@2digits/eslint-config 4.6.2 → 4.6.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.d.mts +90 -241
  2. package/package.json +21 -21
package/dist/index.d.mts CHANGED
@@ -277,6 +277,11 @@ interface RuleOptions {
277
277
  * @see https://github.com/eslint/css/blob/main/docs/rules/prefer-logical-properties.md
278
278
  */
279
279
  'css/prefer-logical-properties'?: Linter.RuleEntry<CssPreferLogicalProperties>;
280
+ /**
281
+ * Enforce the use of relative font units
282
+ * @see https://github.com/eslint/css/blob/main/docs/rules/relative-font-units.md
283
+ */
284
+ 'css/relative-font-units'?: Linter.RuleEntry<CssRelativeFontUnits>;
280
285
  /**
281
286
  * Enforce the use of baseline features
282
287
  * @see https://github.com/eslint/css/blob/main/docs/rules/use-baseline.md
@@ -3820,12 +3825,12 @@ interface RuleOptions {
3820
3825
  * Parameters should be passed in the correct order
3821
3826
  * @see https://sonarsource.github.io/rspec/#/rspec/S2234/javascript
3822
3827
  */
3823
- 'sonar/arguments-order'?: Linter.RuleEntry<SonarArgumentsOrder>;
3828
+ 'sonar/arguments-order'?: Linter.RuleEntry<[]>;
3824
3829
  /**
3825
3830
  * "arguments" should not be accessed directly
3826
3831
  * @see https://sonarsource.github.io/rspec/#/rspec/S3513/javascript
3827
3832
  */
3828
- 'sonar/arguments-usage'?: Linter.RuleEntry<SonarArgumentsUsage>;
3833
+ 'sonar/arguments-usage'?: Linter.RuleEntry<[]>;
3829
3834
  /**
3830
3835
  * Callbacks of array methods should have return statements
3831
3836
  * @see https://sonarsource.github.io/rspec/#/rspec/S3796/javascript
@@ -3870,22 +3875,22 @@ interface RuleOptions {
3870
3875
  * Policies granting all privileges are security-sensitive
3871
3876
  * @see https://sonarsource.github.io/rspec/#/rspec/S6302/javascript
3872
3877
  */
3873
- 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<SonarAwsIamAllPrivileges>;
3878
+ 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<[]>;
3874
3879
  /**
3875
3880
  * Policies granting access to all resources of an account are security-sensitive
3876
3881
  * @see https://sonarsource.github.io/rspec/#/rspec/S6304/javascript
3877
3882
  */
3878
- 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<SonarAwsIamAllResourcesAccessible>;
3883
+ 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<[]>;
3879
3884
  /**
3880
3885
  * AWS IAM policies should limit the scope of permissions given
3881
3886
  * @see https://sonarsource.github.io/rspec/#/rspec/S6317/javascript
3882
3887
  */
3883
- 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<SonarAwsIamPrivilegeEscalation>;
3888
+ 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<[]>;
3884
3889
  /**
3885
3890
  * Policies authorizing public access to resources are security-sensitive
3886
3891
  * @see https://sonarsource.github.io/rspec/#/rspec/S6270/javascript
3887
3892
  */
3888
- 'sonar/aws-iam-public-access'?: Linter.RuleEntry<SonarAwsIamPublicAccess>;
3893
+ 'sonar/aws-iam-public-access'?: Linter.RuleEntry<[]>;
3889
3894
  /**
3890
3895
  * Using unencrypted Elasticsearch domains is security-sensitive
3891
3896
  * @see https://sonarsource.github.io/rspec/#/rspec/S6308/javascript
@@ -3905,7 +3910,7 @@ interface RuleOptions {
3905
3910
  * Granting access to S3 buckets to all or authenticated users is security-sensitive
3906
3911
  * @see https://sonarsource.github.io/rspec/#/rspec/S6265/javascript
3907
3912
  */
3908
- 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<SonarAwsS3BucketGrantedAccess>;
3913
+ 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<[]>;
3909
3914
  /**
3910
3915
  * Authorizing HTTP communications with S3 buckets is security-sensitive
3911
3916
  * @see https://sonarsource.github.io/rspec/#/rspec/S6249/javascript
@@ -3915,18 +3920,18 @@ interface RuleOptions {
3915
3920
  * Allowing public ACLs or policies on a S3 bucket is security-sensitive
3916
3921
  * @see https://sonarsource.github.io/rspec/#/rspec/S6281/javascript
3917
3922
  */
3918
- 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<SonarAwsS3BucketPublicAccess>;
3923
+ 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<[]>;
3919
3924
  /**
3920
3925
  * Disabling server-side encryption of S3 buckets is security-sensitive
3921
3926
  * @see https://sonarsource.github.io/rspec/#/rspec/S6245/javascript
3922
3927
  * @deprecated
3923
3928
  */
3924
- 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<SonarAwsS3BucketServerEncryption>;
3929
+ 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<[]>;
3925
3930
  /**
3926
3931
  * Disabling versioning of S3 buckets is security-sensitive
3927
3932
  * @see https://sonarsource.github.io/rspec/#/rspec/S6252/javascript
3928
3933
  */
3929
- 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<SonarAwsS3BucketVersioning>;
3934
+ 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<[]>;
3930
3935
  /**
3931
3936
  * Using unencrypted SageMaker notebook instances is security-sensitive
3932
3937
  * @see https://sonarsource.github.io/rspec/#/rspec/S6319/javascript
@@ -3951,7 +3956,7 @@ interface RuleOptions {
3951
3956
  * Variables should be used in the blocks where they are declared
3952
3957
  * @see https://sonarsource.github.io/rspec/#/rspec/S2392/javascript
3953
3958
  */
3954
- 'sonar/block-scoped-var'?: Linter.RuleEntry<SonarBlockScopedVar>;
3959
+ 'sonar/block-scoped-var'?: Linter.RuleEntry<[]>;
3955
3960
  /**
3956
3961
  * Optional boolean parameters should have default value
3957
3962
  * @see https://sonarsource.github.io/rspec/#/rspec/S4798/javascript
@@ -3967,7 +3972,7 @@ interface RuleOptions {
3967
3972
  * @see https://sonarsource.github.io/rspec/#/rspec/S5742/javascript
3968
3973
  * @deprecated
3969
3974
  */
3970
- 'sonar/certificate-transparency'?: Linter.RuleEntry<SonarCertificateTransparency>;
3975
+ 'sonar/certificate-transparency'?: Linter.RuleEntry<[]>;
3971
3976
  /**
3972
3977
  * Chai assertions should have only one reason to succeed
3973
3978
  * @see https://sonarsource.github.io/rspec/#/rspec/S6092/javascript
@@ -4013,12 +4018,12 @@ interface RuleOptions {
4013
4018
  * @see https://sonarsource.github.io/rspec/#/rspec/S3973/javascript
4014
4019
  * @deprecated
4015
