@vinicunca/eslint-config 3.20.0 → 3.21.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/index.d.ts +251 -248
  2. package/dist/index.js +3 -3
  3. package/package.json +12 -12
package/dist/index.d.ts CHANGED
@@ -2918,11 +2918,21 @@ interface RuleOptions {
2918
2918
  * @see https://eslint-react.xyz/docs/rules/no-useless-forward-ref
2919
2919
  */
2920
2920
  'react/ensure-forward-ref-using-ref'?: Linter.RuleEntry<[]>;
2921
+ /**
2922
+ * Enforces that the 'key' attribute is placed before the spread attribute in JSX elements.
2923
+ * @see https://eslint-react.xyz/docs/rules/jsx-key-before-spread
2924
+ */
2925
+ 'react/jsx-key-before-spread'?: Linter.RuleEntry<[]>;
2921
2926
  /**
2922
2927
  * Disallow duplicate props in JSX elements.
2923
2928
  * @see https://eslint-react.xyz/docs/rules/jsx-no-duplicate-props
2924
2929
  */
2925
2930
  'react/jsx-no-duplicate-props'?: Linter.RuleEntry<[]>;
2931
+ /**
2932
+ * Disallows 'IIFE' in JSX elements.
2933
+ * @see https://eslint-react.xyz/docs/rules/jsx-no-iife
2934
+ */
2935
+ 'react/jsx-no-iife'?: Linter.RuleEntry<[]>;
2926
2936
  /**
2927
2937
  * Disallow undefined variables in JSX.
2928
2938
  * @see https://eslint-react.xyz/docs/rules/jsx-no-undef
@@ -2979,7 +2989,7 @@ interface RuleOptions {
2979
2989
  */
2980
2990
  'react/no-children-to-array'?: Linter.RuleEntry<[]>;
2981
2991
  /**
2982
- * Disallow class components.
2992
+ * Disallow class components except for error boundaries.
2983
2993
  * @see https://eslint-react.xyz/docs/rules/no-class-component
2984
2994
  */
2985
2995
  'react/no-class-component'?: Linter.RuleEntry<[]>;
@@ -3078,6 +3088,11 @@ interface RuleOptions {
3078
3088
  * @see https://eslint-react.xyz/docs/rules/no-missing-key
3079
3089
  */
3080
3090
  'react/no-missing-key'?: Linter.RuleEntry<[]>;
3091
+ /**
3092
+ * Prevents incorrect usage of `captureOwnerStack`.
3093
+ * @see https://eslint-react.xyz/docs/rules/no-misused-capture-owner-stack
3094
+ */
3095
+ 'react/no-misused-capture-owner-stack'?: Linter.RuleEntry<[]>;
3081
3096
  /**
3082
3097
  * Disallow nesting component definitions inside other components.
3083
3098
  * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
@@ -3088,6 +3103,11 @@ interface RuleOptions {
3088
3103
  * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
3089
3104
  */
3090
3105
  'react/no-nested-components'?: Linter.RuleEntry<[]>;
3106
+ /**
3107
+ * Disallow nesting lazy component declarations inside other components.
3108
+ * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
3109
+ */
3110
+ 'react/no-nested-lazy-component-declarations'?: Linter.RuleEntry<[]>;
3091
3111
  /**
3092
3112
  * Disallow `propTypes` in favor of TypeScript or another type-checking solution.
3093
3113
  * @see https://eslint-react.xyz/docs/rules/no-prop-types
@@ -3104,7 +3124,7 @@ interface RuleOptions {
3104
3124
  */
3105
3125
  'react/no-set-state-in-component-did-mount'?: Linter.RuleEntry<[]>;
3106
3126
  /**
3107
- * Disallows calling `this.setState` in `componentDidUpdate` outside of functions, such as callbacks.
3127
+ * Disallow calling `this.setState` in `componentDidUpdate` outside of functions, such as callbacks.
3108
3128
  * @see https://eslint-react.xyz/docs/rules/no-set-state-in-component-did-update
3109
3129
  */
3110
3130
  'react/no-set-state-in-component-did-update'?: Linter.RuleEntry<[]>;
@@ -3114,7 +3134,7 @@ interface RuleOptions {
3114
3134
  */
3115
3135
  'react/no-set-state-in-component-will-update'?: Linter.RuleEntry<[]>;
3116
3136
  /**
3117
- * Disallow deprecated string `refs`.
3137
+ * Replaces string refs with callback refs.
3118
3138
  * @see https://eslint-react.xyz/docs/rules/no-string-refs
3119
3139
  */
3120
3140
  'react/no-string-refs'?: Linter.RuleEntry<[]>;
@@ -3767,12 +3787,12 @@ interface RuleOptions {
3767
3787
  * Parameters should be passed in the correct order
3768
3788
  * @see https://sonarsource.github.io/rspec/#/rspec/S2234/javascript
3769
3789
  */
3770
- 'sonar/arguments-order'?: Linter.RuleEntry<SonarArgumentsOrder>;
3790
+ 'sonar/arguments-order'?: Linter.RuleEntry<[]>;
3771
3791
  /**
3772
3792
  * "arguments" should not be accessed directly
3773
3793
  * @see https://sonarsource.github.io/rspec/#/rspec/S3513/javascript
3774
3794
  */
3775
- 'sonar/arguments-usage'?: Linter.RuleEntry<SonarArgumentsUsage>;
3795
+ 'sonar/arguments-usage'?: Linter.RuleEntry<[]>;
3776
3796
  /**
3777
3797
  * Callbacks of array methods should have return statements
3778
3798
  * @see https://sonarsource.github.io/rspec/#/rspec/S3796/javascript
@@ -3817,22 +3837,22 @@ interface RuleOptions {
3817
3837
  * Policies granting all privileges are security-sensitive
3818
3838
  * @see https://sonarsource.github.io/rspec/#/rspec/S6302/javascript
3819
3839
  */
3820
- 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<SonarAwsIamAllPrivileges>;
3840
+ 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<[]>;
3821
3841
  /**
3822
3842
  * Policies granting access to all resources of an account are security-sensitive
3823
3843
  * @see https://sonarsource.github.io/rspec/#/rspec/S6304/javascript
3824
3844
  */
3825
- 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<SonarAwsIamAllResourcesAccessible>;
3845
+ 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<[]>;
3826
3846
  /**
3827
3847
  * AWS IAM policies should limit the scope of permissions given
3828
3848
  * @see https://sonarsource.github.io/rspec/#/rspec/S6317/javascript
3829
3849
