@lwc/shared 8.21.6 → 8.22.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs.js +24 -3
- package/dist/index.js +24 -4
- package/dist/signals.d.ts +9 -0
- package/package.json +1 -1
package/dist/index.cjs.js
CHANGED
|
@@ -771,7 +771,7 @@ function htmlEscape(str, attrMode = false) {
|
|
|
771
771
|
* For full license text, see the LICENSE file in the repo root or https://opensource.org/licenses/MIT
|
|
772
772
|
*/
|
|
773
773
|
// Increment whenever the LWC template compiler changes
|
|
774
|
-
const LWC_VERSION = "8.
|
|
774
|
+
const LWC_VERSION = "8.22.3";
|
|
775
775
|
const LWC_VERSION_COMMENT = `LWC compiler v${LWC_VERSION}`;
|
|
776
776
|
const LWC_VERSION_COMMENT_REGEX = /\/\*LWC compiler v([\d.]+)\*\/\s*}/;
|
|
777
777
|
|
|
@@ -902,12 +902,26 @@ let trustedSignals;
|
|
|
902
902
|
function setTrustedSignalSet(signals) {
|
|
903
903
|
isFalse$1(trustedSignals, 'Trusted Signal Set is already set!');
|
|
904
904
|
trustedSignals = signals;
|
|
905
|
+
// Only used in LWC's Karma. Contained within the set function as there are multiple imports of
|
|
906
|
+
// this module. Placing it here ensures we reference the import where the trustedSignals set is maintained
|
|
907
|
+
if (process.env.NODE_ENV === 'test-karma-lwc') {
|
|
908
|
+
// Used to reset the global state between test runs
|
|
909
|
+
globalThis.__lwcResetTrustedSignalsSetForTest = () => (trustedSignals = undefined);
|
|
910
|
+
}
|
|
905
911
|
}
|
|
906
912
|
function addTrustedSignal(signal) {
|
|
907
913
|
// This should be a no-op when the trustedSignals set isn't set by runtime
|
|
908
914
|
trustedSignals?.add(signal);
|
|
909
915
|
}
|
|
910
|
-
|
|
916
|
+
/**
|
|
917
|
+
* The legacy validation behavior was that this check should only
|
|
918
|
+
* be performed for runtimes that have provided a trustedSignals set.
|
|
919
|
+
* However, this resulted in a bug as all object values were
|
|
920
|
+
* being considered signals in environments where the trustedSignals
|
|
921
|
+
* set had not been defined. The runtime flag has been added as a killswitch
|
|
922
|
+
* in case the fix needs to be reverted.
|
|
923
|
+
*/
|
|
924
|
+
function legacyIsTrustedSignal(target) {
|
|
911
925
|
if (!trustedSignals) {
|
|
912
926
|
// The runtime didn't set a trustedSignals set
|
|
913
927
|
// this check should only be performed for runtimes that care about filtering signals to track
|
|
@@ -916,6 +930,12 @@ function isTrustedSignal(target) {
|
|
|
916
930
|
}
|
|
917
931
|
return trustedSignals.has(target);
|
|
918
932
|
}
|
|
933
|
+
function isTrustedSignal(target) {
|
|
934
|
+
if (!trustedSignals) {
|
|
935
|
+
return false;
|
|
936
|
+
}
|
|
937
|
+
return trustedSignals.has(target);
|
|
938
|
+
}
|
|
919
939
|
|
|
920
940
|
/*
|
|
921
941
|
* Copyright (c) 2024, salesforce.com, inc.
|
|
@@ -1079,6 +1099,7 @@ exports.isUndefined = isUndefined;
|
|
|
1079
1099
|
exports.isVoidElement = isVoidElement;
|
|
1080
1100
|
exports.kebabCaseToCamelCase = kebabCaseToCamelCase;
|
|
1081
1101
|
exports.keys = keys;
|
|
1102
|
+
exports.legacyIsTrustedSignal = legacyIsTrustedSignal;
|
|
1082
1103
|
exports.noop = noop;
|
|
1083
1104
|
exports.normalizeClass = normalizeClass;
|
|
1084
1105
|
exports.normalizeStyleAttributeValue = normalizeStyleAttributeValue;
|
|
@@ -1092,5 +1113,5 @@ exports.setPrototypeOf = setPrototypeOf;
|
|
|
1092
1113
|
exports.setTrustedContextSet = setTrustedContextSet;
|
|
1093
1114
|
exports.setTrustedSignalSet = setTrustedSignalSet;
|
|
1094
1115
|
exports.toString = toString;
|
|
1095
|
-
/** version: 8.