4020
  */
4016
- 'sonar/conditional-indentation'?: Linter.RuleEntry<SonarConditionalIndentation>;
4021
+ 'sonar/conditional-indentation'?: Linter.RuleEntry<[]>;
4017
4022
  /**
4018
4023
  * Allowing confidential information to be logged is security-sensitive
4019
4024
  * @see https://sonarsource.github.io/rspec/#/rspec/S5757/javascript
4020
4025
  */
4021
- 'sonar/confidential-information-logging'?: Linter.RuleEntry<SonarConfidentialInformationLogging>;
4026
+ 'sonar/confidential-information-logging'?: Linter.RuleEntry<[]>;
4022
4027
  /**
4023
4028
  * Objects should not be created to be dropped immediately without being used
4024
4029
  * @see https://sonarsource.github.io/rspec/#/rspec/S1848/javascript
@@ -4033,12 +4038,12 @@ interface RuleOptions {
4033
4038
  * Disabling content security policy fetch directives is security-sensitive
4034
4039
  * @see https://sonarsource.github.io/rspec/#/rspec/S5728/javascript
4035
4040
  */
4036
- 'sonar/content-security-policy'?: Linter.RuleEntry<SonarContentSecurityPolicy>;
4041
+ 'sonar/content-security-policy'?: Linter.RuleEntry<[]>;
4037
4042
  /**
4038
4043
  * Creating cookies without the "HttpOnly" flag is security-sensitive
4039
4044
  * @see https://sonarsource.github.io/rspec/#/rspec/S3330/javascript
4040
4045
  */
4041
- 'sonar/cookie-no-httponly'?: Linter.RuleEntry<SonarCookieNoHttponly>;
4046
+ 'sonar/cookie-no-httponly'?: Linter.RuleEntry<[]>;
4042
4047
  /**
4043
4048
  * Writing cookies is security-sensitive
4044
4049
  * @see https://sonarsource.github.io/rspec/#/rspec/S2255/javascript
@@ -4049,12 +4054,12 @@ interface RuleOptions {
4049
4054
  * Having a permissive Cross-Origin Resource Sharing policy is security-sensitive
4050
4055
  * @see https://sonarsource.github.io/rspec/#/rspec/S5122/javascript
4051
4056
  */
4052
- 'sonar/cors'?: Linter.RuleEntry<SonarCors>;
4057
+ 'sonar/cors'?: Linter.RuleEntry<[]>;
4053
4058
  /**
4054
4059
  * Disabling CSRF protections is security-sensitive
4055
4060
  * @see https://sonarsource.github.io/rspec/#/rspec/S4502/javascript
4056
4061
  */
4057
- 'sonar/csrf'?: Linter.RuleEntry<SonarCsrf>;
4062
+ 'sonar/csrf'?: Linter.RuleEntry<[]>;
4058
4063
  /**
4059
4064
  * Cyclomatic Complexity of functions should not be too high
4060
4065
  * @see https://sonarsource.github.io/rspec/#/rspec/S1541/javascript
@@ -4074,17 +4079,17 @@ interface RuleOptions {
4074
4079
  * Destructuring syntax should be used for assignments
4075
4080
  * @see https://sonarsource.github.io/rspec/#/rspec/S3514/javascript
4076
4081
  */
4077
- 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<SonarDestructuringAssignmentSyntax>;
4082
+ 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<[]>;
4078
4083
  /**
4079
4084
  * Strict equality operators should not be used with dissimilar types
4080
4085
  * @see https://sonarsource.github.io/rspec/#/rspec/S3403/javascript
4081
4086
  */
4082
- 'sonar/different-types-comparison'?: Linter.RuleEntry<SonarDifferentTypesComparison>;
4087
+ 'sonar/different-types-comparison'?: Linter.RuleEntry<[]>;
4083
4088
  /**
4084
4089
  * Disabling auto-escaping in template engines is security-sensitive
4085
4090
  * @see https://sonarsource.github.io/rspec/#/rspec/S5247/javascript
4086
4091
  */
4087
- 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<SonarDisabledAutoEscaping>;
4092
+ 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<[]>;
4088
4093
  /**
4089
4094
  * Using remote artifacts without integrity checks is security-sensitive
4090
4095
  * @see https://sonarsource.github.io/rspec/#/rspec/S5725/javascript
@@ -4100,12 +4105,12 @@ interface RuleOptions {
4100
4105
  * @see https://sonarsource.github.io/rspec/#/rspec/S5743/javascript
4101
4106
  * @deprecated
4102
4107
  */
4103
- 'sonar/dns-prefetching'?: Linter.RuleEntry<SonarDnsPrefetching>;
4108
+ 'sonar/dns-prefetching'?: Linter.RuleEntry<[]>;
4104
4109
  /**
4105
4110
  * Character classes in regular expressions should not contain the same character twice
4106
4111
  * @see https://sonarsource.github.io/rspec/#/rspec/S5869/javascript
4107
4112
  */
4108
- 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<SonarDuplicatesInCharacterClass>;
4113
+ 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<[]>;
4109
4114
  /**
4110
4115
  * "if ... else if" constructs should end with "else" clauses
4111
4116
  * @see https://sonarsource.github.io/rspec/#/rspec/S126/javascript
@@ -4162,7 +4167,7 @@ interface RuleOptions {
4162
4167
  * File uploads should be restricted
4163
4168
  * @see https://sonarsource.github.io/rspec/#/rspec/S2598/javascript
4164
4169
  */
4165
- 'sonar/file-uploads'?: Linter.RuleEntry<SonarFileUploads>;
4170
+ 'sonar/file-uploads'?: Linter.RuleEntry<[]>;
4166
4171
  /**
4167
4172
  * Track uses of "FIXME" tags
4168
4173
  * @see https://sonarsource.github.io/rspec/#/rspec/S1134/javascript
@@ -4177,17 +4182,17 @@ interface RuleOptions {
4177
4182
  * A "for" loop update clause should move the counter in the right direction
4178
4183
  * @see https://sonarsource.github.io/rspec/#/rspec/S2251/javascript
4179
4184
  */
4180
- 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<SonarForLoopIncrementSign>;
4185
+ 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<[]>;
4181
4186
  /**
4182
4187
  * Disabling content security policy frame-ancestors directive is security-sensitive
4183
4188
  * @see https://sonarsource.github.io/rspec/#/rspec/S5732/javascript
4184
4189
  */
4185
- 'sonar/frame-ancestors'?: Linter.RuleEntry<SonarFrameAncestors>;
4190
+ 'sonar/frame-ancestors'?: Linter.RuleEntry<[]>;
4186
4191
  /**
4187
4192
  * Functions should not be defined inside loops
4188
4193
  * @see https://sonarsource.github.io/rspec/#/rspec/S1515/javascript
4189
4194
  */
4190
- 'sonar/function-inside-loop'?: Linter.RuleEntry<SonarFunctionInsideLoop>;
4195
+ 'sonar/function-inside-loop'?: Linter.RuleEntry<[]>;
4191
4196
  /**
4192
4197
  * Function and method names should comply with a naming convention
4193
4198
  * @see https://sonarsource.github.io/rspec/#/rspec/S100/javascript
@@ -4197,7 +4202,7 @@ interface RuleOptions {
4197
4202
  * Functions should always return the same type
4198
4203