  */
3830
- 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<SonarAwsIamPrivilegeEscalation>;
3850
+ 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<[]>;
3831
3851
  /**
3832
3852
  * Policies authorizing public access to resources are security-sensitive
3833
3853
  * @see https://sonarsource.github.io/rspec/#/rspec/S6270/javascript
3834
3854
  */
3835
- 'sonar/aws-iam-public-access'?: Linter.RuleEntry<SonarAwsIamPublicAccess>;
3855
+ 'sonar/aws-iam-public-access'?: Linter.RuleEntry<[]>;
3836
3856
  /**
3837
3857
  * Using unencrypted Elasticsearch domains is security-sensitive
3838
3858
  * @see https://sonarsource.github.io/rspec/#/rspec/S6308/javascript
@@ -3852,7 +3872,7 @@ interface RuleOptions {
3852
3872
  * Granting access to S3 buckets to all or authenticated users is security-sensitive
3853
3873
  * @see https://sonarsource.github.io/rspec/#/rspec/S6265/javascript
3854
3874
  */
3855
- 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<SonarAwsS3BucketGrantedAccess>;
3875
+ 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<[]>;
3856
3876
  /**
3857
3877
  * Authorizing HTTP communications with S3 buckets is security-sensitive
3858
3878
  * @see https://sonarsource.github.io/rspec/#/rspec/S6249/javascript
@@ -3862,18 +3882,18 @@ interface RuleOptions {
3862
3882
  * Allowing public ACLs or policies on a S3 bucket is security-sensitive
3863
3883
  * @see https://sonarsource.github.io/rspec/#/rspec/S6281/javascript
3864
3884
  */
3865
- 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<SonarAwsS3BucketPublicAccess>;
3885
+ 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<[]>;
3866
3886
  /**
3867
3887
  * Disabling server-side encryption of S3 buckets is security-sensitive
3868
3888
  * @see https://sonarsource.github.io/rspec/#/rspec/S6245/javascript
3869
3889
  * @deprecated
3870
3890
  */
3871
- 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<SonarAwsS3BucketServerEncryption>;
3891
+ 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<[]>;
3872
3892
  /**
3873
3893
  * Disabling versioning of S3 buckets is security-sensitive
3874
3894
  * @see https://sonarsource.github.io/rspec/#/rspec/S6252/javascript
3875
3895
  */
3876
- 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<SonarAwsS3BucketVersioning>;
3896
+ 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<[]>;
3877
3897
  /**
3878
3898
  * Using unencrypted SageMaker notebook instances is security-sensitive
3879
3899
  * @see https://sonarsource.github.io/rspec/#/rspec/S6319/javascript
@@ -3898,7 +3918,7 @@ interface RuleOptions {
3898
3918
  * Variables should be used in the blocks where they are declared
3899
3919
  * @see https://sonarsource.github.io/rspec/#/rspec/S2392/javascript
3900
3920
  */
3901
- 'sonar/block-scoped-var'?: Linter.RuleEntry<SonarBlockScopedVar>;
3921
+ 'sonar/block-scoped-var'?: Linter.RuleEntry<[]>;
3902
3922
  /**
3903
3923
  * Optional boolean parameters should have default value
3904
3924
  * @see https://sonarsource.github.io/rspec/#/rspec/S4798/javascript
@@ -3914,7 +3934,7 @@ interface RuleOptions {
3914
3934
  * @see https://sonarsource.github.io/rspec/#/rspec/S5742/javascript
3915
3935
  * @deprecated
3916
3936
  */
3917
- 'sonar/certificate-transparency'?: Linter.RuleEntry<SonarCertificateTransparency>;
3937
+ 'sonar/certificate-transparency'?: Linter.RuleEntry<[]>;
3918
3938
  /**
3919
3939
  * Chai assertions should have only one reason to succeed
3920
3940
  * @see https://sonarsource.github.io/rspec/#/rspec/S6092/javascript
@@ -3960,12 +3980,12 @@ interface RuleOptions {
3960
3980
  * @see https://sonarsource.github.io/rspec/#/rspec/S3973/javascript
3961
3981
  * @deprecated
3962
3982
  */
3963
- 'sonar/conditional-indentation'?: Linter.RuleEntry<SonarConditionalIndentation>;
3983
+ 'sonar/conditional-indentation'?: Linter.RuleEntry<[]>;
3964
3984
  /**
3965
3985
  * Allowing confidential information to be logged is security-sensitive
3966
3986
  * @see https://sonarsource.github.io/rspec/#/rspec/S5757/javascript
3967
3987
  */
3968
- 'sonar/confidential-information-logging'?: Linter.RuleEntry<SonarConfidentialInformationLogging>;
3988
+ 'sonar/confidential-information-logging'?: Linter.RuleEntry<[]>;
3969
3989
  /**
3970
3990
  * Objects should not be created to be dropped immediately without being used
3971
3991
  * @see https://sonarsource.github.io/rspec/#/rspec/S1848/javascript
@@ -3980,12 +4000,12 @@ interface RuleOptions {
3980
4000
  * Disabling content security policy fetch directives is security-sensitive
3981
4001
  * @see https://sonarsource.github.io/rspec/#/rspec/S5728/javascript
3982
4002
  */
3983
- 'sonar/content-security-policy'?: Linter.RuleEntry<SonarContentSecurityPolicy>;
4003
+ 'sonar/content-security-policy'?: Linter.RuleEntry<[]>;
3984
4004
  /**
3985
4005
  * Creating cookies without the "HttpOnly" flag is security-sensitive
3986
4006
  * @see https://sonarsource.github.io/rspec/#/rspec/S3330/javascript
3987
4007
  */
3988
- 'sonar/cookie-no-httponly'?: Linter.RuleEntry<SonarCookieNoHttponly>;
4008
+ 'sonar/cookie-no-httponly'?: Linter.RuleEntry<[]>;
3989
4009
  /**
3990
4010
  * Writing cookies is security-sensitive
3991
4011
  * @see https://sonarsource.github.io/rspec/#/rspec/S2255/javascript
@@ -3996,12 +4016,12 @@ interface RuleOptions {
3996
4016
  * Having a permissive Cross-Origin Resource Sharing policy is security-sensitive
3997
4017
  * @see https://sonarsource.github.io/rspec/#/rspec/S5122/javascript