|
|
1116
|
+
/** version: 8.22.3 */
|
|
1096
1117
|
//# sourceMappingURL=index.cjs.js.map
|
package/dist/index.js
CHANGED
|
@@ -767,7 +767,7 @@ function htmlEscape(str, attrMode = false) {
|
|
|
767
767
|
* For full license text, see the LICENSE file in the repo root or https://opensource.org/licenses/MIT
|
|
768
768
|
*/
|
|
769
769
|
// Increment whenever the LWC template compiler changes
|
|
770
|
-
const LWC_VERSION = "8.
|
|
770
|
+
const LWC_VERSION = "8.22.3";
|
|
771
771
|
const LWC_VERSION_COMMENT = `LWC compiler v${LWC_VERSION}`;
|
|
772
772
|
const LWC_VERSION_COMMENT_REGEX = /\/\*LWC compiler v([\d.]+)\*\/\s*}/;
|
|
773
773
|
|
|
@@ -898,12 +898,26 @@ let trustedSignals;
|
|
|
898
898
|
function setTrustedSignalSet(signals) {
|
|
899
899
|
isFalse$1(trustedSignals, 'Trusted Signal Set is already set!');
|
|
900
900
|
trustedSignals = signals;
|
|
901
|
+
// Only used in LWC's Karma. Contained within the set function as there are multiple imports of
|
|
902
|
+
// this module. Placing it here ensures we reference the import where the trustedSignals set is maintained
|
|
903
|
+
if (process.env.NODE_ENV === 'test-karma-lwc') {
|
|
904
|
+
// Used to reset the global state between test runs
|
|
905
|
+
globalThis.__lwcResetTrustedSignalsSetForTest = () => (trustedSignals = undefined);
|
|
906
|
+
}
|
|
901
907
|
}
|
|
902
908
|
function addTrustedSignal(signal) {
|
|
903
909
|
// This should be a no-op when the trustedSignals set isn't set by runtime
|
|
904
910
|
trustedSignals?.add(signal);
|
|
905
911
|
}
|
|
906
|
-
|
|
912
|
+
/**
|
|
913
|
+
* The legacy validation behavior was that this check should only
|
|
914
|
+
* be performed for runtimes that have provided a trustedSignals set.
|
|
915
|
+
* However, this resulted in a bug as all object values were
|
|
916
|
+
* being considered signals in environments where the trustedSignals
|
|
917
|
+
* set had not been defined. The runtime flag has been added as a killswitch
|
|
918
|
+
* in case the fix needs to be reverted.
|
|
919
|
+
*/
|
|
920
|
+
function legacyIsTrustedSignal(target) {
|
|
907
921
|
if (!trustedSignals) {
|
|
908
922
|
// The runtime didn't set a trustedSignals set
|
|
909
923
|
// this check should only be performed for runtimes that care about filtering signals to track
|
|
@@ -912,6 +926,12 @@ function isTrustedSignal(target) {
|
|
|
912
926
|
}
|
|
913
927
|
return trustedSignals.has(target);
|
|
914
928
|
}
|
|
929
|
+
function isTrustedSignal(target) {
|
|
930
|
+
if (!trustedSignals) {
|
|
931
|
+
return false;
|
|
932
|
+
}
|
|
933
|
+
return trustedSignals.has(target);
|
|
934
|
+
}
|
|
915
935
|
|
|
916
936
|
/*
|
|
917
937
|
* Copyright (c) 2024, salesforce.com, inc.