  * @see https://sonarsource.github.io/rspec/#/rspec/S3800/javascript
4199
4204
  */
4200
- 'sonar/function-return-type'?: Linter.RuleEntry<SonarFunctionReturnType>;
4205
+ 'sonar/function-return-type'?: Linter.RuleEntry<[]>;
4201
4206
  /**
4202
4207
  * Future reserved words should not be used as identifiers
4203
4208
  * @see https://sonarsource.github.io/rspec/#/rspec/S1527/javascript
@@ -4222,12 +4227,12 @@ interface RuleOptions {
4222
4227
  * "in" should not be used with primitive types
4223
4228
  * @see https://sonarsource.github.io/rspec/#/rspec/S3785/javascript
4224
4229
  */
4225
- 'sonar/in-operator-type-error'?: Linter.RuleEntry<SonarInOperatorTypeError>;
4230
+ 'sonar/in-operator-type-error'?: Linter.RuleEntry<[]>;
4226
4231
  /**
4227
4232
  * Functions should be called consistently with or without "new"
4228
4233
  * @see https://sonarsource.github.io/rspec/#/rspec/S3686/javascript
4229
4234
  */
4230
- 'sonar/inconsistent-function-call'?: Linter.RuleEntry<SonarInconsistentFunctionCall>;
4235
+ 'sonar/inconsistent-function-call'?: Linter.RuleEntry<[]>;
4231
4236
  /**
4232
4237
  * "indexOf" checks should not be for positive numbers
4233
4238
  * @see https://sonarsource.github.io/rspec/#/rspec/S2692/javascript
@@ -4237,17 +4242,17 @@ interface RuleOptions {
4237
4242
  * Creating cookies without the "secure" flag is security-sensitive
4238
4243
  * @see https://sonarsource.github.io/rspec/#/rspec/S2092/javascript
4239
4244
  */
4240
- 'sonar/insecure-cookie'?: Linter.RuleEntry<SonarInsecureCookie>;
4245
+ 'sonar/insecure-cookie'?: Linter.RuleEntry<[]>;
4241
4246
  /**
4242
4247
  * JWT should be signed and verified with strong cipher algorithms
4243
4248
  * @see https://sonarsource.github.io/rspec/#/rspec/S5659/javascript
4244
4249
  */
4245
- 'sonar/insecure-jwt-token'?: Linter.RuleEntry<SonarInsecureJwtToken>;
4250
+ 'sonar/insecure-jwt-token'?: Linter.RuleEntry<[]>;
4246
4251
  /**
4247
4252
  * Assertion arguments should be passed in the correct order
4248
4253
  * @see https://sonarsource.github.io/rspec/#/rspec/S3415/javascript
4249
4254
  */
4250
- 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<SonarInvertedAssertionArguments>;
4255
+ 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<[]>;
4251
4256
  /**
4252
4257
  * React components should not render non-boolean condition values
4253
4258
  * @see https://sonarsource.github.io/rspec/#/rspec/S6439/javascript
@@ -4347,12 +4352,12 @@ interface RuleOptions {
4347
4352
  * Tests should not execute any code after "done()" is called
4348
4353
  * @see https://sonarsource.github.io/rspec/#/rspec/S6079/javascript
4349
4354
  */
4350
- 'sonar/no-code-after-done'?: Linter.RuleEntry<SonarNoCodeAfterDone>;
4355
+ 'sonar/no-code-after-done'?: Linter.RuleEntry<[]>;
4351
4356
  /**
4352
4357
  * Mergeable "if" statements should be combined
4353
4358
  * @see https://sonarsource.github.io/rspec/#/rspec/S1066/javascript
4354
4359
  */
4355
- 'sonar/no-collapsible-if'?: Linter.RuleEntry<SonarNoCollapsibleIf>;
4360
+ 'sonar/no-collapsible-if'?: Linter.RuleEntry<[]>;
4356
4361
  /**
4357
4362
  * Collection size and array length comparisons should make sense
4358
4363
  * @see https://sonarsource.github.io/rspec/#/rspec/S3981/javascript
@@ -4382,7 +4387,7 @@ interface RuleOptions {
4382
4387
  * Union and intersection types should not include duplicated constituents
4383
4388
  * @see https://sonarsource.github.io/rspec/#/rspec/S4621/javascript
4384
4389
  */
4385
- 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<SonarNoDuplicateInComposite>;
4390
+ 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<[]>;
4386
4391
  /**
4387
4392
  * String literals should not be duplicated
4388
4393
  * @see https://sonarsource.github.io/rspec/#/rspec/S1192/javascript
@@ -4392,12 +4397,12 @@ interface RuleOptions {
4392
4397
  * Two branches in a conditional structure should not have exactly the same implementation
4393
4398
  * @see https://sonarsource.github.io/rspec/#/rspec/S1871/javascript
4394
4399
  */
4395
- 'sonar/no-duplicated-branches'?: Linter.RuleEntry<SonarNoDuplicatedBranches>;
4400
+ 'sonar/no-duplicated-branches'?: Linter.RuleEntry<[]>;
4396
4401
  /**
4397
4402
  * Collection elements should not be replaced unconditionally
4398
4403
  * @see https://sonarsource.github.io/rspec/#/rspec/S4143/javascript
4399
4404
  */
4400
- 'sonar/no-element-overwrite'?: Linter.RuleEntry<SonarNoElementOverwrite>;
4405
+ 'sonar/no-element-overwrite'?: Linter.RuleEntry<[]>;
4401
4406
  /**
4402
4407
  * Reluctant quantifiers in regular expressions should be followed by an expression that can't match the empty string
4403
4408
  * @see https://sonarsource.github.io/rspec/#/rspec/S6019/javascript
@@ -4442,7 +4447,7 @@ interface RuleOptions {
4442
4447
  * Function calls should not pass extra arguments
4443
4448
  * @see https://sonarsource.github.io/rspec/#/rspec/S930/javascript
4444
4449
  */
4445
- 'sonar/no-extra-arguments'?: Linter.RuleEntry<SonarNoExtraArguments>;
4450
+ 'sonar/no-extra-arguments'?: Linter.RuleEntry<[]>;
4446
4451
  /**
4447
4452
  * Switch cases should end with an unconditional "break" statement
4448
4453
  * @see https://sonarsource.github.io/rspec/#/rspec/S128/javascript
@@ -4472,7 +4477,7 @@ interface RuleOptions {
4472
4477
  * Boolean expressions should not be gratuitous
4473
4478
  * @see https://sonarsource.github.io/rspec/#/rspec/S2589/javascript
4474
4479
  */
4475
- 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<SonarNoGratuitousExpressions>;
4480
+ 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<[]>;
4476
4481
  /**
4477
4482
  * Using hardcoded IP addresses is security-sensitive
4478
4483
  * @see https://sonarsource.github.io/rspec/#/rspec/S1313/javascript
@@ -4497,12 +4502,12 @@ interface RuleOptions {
4497
4502
  * "if/else if" chains and "switch" cases should not have the same condition
4498
4503
  * @see https://sonarsource.github.io/rspec/#/rspec/S1862/javascript
4499
4504
  */
4500
- 'sonar/no-identical-conditions'?: Linter.RuleEntry<SonarNoIdenticalConditions>;
4505
+ 'sonar/no-identical-conditions'?: Linter.RuleEntry<[]>;
4501
4506
  /**
4502
4507
