in array for \"sideEffects\"") continue } absPattern := r.fs.Join(inputPath, js_lexer.UTF16ToString(item.Value)) re, hadWildcard := globToEscapedRegexp(absPattern) // Wildcard patterns require more expensive matching if hadWildcard { packageJSON.sideEffectsRegexps = append(packageJSON.sideEffectsRegexps, regexp.MustCompile(re)) continue } // Normal strings can be matched with a map lookup packageJSON.sideEffectsMap[absPattern] = true } default: r.log.AddWarning(&jsonSource, sideEffectsJSON.Loc, "The value for \"sideEffects\" must be a boolean or an array") } } // Read the "exports" map if exportsJSON, exportsRange, ok := getProperty(json, "exports"); ok { if exportsMap := parseExportsMap(jsonSource, r.log, exportsJSON); exportsMap != nil { exportsMap.exportsRange = jsonSource.RangeOfString(exportsRange) packageJSON.exportsMap = exportsMap } } return packageJSON } func globToEscapedRegexp(glob string) (string, bool) { sb := strings.Builder{} sb.WriteByte('^') hadWildcard := false for _, c := range glob { switch c { case '\\', '^', '$', '.', '+', '|', '(', ')', '[', ']', '{', '}': sb.WriteByte('\\') sb.WriteRune(c) case '*': sb.WriteString(".*") hadWildcard = true case '?': sb.WriteByte('.') hadWildcard = true default: sb.WriteRune(c) } } sb.WriteByte('$') return sb.String(), hadWildcard } // Reference: https://nodejs.org/api/esm.html#esm_resolver_algorithm_specification type peMap struct { exportsRange logger.Range root peEntry } type peKind uint8 const ( peNull peKind = iota peString peArray peObject peInvalid ) type peEntry struct { strData string arrData []peEntry mapData []peMapEntry // Can't be a "map" because order matters expansionKeys expansionKeysArray firstToken logger.Range kind peKind } type peMapEntry struct { key string keyRange logger.Range value peEntry } // This type is just so we can use Go's native sort function type expansionKeysArray []peMapEntry func (a expansionKeysArray) Len() int { return len(a) } func (a expansionKeysArray) Swap(i int, j int) { a[i], a[j] = a[j], a[i] } func (a expansionKeysArray) Less(i int, j int) bool { return len(a[i].key) > len(a[j].key) } func (entry peEntry) valueForKey(key string) (peEntry, bool) { for _, item := range entry.mapData { if item.key == key { return item.value, true } } return peEntry{}, false } func parseExportsMap(source logger.Source, log logger.Log, json js_ast.Expr) *peMap { var visit func(expr js_ast.Expr) peEntry visit = func(expr js_ast.Expr) peEntry { var firstToken logger.Range switch e := expr.Data.(type) { case *js_ast.ENull: return peEntry{ kind: peNull, firstToken: js_lexer.RangeOfIdentifier(source, expr.Loc), } case *js_ast.EString: return peEntry{ kind: peString, firstToken: source.RangeOfString(expr.Loc), strData: js_lexer.UTF16ToString(e.Value), } case *js_ast.EArray: arrData := make([]peEntry, len(e.Items)) for i, item := range e.Items { arrData[i] = visit(item) } return peEntry{ kind: peArray, firstToken: logger.Range{Loc: expr.Loc, Len: 1}, arrData: arrData, } case *js_ast.EObject: mapData := make([]peMapEntry, len(e.Properties)) expansionKeys := make(expansionKeysArray, 0, len(e.Properties)) firstToken := logger.Range{Loc: expr.Loc, Len: 1} isConditionalSugar := false for i, property := range e.Properties { keyStr, _ := property.Key.Data.(*js_ast.EString) key := js_lexer.UTF16ToString(keyStr.Value) keyRange := source.RangeOfString(property.Key.Loc) // If exports is an Object with both a key starting with "." and a key // not starting with ".", throw an Invalid Package Configuration error. curIsConditionalSugar := !strings.HasPrefix(key, ".") if i == 0 { isConditionalSugar = curIsConditionalSugar } else if isConditionalSugar != curIsConditionalSugar { prevEntry := mapData[i-1] log.AddRangeWarningWithNotes(&source, keyRange, "This object cannot contain keys that both start with \".\" and don't start with \".