3998
4018
  */
3999
- 'sonar/cors'?: Linter.RuleEntry<SonarCors>;
4019
+ 'sonar/cors'?: Linter.RuleEntry<[]>;
4000
4020
  /**
4001
4021
  * Disabling CSRF protections is security-sensitive
4002
4022
  * @see https://sonarsource.github.io/rspec/#/rspec/S4502/javascript
4003
4023
  */
4004
- 'sonar/csrf'?: Linter.RuleEntry<SonarCsrf>;
4024
+ 'sonar/csrf'?: Linter.RuleEntry<[]>;
4005
4025
  /**
4006
4026
  * Cyclomatic Complexity of functions should not be too high
4007
4027
  * @see https://sonarsource.github.io/rspec/#/rspec/S1541/javascript
@@ -4021,17 +4041,17 @@ interface RuleOptions {
4021
4041
  * Destructuring syntax should be used for assignments
4022
4042
  * @see https://sonarsource.github.io/rspec/#/rspec/S3514/javascript
4023
4043
  */
4024
- 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<SonarDestructuringAssignmentSyntax>;
4044
+ 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<[]>;
4025
4045
  /**
4026
4046
  * Strict equality operators should not be used with dissimilar types
4027
4047
  * @see https://sonarsource.github.io/rspec/#/rspec/S3403/javascript
4028
4048
  */
4029
- 'sonar/different-types-comparison'?: Linter.RuleEntry<SonarDifferentTypesComparison>;
4049
+ 'sonar/different-types-comparison'?: Linter.RuleEntry<[]>;
4030
4050
  /**
4031
4051
  * Disabling auto-escaping in template engines is security-sensitive
4032
4052
  * @see https://sonarsource.github.io/rspec/#/rspec/S5247/javascript
4033
4053
  */
4034
- 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<SonarDisabledAutoEscaping>;
4054
+ 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<[]>;
4035
4055
  /**
4036
4056
  * Using remote artifacts without integrity checks is security-sensitive
4037
4057
  * @see https://sonarsource.github.io/rspec/#/rspec/S5725/javascript
@@ -4047,12 +4067,12 @@ interface RuleOptions {
4047
4067
  * @see https://sonarsource.github.io/rspec/#/rspec/S5743/javascript
4048
4068
  * @deprecated
4049
4069
  */
4050
- 'sonar/dns-prefetching'?: Linter.RuleEntry<SonarDnsPrefetching>;
4070
+ 'sonar/dns-prefetching'?: Linter.RuleEntry<[]>;
4051
4071
  /**
4052
4072
  * Character classes in regular expressions should not contain the same character twice
4053
4073
  * @see https://sonarsource.github.io/rspec/#/rspec/S5869/javascript
4054
4074
  */
4055
- 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<SonarDuplicatesInCharacterClass>;
4075
+ 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<[]>;
4056
4076
  /**
4057
4077
  * "if ... else if" constructs should end with "else" clauses
4058
4078
  * @see https://sonarsource.github.io/rspec/#/rspec/S126/javascript
@@ -4109,7 +4129,7 @@ interface RuleOptions {
4109
4129
  * File uploads should be restricted
4110
4130
  * @see https://sonarsource.github.io/rspec/#/rspec/S2598/javascript
4111
4131
  */
4112
- 'sonar/file-uploads'?: Linter.RuleEntry<SonarFileUploads>;
4132
+ 'sonar/file-uploads'?: Linter.RuleEntry<[]>;
4113
4133
  /**
4114
4134
  * Track uses of "FIXME" tags
4115
4135
  * @see https://sonarsource.github.io/rspec/#/rspec/S1134/javascript
@@ -4124,17 +4144,17 @@ interface RuleOptions {
4124
4144
  * A "for" loop update clause should move the counter in the right direction
4125
4145
  * @see https://sonarsource.github.io/rspec/#/rspec/S2251/javascript
4126
4146
  */
4127
- 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<SonarForLoopIncrementSign>;
4147
+ 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<[]>;
4128
4148
  /**
4129
4149
  * Disabling content security policy frame-ancestors directive is security-sensitive
4130
4150
  * @see https://sonarsource.github.io/rspec/#/rspec/S5732/javascript
4131
4151
  */
4132
- 'sonar/frame-ancestors'?: Linter.RuleEntry<SonarFrameAncestors>;
4152
+ 'sonar/frame-ancestors'?: Linter.RuleEntry<[]>;
4133
4153
  /**
4134
4154
  * Functions should not be defined inside loops
4135
4155
  * @see https://sonarsource.github.io/rspec/#/rspec/S1515/javascript
4136
4156
  */
4137
- 'sonar/function-inside-loop'?: Linter.RuleEntry<SonarFunctionInsideLoop>;
4157
+ 'sonar/function-inside-loop'?: Linter.RuleEntry<[]>;
4138
4158
  /**
4139
4159
  * Function and method names should comply with a naming convention
4140
4160
  * @see https://sonarsource.github.io/rspec/#/rspec/S100/javascript
@@ -4144,7 +4164,7 @@ interface RuleOptions {
4144
4164
  * Functions should always return the same type
4145
4165
  * @see https://sonarsource.github.io/rspec/#/rspec/S3800/javascript
4146
4166
  */
4147
- 'sonar/function-return-type'?: Linter.RuleEntry<SonarFunctionReturnType>;
4167
+ 'sonar/function-return-type'?: Linter.RuleEntry<[]>;
4148
4168
  /**
4149
4169
  * Future reserved words should not be used as identifiers
4150
4170
  * @see https://sonarsource.github.io/rspec/#/rspec/S1527/javascript
@@ -4169,12 +4189,12 @@ interface RuleOptions {
4169
4189
  * "in" should not be used with primitive types
4170
4190
  * @see https://sonarsource.github.io/rspec/#/rspec/S3785/javascript
4171
4191
  */
4172
- 'sonar/in-operator-type-error'?: Linter.RuleEntry<SonarInOperatorTypeError>;
4192
+ 'sonar/in-operator-type-error'?: Linter.RuleEntry<[]>;
4173
4193
  /**
4174
4194
  * Functions should be called consistently with or without "new"
4175
4195
  * @see https://sonarsource.github.io/rspec/#/rspec/S3686/javascript
4176
4196
  */
4177
- 'sonar/inconsistent-function-call'?: Linter.RuleEntry<SonarInconsistentFunctionCall>;
4197
+ 'sonar/inconsistent-function-call'?: Linter.RuleEntry<[]>;