  * Identical expressions should not be used on both sides of a binary operator
4503
4508
  * @see https://sonarsource.github.io/rspec/#/rspec/S1764/javascript
4504
4509
  */
4505
- 'sonar/no-identical-expressions'?: Linter.RuleEntry<SonarNoIdenticalExpressions>;
4510
+ 'sonar/no-identical-expressions'?: Linter.RuleEntry<[]>;
4506
4511
  /**
4507
4512
  * Functions should not have identical implementations
4508
4513
  * @see https://sonarsource.github.io/rspec/#/rspec/S4144/javascript
@@ -4542,12 +4547,12 @@ interface RuleOptions {
4542
4547
  * Functions should use "return" consistently
4543
4548
  * @see https://sonarsource.github.io/rspec/#/rspec/S3801/javascript
4544
4549
  */
4545
- 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<SonarNoInconsistentReturns>;
4550
+ 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<[]>;
4546
4551
  /**
4547
4552
  * Strings and non-strings should not be added
4548
4553
  * @see https://sonarsource.github.io/rspec/#/rspec/S3402/javascript
4549
4554
  */
4550
- 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<SonarNoIncorrectStringConcat>;
4555
+ 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<[]>;
4551
4556
  /**
4552
4557
  * Users should not use internal APIs
4553
4558
  * @see https://sonarsource.github.io/rspec/#/rspec/S6627/javascript
@@ -4558,11 +4563,6 @@ interface RuleOptions {
4558
4563
  * @see https://sonarsource.github.io/rspec/#/rspec/S5604/javascript
4559
4564
  */
4560
4565
  'sonar/no-intrusive-permissions'?: Linter.RuleEntry<SonarNoIntrusivePermissions>;
4561
- /**
4562
- * "await" should only be used with promises
4563
- * @see https://sonarsource.github.io/rspec/#/rspec/S4123/javascript
4564
- */
4565
- 'sonar/no-invalid-await'?: Linter.RuleEntry<[]>;
4566
4566
  /**
4567
4567
  * Regular expressions should be syntactically valid
4568
4568
  * @see https://sonarsource.github.io/rspec/#/rspec/S5856/javascript
@@ -4572,7 +4572,7 @@ interface RuleOptions {
4572
4572
  * Function returns should not be invariant
4573
4573
  * @see https://sonarsource.github.io/rspec/#/rspec/S3516/javascript
4574
4574
  */
4575
- 'sonar/no-invariant-returns'?: Linter.RuleEntry<SonarNoInvariantReturns>;
4575
+ 'sonar/no-invariant-returns'?: Linter.RuleEntry<[]>;
4576
4576
  /**
4577
4577
  * Boolean checks should not be inverted
4578
4578
  * @see https://sonarsource.github.io/rspec/#/rspec/S1940/javascript
@@ -4582,7 +4582,7 @@ interface RuleOptions {
4582
4582
  * Forwarding client IP address is security-sensitive
4583
4583
  * @see https://sonarsource.github.io/rspec/#/rspec/S5759/javascript
4584
4584
  */
4585
- 'sonar/no-ip-forward'?: Linter.RuleEntry<SonarNoIpForward>;
4585
+ 'sonar/no-ip-forward'?: Linter.RuleEntry<[]>;
4586
4586
  /**
4587
4587
  * Labels should not be used
4588
4588
  * @see https://sonarsource.github.io/rspec/#/rspec/S1119/javascript
@@ -4597,7 +4597,7 @@ interface RuleOptions {
4597
4597
  * Allowing browsers to sniff MIME types is security-sensitive
4598
4598
  * @see https://sonarsource.github.io/rspec/#/rspec/S5734/javascript
4599
4599
  */
4600
- 'sonar/no-mime-sniff'?: Linter.RuleEntry<SonarNoMimeSniff>;
4600
+ 'sonar/no-mime-sniff'?: Linter.RuleEntry<[]>;
4601
4601
  /**
4602
4602
  * Array-mutating methods should not be used misleadingly
4603
4603
  * @see https://sonarsource.github.io/rspec/#/rspec/S4043/javascript
@@ -4612,7 +4612,7 @@ interface RuleOptions {
4612
4612
  * Allowing mixed-content is security-sensitive
4613
4613
  * @see https://sonarsource.github.io/rspec/#/rspec/S5730/javascript
4614
4614
  */
4615
- 'sonar/no-mixed-content'?: Linter.RuleEntry<SonarNoMixedContent>;
4615
+ 'sonar/no-mixed-content'?: Linter.RuleEntry<[]>;
4616
4616
  /**
4617
4617
  * Assignments should not be made from within sub-expressions
4618
4618
  * @see https://sonarsource.github.io/rspec/#/rspec/S1121/javascript
@@ -4682,23 +4682,23 @@ interface RuleOptions {
4682
4682
  * Optional property declarations should not use both '?' and 'undefined' syntax
4683
4683
  * @see https://sonarsource.github.io/rspec/#/rspec/S4782/javascript
4684
4684
  */
4685
- 'sonar/no-redundant-optional'?: Linter.RuleEntry<SonarNoRedundantOptional>;
4685
+ 'sonar/no-redundant-optional'?: Linter.RuleEntry<[]>;
4686
4686
  /**
4687
4687
  * Redundant pairs of parentheses should be removed
4688
4688
  * @see https://sonarsource.github.io/rspec/#/rspec/S1110/javascript
4689
4689
  * @deprecated
4690
4690
  */
4691
- 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<SonarNoRedundantParentheses>;
4691
+ 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<[]>;
4692
4692
  /**
4693
4693
  * Variables should be defined before being used
4694
4694
  * @see https://sonarsource.github.io/rspec/#/rspec/S3827/javascript
4695
4695
  */
4696
- 'sonar/no-reference-error'?: Linter.RuleEntry<SonarNoReferenceError>;
4696
+ 'sonar/no-reference-error'?: Linter.RuleEntry<[]>;
4697
4697
  /**
4698
4698
  * Disabling strict HTTP no-referrer policy is security-sensitive
4699
4699
  * @see https://sonarsource.github.io/rspec/#/rspec/S5736/javascript
4700
4700
  */
4701
- 'sonar/no-referrer-policy'?: Linter.RuleEntry<SonarNoReferrerPolicy>;
4701
+ 'sonar/no-referrer-policy'?: Linter.RuleEntry<[]>;
4702
4702
  /**
4703
4703
  * Regular expressions should not contain multiple spaces
4704
4704
  * @see https://sonarsource.github.io/rspec/#/rspec/S6326/javascript
@@ -4718,17 +4718,17 @@ interface RuleOptions {
4718
4718
  * Assertions should not be given twice the same argument
4719
4719
  * @see https://sonarsource.github.io/rspec/#/rspec/S5863/javascript
4720
4720
  */
4721
- 'sonar/no-same-argument-assert'?: Linter.RuleEntry<SonarNoSameArgumentAssert>;
4721
+ 'sonar/no-same-argument-assert'?: Linter.RuleEntry<[]>;
4722
4722
  /**
4723
4723
  * Conditionals should start on new lines
4724
4724
  * @see https://sonarsource.github.io/rspec/#/rspec/S3972/javascript
4725
4725
  */
4726
- 'sonar/no-same-line-conditional'?: Linter.RuleEntry<SonarNoSameLineConditional>;
4726
+ 'sonar/no-same-line-conditional'?: Linter.RuleEntry<[]>;
4727
4727
  /**
4728
4728
  * Methods should not contain selector parameters
4729
4729
  * @see https://sonarsource.github.io/rspec/#/rspec/S2301/javascript