\"", []logger.MsgData{logger.RangeData(&source, prevEntry.keyRange, fmt.Sprintf("The previous key %q is incompatible with the current key %q", prevEntry.key, key))}) return peEntry{ kind: peInvalid, firstToken: firstToken, } } entry := peMapEntry{ key: key, keyRange: keyRange, value: visit(*property.Value), } if strings.HasSuffix(key, "/") || strings.HasSuffix(key, "*") { expansionKeys = append(expansionKeys, entry) } mapData[i] = entry } // Let expansionKeys be the list of keys of matchObj ending in "/" or "*", // sorted by length descending. sort.Stable(expansionKeys) return peEntry{ kind: peObject, firstToken: firstToken, mapData: mapData, expansionKeys: expansionKeys, } case *js_ast.EBoolean: firstToken = js_lexer.RangeOfIdentifier(source, expr.Loc) case *js_ast.ENumber: firstToken = source.RangeOfNumber(expr.Loc) default: firstToken.Loc = expr.Loc } log.AddRangeWarning(&source, firstToken, "This value must be a string, an object, an array, or null") return peEntry{ kind: peInvalid, firstToken: firstToken, } } root := visit(json) if root.kind == peNull { return nil } return &peMap{root: root} } func (entry peEntry) keysStartWithDot() bool { return len(entry.mapData) > 0 && strings.HasPrefix(entry.mapData[0].key, ".") } type peStatus uint8 const ( peStatusUndefined peStatus = iota peStatusUndefinedNoConditionsMatch // A more friendly error message for when no conditions are matched peStatusNull peStatusExact peStatusInexact // This means we may need to try CommonJS-style extension suffixes // Module specifier is an invalid URL, package name or package subpath specifier. peStatusInvalidModuleSpecifier // package.json configuration is invalid or contains an invalid configuration. peStatusInvalidPackageConfiguration // Package exports or imports define a target module for the package that is an invalid type or string target. peStatusInvalidPackageTarget // Package exports do not define or permit a target subpath in the package for the given module. peStatusPackagePathNotExported // The package or module requested does not exist. peStatusModuleNotFound // The resolved path corresponds to a directory, which is not a supported target for module imports. peStatusUnsupportedDirectoryImport ) func (status peStatus) isUndefined() bool { return status == peStatusUndefined || status == peStatusUndefinedNoConditionsMatch } type peDebug struct { // This is the range of the token to use for error messages token logger.Range // If the status is "peStatusUndefinedNoConditionsMatch", this is the set of // conditions that didn't match. This information is used for error messages. unmatchedConditions []string } func (r resolverQuery) esmPackageExportsResolveWithPostConditions( packageURL string, subpath string, exports peEntry, conditions map[string]bool, ) (string, peStatus, peDebug) { resolved, status, debug := r.esmPackageExportsResolve(packageURL, subpath, exports, conditions) if status != peStatusExact && status != peStatusInexact { return resolved, status, debug } // If resolved contains any percent encodings of "/" or "\" ("%2f" and "%5C" // respectively), then throw an Invalid Module Specifier error. resolvedPath, err := url.PathUnescape(resolved) if err != nil { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q contains invalid URL escapes: %s", resolved, err.Error())) } return resolved, peStatusInvalidModuleSpecifier, debug } var found string if strings.Contains(resolved, "%2f") { found = "%2f" } else if strings.Contains(resolved, "%2F") { found = "%2F" } else if strings.Contains(resolved, "%5c") { found = "%5c" } else if strings.Contains(resolved, "%5C") { found = "%5C" } if found != "" { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q is not allowed to contain %q", resolved, found)) } return resolved, peStatusInvalidModuleSpecifier, debug } // If the file at resolved is a directory, then throw an Unsupported Directory // Import error. if strings.HasSuffix(resolvedPath, "/") || strings.HasSuffix(resolvedPath, "\\") { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q is not allowed to end with a slash", resolved)) } return resolved, peStatusUnsupportedDirectoryImport, debug } // Set resolved to the real path of resolved. return resolvedPath, status, debug } func (r resolverQuery) esmPackageExportsResolve( packageURL string, subpath string, exports peEntry, conditions map[string]bool, ) (string, peStatus, peDebug) { if exports.kind == peInvalid { if r.debugLogs != nil { r.debugLogs.addNote("Invalid package configuration") } return "", peStatusInvalidPackageConfiguration, peDebug{token: exports.firstToken} } if subpath == "." { mainExport := peEntry{kind: peNull} if exports.kind == peString || exports.kind == peArray || (exports.kind == peObject && !exports.keysStartWithDot()) { mainExport = exports } else if exports.kind == peObject { if dot, ok := exports.valueForKey("."); ok { if r.debugLogs != nil { r.debugLogs.addNote("Using the entry for \".