4178
4198
  /**
4179
4199
  * "indexOf" checks should not be for positive numbers
4180
4200
  * @see https://sonarsource.github.io/rspec/#/rspec/S2692/javascript
@@ -4184,17 +4204,17 @@ interface RuleOptions {
4184
4204
  * Creating cookies without the "secure" flag is security-sensitive
4185
4205
  * @see https://sonarsource.github.io/rspec/#/rspec/S2092/javascript
4186
4206
  */
4187
- 'sonar/insecure-cookie'?: Linter.RuleEntry<SonarInsecureCookie>;
4207
+ 'sonar/insecure-cookie'?: Linter.RuleEntry<[]>;
4188
4208
  /**
4189
4209
  * JWT should be signed and verified with strong cipher algorithms
4190
4210
  * @see https://sonarsource.github.io/rspec/#/rspec/S5659/javascript
4191
4211
  */
4192
- 'sonar/insecure-jwt-token'?: Linter.RuleEntry<SonarInsecureJwtToken>;
4212
+ 'sonar/insecure-jwt-token'?: Linter.RuleEntry<[]>;
4193
4213
  /**
4194
4214
  * Assertion arguments should be passed in the correct order
4195
4215
  * @see https://sonarsource.github.io/rspec/#/rspec/S3415/javascript
4196
4216
  */
4197
- 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<SonarInvertedAssertionArguments>;
4217
+ 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<[]>;
4198
4218
  /**
4199
4219
  * React components should not render non-boolean condition values
4200
4220
  * @see https://sonarsource.github.io/rspec/#/rspec/S6439/javascript
@@ -4294,12 +4314,12 @@ interface RuleOptions {
4294
4314
  * Tests should not execute any code after "done()" is called
4295
4315
  * @see https://sonarsource.github.io/rspec/#/rspec/S6079/javascript
4296
4316
  */
4297
- 'sonar/no-code-after-done'?: Linter.RuleEntry<SonarNoCodeAfterDone>;
4317
+ 'sonar/no-code-after-done'?: Linter.RuleEntry<[]>;
4298
4318
  /**
4299
4319
  * Mergeable "if" statements should be combined
4300
4320
  * @see https://sonarsource.github.io/rspec/#/rspec/S1066/javascript
4301
4321
  */
4302
- 'sonar/no-collapsible-if'?: Linter.RuleEntry<SonarNoCollapsibleIf>;
4322
+ 'sonar/no-collapsible-if'?: Linter.RuleEntry<[]>;
4303
4323
  /**
4304
4324
  * Collection size and array length comparisons should make sense
4305
4325
  * @see https://sonarsource.github.io/rspec/#/rspec/S3981/javascript
@@ -4329,7 +4349,7 @@ interface RuleOptions {
4329
4349
  * Union and intersection types should not include duplicated constituents
4330
4350
  * @see https://sonarsource.github.io/rspec/#/rspec/S4621/javascript
4331
4351
  */
4332
- 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<SonarNoDuplicateInComposite>;
4352
+ 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<[]>;
4333
4353
  /**
4334
4354
  * String literals should not be duplicated
4335
4355
  * @see https://sonarsource.github.io/rspec/#/rspec/S1192/javascript
@@ -4339,12 +4359,12 @@ interface RuleOptions {
4339
4359
  * Two branches in a conditional structure should not have exactly the same implementation
4340
4360
  * @see https://sonarsource.github.io/rspec/#/rspec/S1871/javascript
4341
4361
  */
4342
- 'sonar/no-duplicated-branches'?: Linter.RuleEntry<SonarNoDuplicatedBranches>;
4362
+ 'sonar/no-duplicated-branches'?: Linter.RuleEntry<[]>;
4343
4363
  /**
4344
4364
  * Collection elements should not be replaced unconditionally
4345
4365
  * @see https://sonarsource.github.io/rspec/#/rspec/S4143/javascript
4346
4366
  */
4347
- 'sonar/no-element-overwrite'?: Linter.RuleEntry<SonarNoElementOverwrite>;
4367
+ 'sonar/no-element-overwrite'?: Linter.RuleEntry<[]>;
4348
4368
  /**
4349
4369
  * Reluctant quantifiers in regular expressions should be followed by an expression that can't match the empty string
4350
4370
  * @see https://sonarsource.github.io/rspec/#/rspec/S6019/javascript
@@ -4389,7 +4409,7 @@ interface RuleOptions {
4389
4409
  * Function calls should not pass extra arguments
4390
4410
  * @see https://sonarsource.github.io/rspec/#/rspec/S930/javascript
4391
4411
  */
4392
- 'sonar/no-extra-arguments'?: Linter.RuleEntry<SonarNoExtraArguments>;
4412
+ 'sonar/no-extra-arguments'?: Linter.RuleEntry<[]>;
4393
4413
  /**
4394
4414
  * Switch cases should end with an unconditional "break" statement
4395
4415
  * @see https://sonarsource.github.io/rspec/#/rspec/S128/javascript
@@ -4419,7 +4439,7 @@ interface RuleOptions {
4419
4439
  * Boolean expressions should not be gratuitous
4420
4440
  * @see https://sonarsource.github.io/rspec/#/rspec/S2589/javascript
4421
4441
  */
4422
- 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<SonarNoGratuitousExpressions>;
4442
+ 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<[]>;
4423
4443
  /**
4424
4444
  * Using hardcoded IP addresses is security-sensitive
4425
4445
  * @see https://sonarsource.github.io/rspec/#/rspec/S1313/javascript
@@ -4444,12 +4464,12 @@ interface RuleOptions {
4444
4464
  * "if/else if" chains and "switch" cases should not have the same condition
4445
4465
  * @see https://sonarsource.github.io/rspec/#/rspec/S1862/javascript
4446
4466
  */
4447
- 'sonar/no-identical-conditions'?: Linter.RuleEntry<SonarNoIdenticalConditions>;
4467
+ 'sonar/no-identical-conditions'?: Linter.RuleEntry<[]>;
4448
4468
  /**
4449
4469
  * Identical expressions should not be used on both sides of a binary operator
4450
4470
  * @see https://sonarsource.github.io/rspec/#/rspec/S1764/javascript
4451
4471
  */
4452
- 'sonar/no-identical-expressions'?: Linter.RuleEntry<SonarNoIdenticalExpressions>;
4472
+ 'sonar/no-identical-expressions'?: Linter.RuleEntry<[]>;
4453
4473
  /**
4454
4474