4730
4730
  */
4731
- 'sonar/no-selector-parameter'?: Linter.RuleEntry<SonarNoSelectorParameter>;
4731
+ 'sonar/no-selector-parameter'?: Linter.RuleEntry<[]>;
4732
4732
  /**
4733
4733
  * Tests should not be skipped without providing a reason
4734
4734
  * @see https://sonarsource.github.io/rspec/#/rspec/S1607/javascript
@@ -4759,7 +4759,7 @@ interface RuleOptions {
4759
4759
  * Promise rejections should not be caught by "try" blocks
4760
4760
  * @see https://sonarsource.github.io/rspec/#/rspec/S4822/javascript
4761
4761
  */
4762
- 'sonar/no-try-promise'?: Linter.RuleEntry<SonarNoTryPromise>;
4762
+ 'sonar/no-try-promise'?: Linter.RuleEntry<[]>;
4763
4763
  /**
4764
4764
  * "undefined" should not be passed as the value of optional parameters
4765
4765
  * @see https://sonarsource.github.io/rspec/#/rspec/S4623/javascript
@@ -4834,7 +4834,7 @@ interface RuleOptions {
4834
4834
  * Variables declared with "var" should be declared before they are used
4835
4835
  * @see https://sonarsource.github.io/rspec/#/rspec/S1526/javascript
4836
4836
  */
4837
- 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<SonarNoVariableUsageBeforeDeclaration>;
4837
+ 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<[]>;
4838
4838
  /**
4839
4839
  * Disabling Vue.js built-in escaping is security-sensitive
4840
4840
  * @see https://sonarsource.github.io/rspec/#/rspec/S6299/javascript
@@ -4865,7 +4865,7 @@ interface RuleOptions {
4865
4865
  * Arithmetic operators should only have numbers as operands
4866
4866
  * @see https://sonarsource.github.io/rspec/#/rspec/S3760/javascript
4867
4867
  */
4868
- 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<SonarNonNumberInArithmeticExpression>;
4868
+ 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<[]>;
4869
4869
  /**
4870
4870
  * Properties of variables with "null" or "undefined" values should not be accessed
4871
4871
  * @see https://sonarsource.github.io/rspec/#/rspec/S2259/javascript
@@ -4992,7 +4992,7 @@ interface RuleOptions {
4992
4992
  * Shorthand object properties should be grouped at the beginning or end of an object declaration
4993
4993
  * @see https://sonarsource.github.io/rspec/#/rspec/S3499/javascript
4994
4994
  */
4995
- 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<SonarShorthandPropertyGrouping>;
4995
+ 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<[]>;
4996
4996
  /**
4997
4997
  * Character classes in regular expressions should not contain only one character
4998
4998
  * @see https://sonarsource.github.io/rspec/#/rspec/S6397/javascript
@@ -5034,17 +5034,17 @@ interface RuleOptions {
5034
5034
  * Regular expressions with the global flag should be used with caution
5035
5035
  * @see https://sonarsource.github.io/rspec/#/rspec/S6351/javascript
5036
5036
  */
5037
- 'sonar/stateful-regex'?: Linter.RuleEntry<SonarStatefulRegex>;
5037
+ 'sonar/stateful-regex'?: Linter.RuleEntry<[]>;
5038
5038
  /**
5039
5039
  * Disabling Strict-Transport-Security policy is security-sensitive
5040
5040
  * @see https://sonarsource.github.io/rspec/#/rspec/S5739/javascript
5041
5041
  */
5042
- 'sonar/strict-transport-security'?: Linter.RuleEntry<SonarStrictTransportSecurity>;
5042
+ 'sonar/strict-transport-security'?: Linter.RuleEntry<[]>;
5043
5043
  /**
5044
5044
  * Comparison operators should not be used with strings
5045
5045
  * @see https://sonarsource.github.io/rspec/#/rspec/S3003/javascript
5046
5046
  */
5047
- 'sonar/strings-comparison'?: Linter.RuleEntry<SonarStringsComparison>;
5047
+ 'sonar/strings-comparison'?: Linter.RuleEntry<[]>;
5048
5048
  /**
5049
5049
  * "super()" should be invoked appropriately
5050
5050
  * @see https://sonarsource.github.io/rspec/#/rspec/S3854/javascript
@@ -5074,12 +5074,12 @@ interface RuleOptions {
5074
5074
  * Loops should not contain more than a single "break" or "continue" statement
5075
5075
  * @see https://sonarsource.github.io/rspec/#/rspec/S135/javascript
5076
5076
  */
5077
- 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<SonarTooManyBreakOrContinueInLoop>;
5077
+ 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<[]>;
5078
5078
  /**
5079
5079
  * Regular expressions using Unicode character classes or property escapes should enable the unicode flag
5080
5080
  * @see https://sonarsource.github.io/rspec/#/rspec/S5867/javascript
5081
5081
  */
5082
- 'sonar/unicode-aware-regex'?: Linter.RuleEntry<SonarUnicodeAwareRegex>;
5082
+ 'sonar/unicode-aware-regex'?: Linter.RuleEntry<[]>;
5083
5083
  /**
5084
5084
  * Unnecessary imports should be removed
5085
5085
  * @see https://sonarsource.github.io/rspec/#/rspec/S1128/javascript
@@ -5089,32 +5089,33 @@ interface RuleOptions {
5089
5089
  * Names of regular expressions named groups should be used
5090
5090
  * @see https://sonarsource.github.io/rspec/#/rspec/S5860/javascript
5091
5091
  */
5092
- 'sonar/unused-named-groups'?: Linter.RuleEntry<SonarUnusedNamedGroups>;
5092
+ 'sonar/unused-named-groups'?: Linter.RuleEntry<[]>;
5093
5093
  /**
5094
5094
  * Server certificates should be verified during SSL/TLS connections
5095
5095
  * @see https://sonarsource.github.io/rspec/#/rspec/S4830/javascript
5096
5096
  */
5097
- 'sonar/unverified-certificate'?: Linter.RuleEntry<SonarUnverifiedCertificate>;
5097
+ 'sonar/unverified-certificate'?: Linter.RuleEntry<[]>;
5098
5098
  /**
5099
5099
  * Server hostnames should be verified during SSL/TLS connections
5100
5100
  * @see https://sonarsource.github.io/rspec/#/rspec/S5527/javascript
5101
5101
  */
5102
- 'sonar/unverified-hostname'?: Linter.RuleEntry<SonarUnverifiedHostname>;
5102
+ 'sonar/unverified-hostname'?: Linter.RuleEntry<[]>;
5103
5103
  /**
5104
5104
  * "const" variables should not be reassigned
5105
5105
  * @see https://sonarsource.github.io/rspec/#/rspec/S3500/javascript
5106
5106
  */
5107
- 'sonar/updated-const-var'?: Linter.RuleEntry<SonarUpdatedConstVar>;
5107
+ 'sonar/updated-const-var'?: Linter.RuleEntry<[]>;
5108
5108
  /**
5109
5109
  * Loop counters should not be assigned within the loop body
5110
5110
  * @see https://sonarsource.github.io/rspec/#/rspec/S2310/javascript
5111
+ * @deprecated
5111
5112
  */
5112