|
|
@@ -967,6 +987,6 @@ function normalizeTabIndex(value) {
|
|
|
967
987
|
return shouldNormalize ? 0 : value;
|
|
968
988
|
}
|
|
969
989
|
|
|
970
|
-
export { AMBIGUOUS_PROP_SET, AriaAttrNameToPropNameMap, AriaPropNameToAttrNameMap, ArrayConcat, ArrayCopyWithin, ArrayEvery, ArrayFill, ArrayFilter, ArrayFind, ArrayFindIndex, ArrayFrom, ArrayIncludes, ArrayIndexOf, ArrayJoin, ArrayMap, ArrayPop, ArrayPush, ArrayReduce, ArrayReverse, ArrayShift, ArraySlice, ArraySome, ArraySort, ArraySplice, ArrayUnshift, ContextEventName, DEFAULT_SSR_MODE, DISALLOWED_PROP_SET, HIGHEST_API_VERSION, HTML_NAMESPACE, ID_REFERENCING_ATTRIBUTES_SET, IMPORTANT_FLAG, KEY__LEGACY_SHADOW_TOKEN, KEY__LEGACY_SHADOW_TOKEN_PRIVATE, KEY__NATIVE_GET_ELEMENT_BY_ID, KEY__NATIVE_ONLY_CSS, KEY__NATIVE_QUERY_SELECTOR_ALL, KEY__SCOPED_CSS, KEY__SHADOW_RESOLVER, KEY__SHADOW_RESOLVER_PRIVATE, KEY__SHADOW_STATIC, KEY__SHADOW_STATIC_PRIVATE, KEY__SHADOW_TOKEN, KEY__SHADOW_TOKEN_PRIVATE, KEY__SYNTHETIC_MODE, LOWEST_API_VERSION, LWC_VERSION, LWC_VERSION_COMMENT, LWC_VERSION_COMMENT_REGEX, MATHML_NAMESPACE, REFLECTIVE_GLOBAL_PROPERTY_SET, SPECIAL_PROPERTY_ATTRIBUTE_MAPPING, SVG_NAMESPACE, StringCharAt, StringCharCodeAt, StringFromCharCode, StringReplace, StringSlice, StringSplit, StringToLowerCase, StringTrim, XLINK_NAMESPACE, XML_NAMESPACE, addTrustedContext, addTrustedSignal, arrayEvery, assert, assign, create, defineProperties, defineProperty, entries, flattenStylesheets, forEach, freeze, fromEntries, generateCustomElementTagName, getAPIVersionFromNumber, getContextKeys, getOwnPropertyDescriptor, getOwnPropertyDescriptors, getOwnPropertyNames, getOwnPropertySymbols, getPropertyDescriptor, getPrototypeOf, hasOwnProperty, htmlEscape, htmlPropertyToAttribute, isAPIFeatureEnabled, isAriaAttribute, isArray, isBoolean, isBooleanAttribute, isFalse, isFrozen, isFunction, isGlobalHtmlAttribute, isNull, isNumber, isObject, isString, isTrue, isTrustedContext, isTrustedSignal, isUndefined, isVoidElement, kebabCaseToCamelCase, keys, noop, normalizeClass, normalizeStyleAttributeValue, normalizeTabIndex, parseStyleText, sanitizeHtmlContent, seal, setContextKeys, setHooks, setPrototypeOf, setTrustedContextSet, setTrustedSignalSet, toString };
|
|
971
|
-
/** version: 8.