  * Functions should not have identical implementations
4455
4475
  * @see https://sonarsource.github.io/rspec/#/rspec/S4144/javascript
@@ -4489,12 +4509,12 @@ interface RuleOptions {
4489
4509
  * Functions should use "return" consistently
4490
4510
  * @see https://sonarsource.github.io/rspec/#/rspec/S3801/javascript
4491
4511
  */
4492
- 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<SonarNoInconsistentReturns>;
4512
+ 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<[]>;
4493
4513
  /**
4494
4514
  * Strings and non-strings should not be added
4495
4515
  * @see https://sonarsource.github.io/rspec/#/rspec/S3402/javascript
4496
4516
  */
4497
- 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<SonarNoIncorrectStringConcat>;
4517
+ 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<[]>;
4498
4518
  /**
4499
4519
  * Users should not use internal APIs
4500
4520
  * @see https://sonarsource.github.io/rspec/#/rspec/S6627/javascript
@@ -4505,11 +4525,6 @@ interface RuleOptions {
4505
4525
  * @see https://sonarsource.github.io/rspec/#/rspec/S5604/javascript
4506
4526
  */
4507
4527
  'sonar/no-intrusive-permissions'?: Linter.RuleEntry<SonarNoIntrusivePermissions>;
4508
- /**
4509
- * "await" should only be used with promises
4510
- * @see https://sonarsource.github.io/rspec/#/rspec/S4123/javascript
4511
- */
4512
- 'sonar/no-invalid-await'?: Linter.RuleEntry<[]>;
4513
4528
  /**
4514
4529
  * Regular expressions should be syntactically valid
4515
4530
  * @see https://sonarsource.github.io/rspec/#/rspec/S5856/javascript
@@ -4519,7 +4534,7 @@ interface RuleOptions {
4519
4534
  * Function returns should not be invariant
4520
4535
  * @see https://sonarsource.github.io/rspec/#/rspec/S3516/javascript
4521
4536
  */
4522
- 'sonar/no-invariant-returns'?: Linter.RuleEntry<SonarNoInvariantReturns>;
4537
+ 'sonar/no-invariant-returns'?: Linter.RuleEntry<[]>;
4523
4538
  /**
4524
4539
  * Boolean checks should not be inverted
4525
4540
  * @see https://sonarsource.github.io/rspec/#/rspec/S1940/javascript
@@ -4529,7 +4544,7 @@ interface RuleOptions {
4529
4544
  * Forwarding client IP address is security-sensitive
4530
4545
  * @see https://sonarsource.github.io/rspec/#/rspec/S5759/javascript
4531
4546
  */
4532
- 'sonar/no-ip-forward'?: Linter.RuleEntry<SonarNoIpForward>;
4547
+ 'sonar/no-ip-forward'?: Linter.RuleEntry<[]>;
4533
4548
  /**
4534
4549
  * Labels should not be used
4535
4550
  * @see https://sonarsource.github.io/rspec/#/rspec/S1119/javascript
@@ -4544,7 +4559,7 @@ interface RuleOptions {
4544
4559
  * Allowing browsers to sniff MIME types is security-sensitive
4545
4560
  * @see https://sonarsource.github.io/rspec/#/rspec/S5734/javascript
4546
4561
  */
4547
- 'sonar/no-mime-sniff'?: Linter.RuleEntry<SonarNoMimeSniff>;
4562
+ 'sonar/no-mime-sniff'?: Linter.RuleEntry<[]>;
4548
4563
  /**
4549
4564
  * Array-mutating methods should not be used misleadingly
4550
4565
  * @see https://sonarsource.github.io/rspec/#/rspec/S4043/javascript
@@ -4559,7 +4574,7 @@ interface RuleOptions {
4559
4574
  * Allowing mixed-content is security-sensitive
4560
4575
  * @see https://sonarsource.github.io/rspec/#/rspec/S5730/javascript
4561
4576
  */
4562
- 'sonar/no-mixed-content'?: Linter.RuleEntry<SonarNoMixedContent>;
4577
+ 'sonar/no-mixed-content'?: Linter.RuleEntry<[]>;
4563
4578
  /**
4564
4579
  * Assignments should not be made from within sub-expressions
4565
4580
  * @see https://sonarsource.github.io/rspec/#/rspec/S1121/javascript
@@ -4629,23 +4644,23 @@ interface RuleOptions {
4629
4644
  * Optional property declarations should not use both '?' and 'undefined' syntax
4630
4645
  * @see https://sonarsource.github.io/rspec/#/rspec/S4782/javascript
4631
4646
  */
4632
- 'sonar/no-redundant-optional'?: Linter.RuleEntry<SonarNoRedundantOptional>;
4647
+ 'sonar/no-redundant-optional'?: Linter.RuleEntry<[]>;
4633
4648
  /**
4634
4649
  * Redundant pairs of parentheses should be removed
4635
4650
  * @see https://sonarsource.github.io/rspec/#/rspec/S1110/javascript
4636
4651
  * @deprecated
4637
4652
  */
4638
- 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<SonarNoRedundantParentheses>;
4653
+ 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<[]>;
4639
4654
  /**
4640
4655
  * Variables should be defined before being used
4641
4656
  * @see https://sonarsource.github.io/rspec/#/rspec/S3827/javascript
4642
4657
  */
4643
- 'sonar/no-reference-error'?: Linter.RuleEntry<SonarNoReferenceError>;
4658
+ 'sonar/no-reference-error'?: Linter.RuleEntry<[]>;
4644
4659
  /**
4645
4660
  * Disabling strict HTTP no-referrer policy is security-sensitive
4646
4661
  * @see https://sonarsource.github.io/rspec/#/rspec/S5736/javascript
4647
4662
  */
4648
- 'sonar/no-referrer-policy'?: Linter.RuleEntry<SonarNoReferrerPolicy>;
4663
+ 'sonar/no-referrer-policy'?: Linter.RuleEntry<[]>;
4649
4664
  /**
4650
4665
  * Regular expressions should not contain multiple spaces
4651
4666
  * @see https://sonarsource.github.io/rspec/#/rspec/S6326/javascript
@@ -4665,17 +4680,17 @@ interface RuleOptions {
4665
4680
  * Assertions should not be given twice the same argument
4666
4681
  * @see https://sonarsource.github.io/rspec/#/rspec/S5863/javascript
4667
4682
  */
4668
- 'sonar/no-same-argument-assert'?: Linter.RuleEntry<SonarNoSameArgumentAssert>;
4683
+ 'sonar/no-same-argument-assert'?: Linter.RuleEntry<[]>;
4669
4684
  /**
4670
4685
  * Conditionals should start on new lines
4671
4686