\"") } mainExport = dot } } if mainExport.kind != peNull { resolved, status, debug := r.esmPackageTargetResolve(packageURL, mainExport, "", false, conditions) if status != peStatusNull && status != peStatusUndefined { return resolved, status, debug } } } else if exports.kind == peObject && exports.keysStartWithDot() { resolved, status, debug := r.esmPackageImportsExportsResolve(subpath, exports, packageURL, conditions) if status != peStatusNull && status != peStatusUndefined { return resolved, status, debug } } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q not exported", subpath)) } return "", peStatusPackagePathNotExported, peDebug{token: exports.firstToken} } func (r resolverQuery) esmPackageImportsExportsResolve( matchKey string, matchObj peEntry, packageURL string, conditions map[string]bool, ) (string, peStatus, peDebug) { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking object path map for %q", matchKey)) } if !strings.HasSuffix(matchKey, "*") { if target, ok := matchObj.valueForKey(matchKey); ok { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Found exact match for %q", matchKey)) } return r.esmPackageTargetResolve(packageURL, target, "", false, conditions) } } for _, expansion := range matchObj.expansionKeys { // If expansionKey ends in "*" and matchKey starts with but is not equal to // the substring of expansionKey excluding the last "*" character if strings.HasSuffix(expansion.key, "*") { if substr := expansion.key[:len(expansion.key)-1]; strings.HasPrefix(matchKey, substr) && matchKey != substr { target := expansion.value subpath := matchKey[len(expansion.key)-1:] if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The key %q matched with %q left over", expansion.key, subpath)) } return r.esmPackageTargetResolve(packageURL, target, subpath, true, conditions) } } if strings.HasPrefix(matchKey, expansion.key) { target := expansion.value subpath := matchKey[len(expansion.key):] if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The key %q matched with %q left over", expansion.key, subpath)) } result, status, debug := r.esmPackageTargetResolve(packageURL, target, subpath, false, conditions) if status == peStatusExact { // Return the object { resolved, exact: false }. status = peStatusInexact } return result, status, debug } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The key %q did not match", expansion.key)) } } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("No keys matched %q", matchKey)) } return "", peStatusNull, peDebug{token: matchObj.firstToken} } // If path split on "/" or "\" contains any ".", ".." or "node_modules" // segments after the first segment, throw an Invalid Package Target error. func findInvalidSegment(path string) string { slash := strings.IndexAny(path, "/\\") if slash == -1 { return "" } path = path[slash+1:] for path != "" { slash := strings.IndexAny(path, "/\\") segment := path if slash != -1 { segment = path[:slash] path = path[slash+1:] } else { path = "" } if segment == "." || segment == ".." || segment == "node_modules" { return segment } } return "" } func (r resolverQuery) esmPackageTargetResolve( packageURL string, target peEntry, subpath string, pattern bool, conditions map[string]bool, ) (string, peStatus, peDebug) { switch target.kind { case peString: if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking path %q against target %q", subpath, target.strData)) r.debugLogs.increaseIndent() defer r.debugLogs.decreaseIndent() } // If pattern is false, subpath has non-zero length and target // does not end with "/", throw an Invalid Module Specifier error. if !pattern && subpath != "" && !strings.HasSuffix(target.strData, "/") { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The target %q is invalid