|
|
990
|
+
export { AMBIGUOUS_PROP_SET, AriaAttrNameToPropNameMap, AriaPropNameToAttrNameMap, ArrayConcat, ArrayCopyWithin, ArrayEvery, ArrayFill, ArrayFilter, ArrayFind, ArrayFindIndex, ArrayFrom, ArrayIncludes, ArrayIndexOf, ArrayJoin, ArrayMap, ArrayPop, ArrayPush, ArrayReduce, ArrayReverse, ArrayShift, ArraySlice, ArraySome, ArraySort, ArraySplice, ArrayUnshift, ContextEventName, DEFAULT_SSR_MODE, DISALLOWED_PROP_SET, HIGHEST_API_VERSION, HTML_NAMESPACE, ID_REFERENCING_ATTRIBUTES_SET, IMPORTANT_FLAG, KEY__LEGACY_SHADOW_TOKEN, KEY__LEGACY_SHADOW_TOKEN_PRIVATE, KEY__NATIVE_GET_ELEMENT_BY_ID, KEY__NATIVE_ONLY_CSS, KEY__NATIVE_QUERY_SELECTOR_ALL, KEY__SCOPED_CSS, KEY__SHADOW_RESOLVER, KEY__SHADOW_RESOLVER_PRIVATE, KEY__SHADOW_STATIC, KEY__SHADOW_STATIC_PRIVATE, KEY__SHADOW_TOKEN, KEY__SHADOW_TOKEN_PRIVATE, KEY__SYNTHETIC_MODE, LOWEST_API_VERSION, LWC_VERSION, LWC_VERSION_COMMENT, LWC_VERSION_COMMENT_REGEX, MATHML_NAMESPACE, REFLECTIVE_GLOBAL_PROPERTY_SET, SPECIAL_PROPERTY_ATTRIBUTE_MAPPING, SVG_NAMESPACE, StringCharAt, StringCharCodeAt, StringFromCharCode, StringReplace, StringSlice, StringSplit, StringToLowerCase, StringTrim, XLINK_NAMESPACE, XML_NAMESPACE, addTrustedContext, addTrustedSignal, arrayEvery, assert, assign, create, defineProperties, defineProperty, entries, flattenStylesheets, forEach, freeze, fromEntries, generateCustomElementTagName, getAPIVersionFromNumber, getContextKeys, getOwnPropertyDescriptor, getOwnPropertyDescriptors, getOwnPropertyNames, getOwnPropertySymbols, getPropertyDescriptor, getPrototypeOf, hasOwnProperty, htmlEscape, htmlPropertyToAttribute, isAPIFeatureEnabled, isAriaAttribute, isArray, isBoolean, isBooleanAttribute, isFalse, isFrozen, isFunction, isGlobalHtmlAttribute, isNull, isNumber, isObject, isString, isTrue, isTrustedContext, isTrustedSignal, isUndefined, isVoidElement, kebabCaseToCamelCase, keys, legacyIsTrustedSignal, noop, normalizeClass, normalizeStyleAttributeValue, normalizeTabIndex, parseStyleText, sanitizeHtmlContent, seal, setContextKeys, setHooks, setPrototypeOf, setTrustedContextSet, setTrustedSignalSet, toString };
|
|
991
|
+
/** version: 8.22.3 */
|
|
972
992
|
//# sourceMappingURL=index.js.map
|
package/dist/signals.d.ts
CHANGED
|
@@ -1,4 +1,13 @@
|
|
|
1
1
|
export declare function setTrustedSignalSet(signals: WeakSet<object>): void;
|
|
2
2
|
export declare function addTrustedSignal(signal: object): void;
|
|
3
|
+
/**
|
|
4
|
+
* The legacy validation behavior was that this check should only
|
|
5
|
+
* be performed for runtimes that have provided a trustedSignals set.
|
|
6
|
+
* However, this resulted in a bug as all object values were
|
|
7
|
+
* being considered signals in environments where the trustedSignals
|
|
8
|
+
* set had not been defined. The runtime flag has been added as a killswitch
|
|
9
|
+
* in case the fix needs to be reverted.
|
|
10
|
+
*/
|
|
11
|
+
export declare function legacyIsTrustedSignal(target: object): boolean;
|
|
3
12
|
export declare function isTrustedSignal(target: object): boolean;
|
|
4
13
|
//# sourceMappingURL=signals.d.ts.map
|
package/package.json
CHANGED
|
@@ -4,7 +4,7 @@
|
|
|
4
4
|
"You can safely modify dependencies, devDependencies, keywords, etc., but other props will be overwritten."
|
|
5
5
|
],
|
|
6
6
|
"name": "@lwc/shared",
|
|
7
|
-
"version": "8.
|
|
7
|
+
"version": "8.22.3",
|
|
8
8
|
"description": "Utilities and methods that are shared across packages",
|
|
9
9
|
"keywords": [
|
|
10
10
|
"lwc"
|