  * @see https://sonarsource.github.io/rspec/#/rspec/S3972/javascript
4672
4687
  */
4673
- 'sonar/no-same-line-conditional'?: Linter.RuleEntry<SonarNoSameLineConditional>;
4688
+ 'sonar/no-same-line-conditional'?: Linter.RuleEntry<[]>;
4674
4689
  /**
4675
4690
  * Methods should not contain selector parameters
4676
4691
  * @see https://sonarsource.github.io/rspec/#/rspec/S2301/javascript
4677
4692
  */
4678
- 'sonar/no-selector-parameter'?: Linter.RuleEntry<SonarNoSelectorParameter>;
4693
+ 'sonar/no-selector-parameter'?: Linter.RuleEntry<[]>;
4679
4694
  /**
4680
4695
  * Tests should not be skipped without providing a reason
4681
4696
  * @see https://sonarsource.github.io/rspec/#/rspec/S1607/javascript
@@ -4706,7 +4721,7 @@ interface RuleOptions {
4706
4721
  * Promise rejections should not be caught by "try" blocks
4707
4722
  * @see https://sonarsource.github.io/rspec/#/rspec/S4822/javascript
4708
4723
  */
4709
- 'sonar/no-try-promise'?: Linter.RuleEntry<SonarNoTryPromise>;
4724
+ 'sonar/no-try-promise'?: Linter.RuleEntry<[]>;
4710
4725
  /**
4711
4726
  * "undefined" should not be passed as the value of optional parameters
4712
4727
  * @see https://sonarsource.github.io/rspec/#/rspec/S4623/javascript
@@ -4781,7 +4796,7 @@ interface RuleOptions {
4781
4796
  * Variables declared with "var" should be declared before they are used
4782
4797
  * @see https://sonarsource.github.io/rspec/#/rspec/S1526/javascript
4783
4798
  */
4784
- 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<SonarNoVariableUsageBeforeDeclaration>;
4799
+ 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<[]>;
4785
4800
  /**
4786
4801
  * Disabling Vue.js built-in escaping is security-sensitive
4787
4802
  * @see https://sonarsource.github.io/rspec/#/rspec/S6299/javascript
@@ -4812,7 +4827,7 @@ interface RuleOptions {
4812
4827
  * Arithmetic operators should only have numbers as operands
4813
4828
  * @see https://sonarsource.github.io/rspec/#/rspec/S3760/javascript
4814
4829
  */
4815
- 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<SonarNonNumberInArithmeticExpression>;
4830
+ 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<[]>;
4816
4831
  /**
4817
4832
  * Properties of variables with "null" or "undefined" values should not be accessed
4818
4833
  * @see https://sonarsource.github.io/rspec/#/rspec/S2259/javascript
@@ -4939,7 +4954,7 @@ interface RuleOptions {
4939
4954
  * Shorthand object properties should be grouped at the beginning or end of an object declaration
4940
4955
  * @see https://sonarsource.github.io/rspec/#/rspec/S3499/javascript
4941
4956
  */
4942
- 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<SonarShorthandPropertyGrouping>;
4957
+ 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<[]>;
4943
4958
  /**
4944
4959
  * Character classes in regular expressions should not contain only one character
4945
4960
  * @see https://sonarsource.github.io/rspec/#/rspec/S6397/javascript
@@ -4981,17 +4996,17 @@ interface RuleOptions {
4981
4996
  * Regular expressions with the global flag should be used with caution
4982
4997
  * @see https://sonarsource.github.io/rspec/#/rspec/S6351/javascript
4983
4998
  */
4984
- 'sonar/stateful-regex'?: Linter.RuleEntry<SonarStatefulRegex>;
4999
+ 'sonar/stateful-regex'?: Linter.RuleEntry<[]>;
4985
5000
  /**
4986
5001
  * Disabling Strict-Transport-Security policy is security-sensitive
4987
5002
  * @see https://sonarsource.github.io/rspec/#/rspec/S5739/javascript
4988
5003
  */
4989
- 'sonar/strict-transport-security'?: Linter.RuleEntry<SonarStrictTransportSecurity>;
5004
+ 'sonar/strict-transport-security'?: Linter.RuleEntry<[]>;
4990
5005
  /**
4991
5006
  * Comparison operators should not be used with strings
4992
5007
  * @see https://sonarsource.github.io/rspec/#/rspec/S3003/javascript
4993
5008
  */
4994
- 'sonar/strings-comparison'?: Linter.RuleEntry<SonarStringsComparison>;
5009
+ 'sonar/strings-comparison'?: Linter.RuleEntry<[]>;
4995
5010
  /**
4996
5011
  * "super()" should be invoked appropriately
4997
5012
  * @see https://sonarsource.github.io/rspec/#/rspec/S3854/javascript
@@ -5021,12 +5036,12 @@ interface RuleOptions {
5021
5036
  * Loops should not contain more than a single "break" or "continue" statement
5022
5037
  * @see https://sonarsource.github.io/rspec/#/rspec/S135/javascript
5023
5038
  */
5024
- 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<SonarTooManyBreakOrContinueInLoop>;
5039
+ 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<[]>;
5025
5040
  /**
5026
5041
  * Regular expressions using Unicode character classes or property escapes should enable the unicode flag
5027
5042
  * @see https://sonarsource.github.io/rspec/#/rspec/S5867/javascript
5028
5043
  */
5029
- 'sonar/unicode-aware-regex'?: Linter.RuleEntry<SonarUnicodeAwareRegex>;
5044
+ 'sonar/unicode-aware-regex'?: Linter.RuleEntry<[]>;
5030
5045
  /**
5031
5046
  * Unnecessary imports should be removed
5032
5047
  * @see https://sonarsource.github.io/rspec/#/rspec/S1128/javascript
@@ -5036,32 +5051,33 @@ interface RuleOptions {
5036
5051
  * Names of regular expressions named groups should be used
5037
5052
  * @see https://sonarsource.github.io/rspec/#/rspec/S5860/javascript
5038
5053
  */
5039
- 'sonar/unused-named-groups'?: Linter.RuleEntry<SonarUnusedNamedGroups>;
5054
+ 'sonar/unused-named-groups'?: Linter.RuleEntry<[]>;
5040
5055
  /**
5041
5056
  * Server certificates should be verified during SSL/TLS connections
5042
5057