because it doesn't end \"/\"", target.strData)) } return target.strData, peStatusInvalidModuleSpecifier, peDebug{token: target.firstToken} } if !strings.HasPrefix(target.strData, "./") { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The target %q is invalid because it doesn't start with \"./\"", target.strData)) } return target.strData, peStatusInvalidPackageTarget, peDebug{token: target.firstToken} } // If target split on "/" or "\" contains any ".", ".." or "node_modules" // segments after the first segment, throw an Invalid Package Target error. if invalidSegment := findInvalidSegment(target.strData); invalidSegment != "" { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The target %q is invalid because it contains invalid segment %q", target.strData, invalidSegment)) } return target.strData, peStatusInvalidPackageTarget, peDebug{token: target.firstToken} } // Let resolvedTarget be the URL resolution of the concatenation of packageURL and target. resolvedTarget := path.Join(packageURL, target.strData) // If subpath split on "/" or "\" contains any ".", ".." or "node_modules" // segments, throw an Invalid Module Specifier error. if invalidSegment := findInvalidSegment(subpath); invalidSegment != "" { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q is invalid because it contains invalid segment %q", subpath, invalidSegment)) } return subpath, peStatusInvalidModuleSpecifier, peDebug{token: target.firstToken} } if pattern { // Return the URL resolution of resolvedTarget with every instance of "*" replaced with subpath. result := strings.ReplaceAll(resolvedTarget, "*", subpath) if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Substituted %q for \"*\" in %q to get %q", subpath, "."+resolvedTarget, "."+result)) } return result, peStatusExact, peDebug{token: target.firstToken} } else { // Return the URL resolution of the concatenation of subpath and resolvedTarget. result := path.Join(resolvedTarget, subpath) if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Joined %q to %q to get %q", subpath, "."+resolvedTarget, "."+result)) } return result, peStatusExact, peDebug{token: target.firstToken} } case peObject: if r.debugLogs != nil { keys := make([]string, 0, len(conditions)) for key := range conditions { keys = append(keys, fmt.Sprintf("%q", key)) } sort.Strings(keys) r.debugLogs.addNote(fmt.Sprintf("Checking condition map for one of [%s]", strings.Join(keys, ", "))) r.debugLogs.increaseIndent() defer r.debugLogs.decreaseIndent() } for _, p := range target.mapData { if p.key == "default" || conditions[p.key] { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The key %q applies", p.key)) } resolved, status, debug := r.esmPackageTargetResolve(packageURL, p.value, subpath, pattern, conditions) if status.isUndefined() { continue } return resolved, status, debug } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The key %q does not apply", p.key)) } } if r.debugLogs != nil { r.debugLogs.addNote("No keys in the map were applicable") } // ALGORITHM DEVIATION: Provide a friendly error message if no conditions matched if len(target.mapData) > 0 && !target.keysStartWithDot() { keys := make([]string, len(target.mapData)) for i, p := range target.mapData { keys[i] = p.key } return "", peStatusUndefinedNoConditionsMatch, peDebug{ token: target.firstToken, unmatchedConditions: keys, } } return "", peStatusUndefined, peDebug{token: target.firstToken} case peArray: if len(target.arrData) == 0 { if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q is set to an empty array", subpath)) } return "", peStatusNull, peDebug{token: target.firstToken} } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Checking for %q in an array", subpath)) r.debugLogs.increaseIndent() defer r.debugLogs.decreaseIndent() } lastException := peStatusUndefined lastDebug := peDebug{token: target.firstToken} for _, targetValue := range target.arrData { // Let resolved be the result, continuing the loop on any Invalid Package Target error. resolved, status, debug := r.esmPackageTargetResolve(packageURL, targetValue, subpath, pattern, conditions) if status == peStatusInvalidPackageTarget || status == peStatusNull { lastException = status lastDebug = debug continue } if status.isUndefined() { continue } return resolved, status, debug } // Return or throw the last fallback resolution null return or error. return "", lastException, lastDebug case peNull: if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("The path %q is set to null", subpath)) } return "", peStatusNull, peDebug{token: target.firstToken} } if r.debugLogs != nil { r.debugLogs.addNote(fmt.Sprintf("Invalid package target for path %q", subpath)) } return "", peStatusInvalidPackageTarget, peDebug{token: target.firstToken} } func esmParsePackageName(packageSpecifier string) (packageName string, packageSubpath string, ok bool) { if packageSpecifier == "" { return } slash := strings.IndexByte(packageSpecifier, '/') if !strings.HasPrefix(packageSpecifier, "@") { if slash == -1 { slash = len(packageSpecifier) } packageName = packageSpecifier[:slash] } else { if slash == -1 { return } slash2 := strings.IndexByte(packageSpecifier[slash+1:], '/') if slash2 == -1 { slash2 = len(packageSpecifier[slash+1:]) } packageName = packageSpecifier[:slash+1+slash2] } if strings.HasPrefix(packageName, ".") || strings.ContainsAny(packageName, "\\%") { return } packageSubpath = "." + packageSpecifier[len(packageName):] ok = true return } func (r resolverQuery) esmPackageExportsReverseResolve( query string, root peEntry, conditions map[string]bool, ) (bool, string, logger.Range) { if root.kind == peObject && root.keysStartWithDot() { if ok, subpath, token := r.esmPackageImportsExportsReverseResolve(query, root, conditions); ok { return true, subpath, token } } return false, "", logger.Range{} } func (r resolverQuery) esmPackageImportsExportsReverseResolve( query string, matchObj peEntry, conditions map[string]bool, ) (bool, string, logger.Range) { if !strings.HasSuffix(query, "*") { for _, entry := range matchObj.mapData { if ok, subpath, token := r.esmPackageTargetReverseResolve(query, entry.key, entry.value, esmReverseExact, conditions); ok { return true, subpath, token } } } for _, expansion := range matchObj.expansionKeys { if strings.HasSuffix(expansion.key, "*") { if ok, subpath, token := r.esmPackageTargetReverseResolve(query, expansion.key, expansion.value, esmReversePattern, conditions); ok { return true, subpath, token } } if ok, subpath, token := r.esmPackageTargetReverseResolve(query, expansion.key, expansion.value, esmReversePrefix, conditions); ok { return true, subpath, token } } return false, "", logger.Range{} } type esmReverseKind uint8 const ( esmReverseExact esmReverseKind = iota esmReversePattern esmReversePrefix ) func (r resolverQuery) esmPackageTargetReverseResolve( query string, key string, target peEntry, kind esmReverseKind, conditions map[string]bool, ) (bool, string, logger.Range) { switch target.kind { case peString: switch kind { case esmReverseExact: if query == target.strData { return true, key, target.firstToken } case esmReversePrefix: if strings.HasPrefix(query, target.strData) { return true, key + query[len(target.strData):], target.firstToken } case esmReversePattern: star := strings.IndexByte(target.strData, '*') keyWithoutTrailingStar := strings.TrimSuffix(key, "*") // Handle the case of no "*" if star == -1 { if query == target.strData { return true, keyWithoutTrailingStar, target.firstToken } break } // Only support tracing through a single "*" prefix := target.strData[0:star] suffix := target.strData[star+1:] if !strings.ContainsRune(suffix, '*') && strings.HasPrefix(query, prefix) { if afterPrefix := query[len(prefix):]; strings.HasSuffix(afterPrefix, suffix) { starData := afterPrefix[:len(afterPrefix)-len(suffix)] return true, keyWithoutTrailingStar + starData, target.firstToken } } break } case peObject: for _, p := range target.mapData { if p.key == "default" || conditions[p.key] { if ok, subpath, token := r.esmPackageTargetReverseResolve(query, key, p.value, kind, conditions); ok { return true, subpath, token } } } case peArray: for _, targetValue := range target.arrData { if ok, subpath, token := r.esmPackageTargetReverseResolve(query, key, targetValue, kind, conditions); ok { return true, subpath, token } } } return false, "", logger.Range{} }