- 'sonar/updated-loop-counter'?: Linter.RuleEntry<SonarUpdatedLoopCounter>;
5113
+ 'sonar/updated-loop-counter'?: Linter.RuleEntry<[]>;
5113
5114
  /**
5114
5115
  * Type aliases should be used
5115
5116
  * @see https://sonarsource.github.io/rspec/#/rspec/S4323/javascript
5116
5117
  */
5117
- 'sonar/use-type-alias'?: Linter.RuleEntry<SonarUseTypeAlias>;
5118
+ 'sonar/use-type-alias'?: Linter.RuleEntry<[]>;
5118
5119
  /**
5119
5120
  * Results of operations on strings should not be ignored
5120
5121
  * @see https://sonarsource.github.io/rspec/#/rspec/S1154/javascript
@@ -5156,7 +5157,7 @@ interface RuleOptions {
5156
5157
  * XML parsers should not be vulnerable to XXE attacks
5157
5158
  * @see https://sonarsource.github.io/rspec/#/rspec/S2755/javascript
5158
5159
  */
5159
- 'sonar/xml-parser-xxe'?: Linter.RuleEntry<SonarXmlParserXxe>;
5160
+ 'sonar/xml-parser-xxe'?: Linter.RuleEntry<[]>;
5160
5161
  /**
5161
5162
  * Executing XPath expressions is security-sensitive
5162
5163
  * @see https://sonarsource.github.io/rspec/#/rspec/S4817/javascript
@@ -7572,6 +7573,11 @@ type CssPreferLogicalProperties = [] | [{
7572
7573
  allowProperties?: string[];
7573
7574
  allowUnits?: string[];
7574
7575
  }];
7576
+ // ----- css/relative-font-units -----
7577
+ type CssRelativeFontUnits = [] | [{
7578
+ allowUnits?: ("%" | "cap" | "ch" | "em" | "ex" | "ic" | "lh" | "rcap" | "rch" | "rem" | "rex" | "ric" | "rlh")[];
7579
+ [k: string]: unknown | undefined;
7580
+ }];
7575
7581
  // ----- css/use-baseline -----
7576
7582
  type CssUseBaseline = [] | [{
7577
7583
  available?: (("widely" | "newly") | number);
@@ -10170,35 +10176,11 @@ type SemiSpacing = [] | [{
10170
10176
  }];
10171
10177
  // ----- semi-style -----
10172
10178
  type SemiStyle = [] | [("last" | "first")];
10173
- // ----- sonar/arguments-order -----
10174
- type SonarArgumentsOrder = [] | [("sonar-runtime" | "metric")];
10175
- // ----- sonar/arguments-usage -----
10176
- type SonarArgumentsUsage = [] | [("sonar-runtime" | "metric")];
10177
10179
  // ----- sonar/arrow-function-convention -----
10178
10180
  type SonarArrowFunctionConvention = [] | [{
10179
10181
  requireParameterParentheses?: boolean;
10180
10182
  requireBodyBraces?: boolean;
10181
10183
  }];
10182
- // ----- sonar/aws-iam-all-privileges -----
10183
- type SonarAwsIamAllPrivileges = [] | [("sonar-runtime" | "metric")];
10184
- // ----- sonar/aws-iam-all-resources-accessible -----
10185
- type SonarAwsIamAllResourcesAccessible = [] | [("sonar-runtime" | "metric")];
10186
- // ----- sonar/aws-iam-privilege-escalation -----
10187
- type SonarAwsIamPrivilegeEscalation = [] | [("sonar-runtime" | "metric")];
10188
- // ----- sonar/aws-iam-public-access -----
10189
- type SonarAwsIamPublicAccess = [] | [("sonar-runtime" | "metric")];
10190
- // ----- sonar/aws-s3-bucket-granted-access -----
10191
- type SonarAwsS3BucketGrantedAccess = [] | [("sonar-runtime" | "metric")];
10192
- // ----- sonar/aws-s3-bucket-public-access -----
10193
- type SonarAwsS3BucketPublicAccess = [] | [("sonar-runtime" | "metric")];
10194
- // ----- sonar/aws-s3-bucket-server-encryption -----
10195
- type SonarAwsS3BucketServerEncryption = [] | [("sonar-runtime" | "metric")];
10196
- // ----- sonar/aws-s3-bucket-versioning -----
10197
- type SonarAwsS3BucketVersioning = [] | [("sonar-runtime" | "metric")];
10198
- // ----- sonar/block-scoped-var -----
10199
- type SonarBlockScopedVar = [] | [("sonar-runtime" | "metric")];
10200
- // ----- sonar/certificate-transparency -----
10201
- type SonarCertificateTransparency = [] | [("sonar-runtime" | "metric")];
10202
10184
  // ----- sonar/class-name -----
10203
10185
  type SonarClassName = [] | [{
10204
10186
  format?: string;
@@ -10211,39 +10193,15 @@ type SonarCommentRegex = [] | [{
10211
10193
  message?: string;
10212
10194
  flags?: string;
10213
10195
  }];
10214
- // ----- sonar/conditional-indentation -----
10215
- type SonarConditionalIndentation = [] | [("sonar-runtime" | "metric")];
10216
- // ----- sonar/confidential-information-logging -----
10217
- type SonarConfidentialInformationLogging = [] | [("sonar-runtime" | "metric")];
10218
10196
  // ----- sonar/content-length -----
10219
10197
  type SonarContentLength = [] | [{
10220
10198
  fileUploadSizeLimit?: number;
10221
10199
  standardSizeLimit?: number;
10222
10200
  }];
10223
- // ----- sonar/content-security-policy -----
10224
- type SonarContentSecurityPolicy = [] | [("sonar-runtime" | "metric")];
10225
- // ----- sonar/cookie-no-httponly -----
10226
- type SonarCookieNoHttponly = [] | [("sonar-runtime" | "metric")];
10227
- // ----- sonar/cors -----
10228
- type SonarCors = [] | [("sonar-runtime" | "metric")];
10229
- // ----- sonar/csrf -----
10230
- type SonarCsrf = [] | [("sonar-runtime" | "metric")];
10231
10201
  // ----- sonar/cyclomatic-complexity -----
10232
10202
  type SonarCyclomaticComplexity = [] | [{
10233
10203
  threshold?: number;
10234
- }] | [{
10235
- threshold?: number;
10236
- }, ("sonar-runtime" | "metric")];
10237
- // ----- sonar/destructuring-assignment-syntax -----
10238
- type SonarDestructuringAssignmentSyntax = [] | [("sonar-runtime" | "metric")];
10239
- // ----- sonar/different-types-comparison -----
10240
- type SonarDifferentTypesComparison = [] | [("sonar-runtime" | "metric")];
10241
- // ----- sonar/disabled-auto-escaping -----
10242
- type SonarDisabledAutoEscaping = [] | [("sonar-runtime" | "metric")];
10243
- // ----- sonar/dns-prefetching -----
10244
- type SonarDnsPrefetching = [] | [("sonar-runtime" | "metric")];
10245
- // ----- sonar/duplicates-in-character-class -----
10246
- type SonarDuplicatesInCharacterClass = [] | [("sonar-runtime" | "metric")];
10204
+ }];
10247
10205
  // ----- sonar/enforce-trailing-comma -----
10248
10206
  type SonarEnforceTrailingComma = [] | [(_SonarEnforceTrailingCommaValue | {
10249
10207
  arrays?: _SonarEnforceTrailingCommaValueWithIgnore;
@@ -10257,38 +10215,16 @@ type _SonarEnforceTrailingCommaValueWithIgnore = ("always-multiline" | "always"
10257
10215
  // ----- sonar/expression-complexity -----
10258
10216
  type SonarExpressionComplexity = [] | [{
10259
10217
  max?: number;
10260
- }] | [{
10261
- max?: number;