  * @see https://sonarsource.github.io/rspec/#/rspec/S4830/javascript
5043
5058
  */
5044
- 'sonar/unverified-certificate'?: Linter.RuleEntry<SonarUnverifiedCertificate>;
5059
+ 'sonar/unverified-certificate'?: Linter.RuleEntry<[]>;
5045
5060
  /**
5046
5061
  * Server hostnames should be verified during SSL/TLS connections
5047
5062
  * @see https://sonarsource.github.io/rspec/#/rspec/S5527/javascript
5048
5063
  */
5049
- 'sonar/unverified-hostname'?: Linter.RuleEntry<SonarUnverifiedHostname>;
5064
+ 'sonar/unverified-hostname'?: Linter.RuleEntry<[]>;
5050
5065
  /**
5051
5066
  * "const" variables should not be reassigned
5052
5067
  * @see https://sonarsource.github.io/rspec/#/rspec/S3500/javascript
5053
5068
  */
5054
- 'sonar/updated-const-var'?: Linter.RuleEntry<SonarUpdatedConstVar>;
5069
+ 'sonar/updated-const-var'?: Linter.RuleEntry<[]>;
5055
5070
  /**
5056
5071
  * Loop counters should not be assigned within the loop body
5057
5072
  * @see https://sonarsource.github.io/rspec/#/rspec/S2310/javascript
5073
+ * @deprecated
5058
5074
  */
5059
- 'sonar/updated-loop-counter'?: Linter.RuleEntry<SonarUpdatedLoopCounter>;
5075
+ 'sonar/updated-loop-counter'?: Linter.RuleEntry<[]>;
5060
5076
  /**
5061
5077
  * Type aliases should be used
5062
5078
  * @see https://sonarsource.github.io/rspec/#/rspec/S4323/javascript
5063
5079
  */
5064
- 'sonar/use-type-alias'?: Linter.RuleEntry<SonarUseTypeAlias>;
5080
+ 'sonar/use-type-alias'?: Linter.RuleEntry<[]>;
5065
5081
  /**
5066
5082
  * Results of operations on strings should not be ignored
5067
5083
  * @see https://sonarsource.github.io/rspec/#/rspec/S1154/javascript
@@ -5103,7 +5119,7 @@ interface RuleOptions {
5103
5119
  * XML parsers should not be vulnerable to XXE attacks
5104
5120
  * @see https://sonarsource.github.io/rspec/#/rspec/S2755/javascript
5105
5121
  */
5106
- 'sonar/xml-parser-xxe'?: Linter.RuleEntry<SonarXmlParserXxe>;
5122
+ 'sonar/xml-parser-xxe'?: Linter.RuleEntry<[]>;
5107
5123
  /**
5108
5124
  * Executing XPath expressions is security-sensitive
5109
5125
  * @see https://sonarsource.github.io/rspec/#/rspec/S4817/javascript
@@ -5663,6 +5679,11 @@ interface RuleOptions {
5663
5679
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/comment-directive/
5664
5680
  */
5665
5681
  'svelte/comment-directive'?: Linter.RuleEntry<SvelteCommentDirective>;
5682
+ /**
5683
+ * enforce a consistent style for CSS selectors
5684
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/consistent-selector-style/
5685
+ */
5686
+ 'svelte/consistent-selector-style'?: Linter.RuleEntry<SvelteConsistentSelectorStyle>;
5666
5687
  /**
5667
5688
  * derived store should use same variable names between values and callback
5668
5689
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/derived-has-same-inputs-outputs/
@@ -5723,6 +5744,11 @@ interface RuleOptions {
5723
5744
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/mustache-spacing/
5724
5745
  */
5725
5746
  'svelte/mustache-spacing'?: Linter.RuleEntry<SvelteMustacheSpacing>;
5747
+ /**
5748
+ * Warns against the use of `addEventListener`
5749
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-add-event-listener/
5750
+ */
5751
+ 'svelte/no-add-event-listener'?: Linter.RuleEntry<[]>;
5726
5752
  /**
5727
5753
  * disallow the use of `{@debug}`
5728
5754
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-at-debug-tags/
@@ -5761,6 +5787,7 @@ interface RuleOptions {
5761
5787
  /**
5762
5788
  * disallow dynamic slot name
5763
5789
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-dynamic-slot-name/
5790
+ * @deprecated
5764
5791
  */
5765
5792
  'svelte/no-dynamic-slot-name'?: Linter.RuleEntry<[]>;
5766
5793
  /**
@@ -5776,6 +5803,7 @@ interface RuleOptions {
5776
5803
  /**
5777
5804
  * disallow using goto() without the base path
5778
5805
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-goto-without-base/
5806
+ * @deprecated
5779
5807
  */
5780
5808
  'svelte/no-goto-without-base'?: Linter.RuleEntry<[]>;
5781
5809
  /**
@@ -5803,6 +5831,11 @@ interface RuleOptions {
5803
5831
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-inspect/
5804
5832
  */
5805
5833
  'svelte/no-inspect'?: Linter.RuleEntry<[]>;
5834
+ /**
5835
+ * disallow using navigation (links, goto, pushState, replaceState) without the base path
5836
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-navigation-without-base/
5837
+ */
5838
+ 'svelte/no-navigation-without-base'?: Linter.RuleEntry<SvelteNoNavigationWithoutBase>;
5806
5839
  /**
5807
5840
  * disallow use of not function in event handler
5808
5841
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-not-function-handler/
@@ -5813,6 +5846,11 @@ interface RuleOptions {
5813
5846
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-object-in-text-mustaches/
5814
5847
  */
5815
5848
  'svelte/no-object-in-text-mustaches'?: Linter.RuleEntry<[]>;
5849
+ /**
5850
+ * Checks for invalid raw HTML elements
5851
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-raw-special-elements/
5852
+ */
5853
+ 'svelte/no-raw-special-elements'?: Linter.RuleEntry<[]>;
5816
5854
  /**
5817
5855
  * it's not necessary to define functions in reactive statements
5818
5856
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-reactive-functions/
@@ -5858,6 +5896,11 @@ interface RuleOptions {
5858
5896
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-target-blank/
5859
5897
  */
5860
5898
  'svelte/no-target-blank'?: Linter.RuleEntry<SvelteNoTargetBlank>;