10262
- }, ("sonar-runtime" | "metric")];
10218
+ }];
10263
10219
  // ----- sonar/file-header -----
10264
10220
  type SonarFileHeader = [] | [{
10265
10221
  headerFormat?: string;
10266
10222
  isRegularExpression?: boolean;
10267
10223
  }];
10268
- // ----- sonar/file-uploads -----
10269
- type SonarFileUploads = [] | [("sonar-runtime" | "metric")];
10270
- // ----- sonar/for-loop-increment-sign -----
10271
- type SonarForLoopIncrementSign = [] | [("sonar-runtime" | "metric")];
10272
- // ----- sonar/frame-ancestors -----
10273
- type SonarFrameAncestors = [] | [("sonar-runtime" | "metric")];
10274
- // ----- sonar/function-inside-loop -----
10275
- type SonarFunctionInsideLoop = [] | [("sonar-runtime" | "metric")];
10276
10224
  // ----- sonar/function-name -----
10277
10225
  type SonarFunctionName = [] | [{
10278
10226
  format?: string;
10279
10227
  }];
10280
- // ----- sonar/function-return-type -----
10281
- type SonarFunctionReturnType = [] | [("sonar-runtime" | "metric")];
10282
- // ----- sonar/in-operator-type-error -----
10283
- type SonarInOperatorTypeError = [] | [("sonar-runtime" | "metric")];
10284
- // ----- sonar/inconsistent-function-call -----
10285
- type SonarInconsistentFunctionCall = [] | [("sonar-runtime" | "metric")];
10286
- // ----- sonar/insecure-cookie -----
10287
- type SonarInsecureCookie = [] | [("sonar-runtime" | "metric")];
10288
- // ----- sonar/insecure-jwt-token -----
10289
- type SonarInsecureJwtToken = [] | [("sonar-runtime" | "metric")];
10290
- // ----- sonar/inverted-assertion-arguments -----
10291
- type SonarInvertedAssertionArguments = [] | [("sonar-runtime" | "metric")];
10292
10228
  // ----- sonar/max-lines -----
10293
10229
  type SonarMaxLines = [] | [{
10294
10230
  maximum?: number;
@@ -10306,37 +10242,16 @@ type SonarMaxUnionSize = [] | [{
10306
10242
  // ----- sonar/nested-control-flow -----
10307
10243
  type SonarNestedControlFlow = [] | [{
10308
10244
  maximumNestingLevel?: number;
10309
- }] | [{
10310
- maximumNestingLevel?: number;
10311
- }, ("sonar-runtime" | "metric")];
10245
+ }];
10312
10246
  // ----- sonar/new-operator-misuse -----
10313
10247
  type SonarNewOperatorMisuse = [] | [{
10314
10248
  considerJSDoc?: boolean;
10315
- }] | [{
10316
- considerJSDoc?: boolean;
10317
- }, unknown];
10318
- // ----- sonar/no-code-after-done -----
10319
- type SonarNoCodeAfterDone = [] | [("sonar-runtime" | "metric")];
10320
- // ----- sonar/no-collapsible-if -----
10321
- type SonarNoCollapsibleIf = [] | [("sonar-runtime" | "metric")];
10322
- // ----- sonar/no-duplicate-in-composite -----
10323
- type SonarNoDuplicateInComposite = [] | [("sonar-runtime" | "metric")];
10249
+ }];
10324
10250
  // ----- sonar/no-duplicate-string -----
10325
10251
  type SonarNoDuplicateString = [] | [{
10326
10252
  threshold?: number;
10327
10253
  ignoreStrings?: string;
10328
- }] | [{
10329
- threshold?: number;
10330
- ignoreStrings?: string;
10331
- }, ("sonar-runtime" | "metric")];
10332
- // ----- sonar/no-duplicated-branches -----
10333
- type SonarNoDuplicatedBranches = [] | [("sonar-runtime" | "metric")];
10334
- // ----- sonar/no-element-overwrite -----
10335
- type SonarNoElementOverwrite = [] | [("sonar-runtime" | "metric")];
10336
- // ----- sonar/no-extra-arguments -----
10337
- type SonarNoExtraArguments = [] | [("sonar-runtime" | "metric")];
10338
- // ----- sonar/no-gratuitous-expressions -----
10339
- type SonarNoGratuitousExpressions = [] | [("sonar-runtime" | "metric")];
10254
+ }];
10340
10255
  // ----- sonar/no-hardcoded-passwords -----
10341
10256
  type SonarNoHardcodedPasswords = [] | [{
10342
10257
  passwordWords?: string[];
@@ -10346,94 +10261,28 @@ type SonarNoHardcodedSecrets = [] | [{
10346
10261
  secretWords?: string;
10347
10262
  randomnessSensibility?: number;
10348
10263
  }];
10349
- // ----- sonar/no-identical-conditions -----
10350
- type SonarNoIdenticalConditions = [] | [("sonar-runtime" | "metric")];
10351
- // ----- sonar/no-identical-expressions -----
10352
- type SonarNoIdenticalExpressions = [] | [("sonar-runtime" | "metric")];
10353
10264
  // ----- sonar/no-identical-functions -----
10354
- type SonarNoIdenticalFunctions = [] | [number] | [number, ("sonar-runtime" | "metric")];
10265
+ type SonarNoIdenticalFunctions = [] | [number];
10355
10266
  // ----- sonar/no-implicit-dependencies -----
10356
10267
  type SonarNoImplicitDependencies = [] | [{
10357
10268
  whitelist?: string[];
10358
10269
  }];
10359
- // ----- sonar/no-inconsistent-returns -----
10360
- type SonarNoInconsistentReturns = [] | [("sonar-runtime" | "metric")];
10361
- // ----- sonar/no-incorrect-string-concat -----
10362
- type SonarNoIncorrectStringConcat = [] | [("sonar-runtime" | "metric")];
10363
10270
  // ----- sonar/no-intrusive-permissions -----
10364
10271
  type SonarNoIntrusivePermissions = [] | [{
10365
10272
  permissions?: string[];
10366
10273
  }];
10367
- // ----- sonar/no-invariant-returns -----
10368
- type SonarNoInvariantReturns = [] | [("sonar-runtime" | "metric")];
10369
- // ----- sonar/no-ip-forward -----
10370
- type SonarNoIpForward = [] | [("sonar-runtime" | "metric")];
10371
- // ----- sonar/no-mime-sniff -----
10372
- type SonarNoMimeSniff = [] | [("sonar-runtime" | "metric")];
10373
- // ----- sonar/no-mixed-content -----
10374
- type SonarNoMixedContent = [] | [("sonar-runtime" | "metric")];
10375
10274
  // ----- sonar/no-nested-functions -----
10376
10275
  type SonarNoNestedFunctions = [] | [{
10377
10276
  threshold?: number;
10378
- }] | [{
10379
- threshold?: number;
10380
- }, ("sonar-runtime" | "metric")];
10381
- // ----- sonar/no-redundant-optional -----
10382
- type SonarNoRedundantOptional = [] | [("sonar-runtime" | "metric")];
10383
- // ----- sonar/no-redundant-parentheses -----
10384
- type SonarNoRedundantParentheses = [] | [("sonar-runtime" | "metric")];
10385
- // ----- sonar/no-reference-error -----
10386
- type SonarNoReferenceError = [] | [("sonar-runtime" | "metric")];
10387
- // ----- sonar/no-referrer-policy -----
10388
- type SonarNoReferrerPolicy = [] | [("sonar-runtime" | "metric")];
10389
- // ----- sonar/no-same-argument-assert -----
10390
- type SonarNoSameArgumentAssert = [] | [("sonar-runtime" | "metric")];
10391
- // ----- sonar/no-same-line-conditional -----
10392
- type SonarNoSameLineConditional = [] | [("sonar-runtime" | "metric")];
10393
- // ----- sonar/no-selector-parameter -----
10394
- type SonarNoSelectorParameter = [] | [("sonar-runtime" | "metric")];
10395
- // ----- sonar/no-try-promise -----
10396
- type SonarNoTryPromise = [] | [("sonar-runtime" | "metric")];
10397
- // ----- sonar/no-variable-usage-before-declaration -----
10398
- type SonarNoVariableUsageBeforeDeclaration = [] | [("sonar-runtime" | "metric")];
10399
- // ----- sonar/non-number-in-arithmetic-expression -----
10400
- type SonarNonNumberInArithmeticExpression = [] | [("sonar-runtime" | "metric")];
10277
+ }];
10401
10278
  // ----- sonar/regex-complexity -----
10402
10279
  type SonarRegexComplexity = [] | [{
10403
10280
  threshold?: number;
10404
- }] | [{
10405
- threshold?: number;
10406
- }, ("sonar-runtime" | "metric")];
10407
- // ----- sonar/shorthand-property-grouping -----
10408
- type SonarShorthandPropertyGrouping = [] | [("sonar-runtime" | "metric")];
10409
- // ----- sonar/stateful-regex -----
10410
- type SonarStatefulRegex = [] | [("sonar-runtime" | "metric")];
10411
- // ----- sonar/strict-transport-security -----
10412
- type SonarStrictTransportSecurity = [] | [("sonar-runtime" | "metric")];
10413
- // ----- sonar/strings-comparison -----
10414
- type SonarStringsComparison = [] | [("sonar-runtime" | "metric")];
10415
- // ----- sonar/too-many-break-or-continue-in-loop -----
10416
- type SonarTooManyBreakOrContinueInLoop = [] | [("sonar-runtime" | "metric")];
10417
- // ----- sonar/unicode-aware-regex -----
10418
- type SonarUnicodeAwareRegex = [] | [("sonar-runtime" | "metric")];
10419
- // ----- sonar/unused-named-groups -----
10420
- type SonarUnusedNamedGroups = [] | [("sonar-runtime" | "metric")];
10421
- // ----- sonar/unverified-certificate -----
10422
- type SonarUnverifiedCertificate = [] | [("sonar-runtime" | "metric")];
10423
- // ----- sonar/unverified-hostname -----
10424
- type SonarUnverifiedHostname = [] | [("sonar-runtime" | "metric")];
10425
- // ----- sonar/updated-const-var -----
10426
- type SonarUpdatedConstVar = [] | [("sonar-runtime" | "metric")];
10427
- // ----- sonar/updated-loop-counter -----
10428
- type SonarUpdatedLoopCounter = [] | [("sonar-runtime" | "metric")];
10429
- // ----- sonar/use-type-alias -----
10430
- type SonarUseTypeAlias = [] | [("sonar-runtime" | "metric")];
10281
+ }];
10431
10282
  // ----- sonar/variable-name -----
10432
10283
  type SonarVariableName = [] | [{
10433
10284
  format?: string;
10434
10285
  }];
10435
- // ----- sonar/xml-parser-xxe -----
10436
- type SonarXmlParserXxe = [] | [("sonar-runtime" | "metric")];
10437
10286
  // ----- sort-imports -----
10438
10287
  type SortImports = [] | [{
10439
10288
  ignoreCase?: boolean;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@2digits/eslint-config",
3
- "version": "4.6.2",
3
+ "version": "4.6.4",
4
4
  "description": "Effortlessly enforce best practices and catch errors with this comprehensive ESLint configuration for TypeScript, featuring popular plugins like @typescript-eslint, eslint-plugin-react, and eslint-plugin-unicorn.",
5
5
  "homepage": "https://2d-configs.vercel.app/",
6
6
  "repository": {
@@ -27,33 +27,33 @@
27
27
  "public": true,
28
28
  "dependencies": {
29
29
  "@eslint-community/eslint-plugin-eslint-comments": "4.5.0",
30
- "@eslint-react/eslint-plugin": "1.51.0",
31
- "@eslint/compat": "1.2.9",
32
- "@eslint/css": "0.8.1",
33
- "@eslint/js": "9.28.0",
30
+ "@eslint-react/eslint-plugin": "1.52.2",
31
+ "@eslint/compat": "1.3.0",
32
+ "@eslint/css": "0.9.0",
33
+ "@eslint/js": "9.29.0",
34
34
  "@eslint/markdown": "6.5.0",
35
35
  "@graphql-eslint/eslint-plugin": "4.4.0",
36
- "@next/eslint-plugin-next": "15.3.3",
36
+ "@next/eslint-plugin-next": "15.3.4",
37
37
  "@stylistic/eslint-plugin": "4.4.1",
38
38
  "@tanstack/eslint-plugin-query": "5.78.0",
39
- "@typescript-eslint/parser": "8.33.1",
40
- "@typescript-eslint/utils": "8.33.1",
39
+ "@typescript-eslint/parser": "8.34.1",
40
+ "@typescript-eslint/utils": "8.34.1",
41
41
  "eslint-config-flat-gitignore": "2.1.0",
42
42
  "eslint-config-prettier": "10.1.5",
43
43
  "eslint-flat-config-utils": "2.1.0",
44
44
  "eslint-merge-processors": "2.0.0",
45
45
  "eslint-plugin-antfu": "3.1.1",
46
- "eslint-plugin-de-morgan": "1.2.1",
46
+ "eslint-plugin-de-morgan": "1.3.0",
47
47
  "eslint-plugin-drizzle": "0.2.3",
48
- "eslint-plugin-jsdoc": "50.7.1",
48
+ "eslint-plugin-jsdoc": "51.0.3",
49
49
  "eslint-plugin-jsonc": "2.20.1",
50
- "eslint-plugin-n": "17.19.0",
50
+ "eslint-plugin-n": "17.20.0",
51
51
  "eslint-plugin-pnpm": "0.3.1",
52
52
  "eslint-plugin-react-compiler": "19.1.0-rc.2",
53
53
  "eslint-plugin-react-hooks": "5.2.0",
54
- "eslint-plugin-regexp": "2.8.0",
55
- "eslint-plugin-sonarjs": "3.0.2",
56
- "eslint-plugin-storybook": "9.0.5",
54
+ "eslint-plugin-regexp": "2.9.0",
55
+ "eslint-plugin-sonarjs": "3.0.3",
56
+ "eslint-plugin-storybook": "9.0.12",
57
57
  "eslint-plugin-tailwindcss": "3.18.0",
58
58
  "eslint-plugin-turbo": "2.5.4",
59
59
  "eslint-plugin-unicorn": "59.0.1",
@@ -63,24 +63,24 @@
63
63
  "graphql-config": "5.1.5",
64
64
  "jsonc-eslint-parser": "2.4.0",
65
65
  "local-pkg": "1.1.1",
66
- "typescript-eslint": "8.33.1",
66
+ "typescript-eslint": "8.34.1",
67
67
  "yaml-eslint-parser": "1.3.0",
68
68
  "@2digits/constants": "1.1.1",
69
- "@2digits/eslint-plugin": "3.1.2"
69
+ "@2digits/eslint-plugin": "3.1.3"
70
70
  },
71
71
  "devDependencies": {
72
- "@eslint/config-inspector": "1.0.2",
72
+ "@eslint/config-inspector": "1.1.0",
73
73
  "@types/node": "22.15.30",
74
- "@types/react": "19.1.6",
74
+ "@types/react": "19.1.8",
75
75
  "dedent": "1.6.0",
76
- "eslint": "9.28.0",
76
+ "eslint": "9.29.0",
77
77
  "eslint-typegen": "2.2.0",
78
78
  "execa": "9.6.0",
79
79
  "react": "19.1.0",
80
80
  "tinyglobby": "0.2.14",
81
- "tsdown": "0.12.7",
81
+ "tsdown": "0.12.8",
82
82
  "typescript": "5.8.3",
83
- "vitest": "3.2.2",
83
+ "vitest": "3.2.4",
84
84
  "@2digits/tsconfig": "0.7.1"
85
85
  },
86
86
  "scripts": {