5899
+ /**
5900
+ * disallow using top-level browser global variables
5901
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-top-level-browser-globals/
5902
+ */
5903
+ 'svelte/no-top-level-browser-globals'?: Linter.RuleEntry<[]>;
5861
5904
  /**
5862
5905
  * disallow trailing whitespace at the end of lines
5863
5906
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-trailing-spaces/
@@ -5868,16 +5911,31 @@ interface RuleOptions {
5868
5911
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unknown-style-directive-property/
5869
5912
  */
5870
5913
  'svelte/no-unknown-style-directive-property'?: Linter.RuleEntry<SvelteNoUnknownStyleDirectiveProperty>;
5914
+ /**
5915
+ * Disallow unnecessary $state wrapping of reactive classes
5916
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unnecessary-state-wrap/
5917
+ */
5918
+ 'svelte/no-unnecessary-state-wrap'?: Linter.RuleEntry<SvelteNoUnnecessaryStateWrap>;
5871
5919
  /**
5872
5920
  * disallow the use of a class in the template without a corresponding style
5873
5921
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-class-name/
5874
5922
  */
5875
5923
  'svelte/no-unused-class-name'?: Linter.RuleEntry<SvelteNoUnusedClassName>;
5924
+ /**
5925
+ * Warns about defined Props properties that are unused
5926
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-props/
5927
+ */
5928
+ 'svelte/no-unused-props'?: Linter.RuleEntry<SvelteNoUnusedProps>;
5876
5929
  /**
5877
5930
  * disallow unused svelte-ignore comments
5878
5931
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-svelte-ignore/
5879
5932
  */
5880
5933
  'svelte/no-unused-svelte-ignore'?: Linter.RuleEntry<[]>;
5934
+ /**
5935
+ * disallow explicit children snippet where it's not needed
5936
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-children-snippet/
5937
+ */
5938
+ 'svelte/no-useless-children-snippet'?: Linter.RuleEntry<[]>;
5881
5939
  /**
5882
5940
  * disallow unnecessary mustache interpolations
5883
5941
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-mustaches/
@@ -5888,6 +5946,11 @@ interface RuleOptions {
5888
5946
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-class-directive/
5889
5947
  */
5890
5948
  'svelte/prefer-class-directive'?: Linter.RuleEntry<SveltePreferClassDirective>;
5949
+ /**
5950
+ * Require `const` declarations for variables that are never reassigned after declared
5951
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-const/
5952
+ */
5953
+ 'svelte/prefer-const'?: Linter.RuleEntry<SveltePreferConst>;
5891
5954
  /**
5892
5955
  * destructure values from object stores for better change tracking & fewer redraws
5893
5956
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-destructured-store-props/
@@ -5898,6 +5961,16 @@ interface RuleOptions {
5898
5961
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-style-directive/
5899
5962
  */
5900
5963
  'svelte/prefer-style-directive'?: Linter.RuleEntry<[]>;
5964
+ /**
5965
+ * disallow using mutable instances of built-in classes where a reactive alternative is provided by svelte/reactivity
5966
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-svelte-reactivity/
5967
+ */
5968
+ 'svelte/prefer-svelte-reactivity'?: Linter.RuleEntry<[]>;
5969
+ /**
5970
+ * Prefer using writable $derived instead of $state and $effect
5971
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-writable-derived/
5972
+ */
5973
+ 'svelte/prefer-writable-derived'?: Linter.RuleEntry<[]>;
5901
5974
  /**
5902
5975
  * require keyed `{#each}` block
5903
5976
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-each-key/
@@ -5908,6 +5981,11 @@ interface RuleOptions {
5908
5981
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-dispatcher-types/
5909
5982
  */
5910
5983
  'svelte/require-event-dispatcher-types'?: Linter.RuleEntry<[]>;
5984
+ /**
5985
+ * require component event names to start with "on"
5986
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-prefix/
5987
+ */
5988
+ 'svelte/require-event-prefix'?: Linter.RuleEntry<SvelteRequireEventPrefix>;
5911
5989
  /**
5912
5990
  * require style attributes that can be optimized
5913
5991
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-optimized-style-attribute/
@@ -5968,6 +6046,11 @@ interface RuleOptions {
5968
6046
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-prop-names-in-kit-pages/
5969
6047
  */
5970
6048
  'svelte/valid-prop-names-in-kit-pages'?: Linter.RuleEntry<[]>;
6049
+ /**
6050
+ * require valid style element parsing
6051
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-style-parse/
6052
+ */
6053
+ 'svelte/valid-style-parse'?: Linter.RuleEntry<[]>;
5971
6054
  /**
5972
6055
  * Enforce spacing around colons of switch statements
5973
6056
  * @see https://eslint.org/docs/latest/rules/switch-colon-spacing
@@ -6172,6 +6255,16 @@ interface RuleOptions {
6172
6255
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/padding-around-test-blocks.md
6173
6256
  */
6174
6257
  'test/padding-around-test-blocks'?: Linter.RuleEntry<[]>;
6258
+ /**
6259
+ * enforce using `toBeCalledOnce()` or `toHaveBeenCalledOnce()`
6260
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-once.md
6261
+ */
6262
+ 'test/prefer-called-once'?: Linter.RuleEntry<[]>;
6263
+ /**
6264
+ * enforce using `toBeCalledTimes(1)` or `toHaveBeenCalledTimes(1)`
6265
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-times.md
6266
+ */
6267
+ 'test/prefer-called-times'?: Linter.RuleEntry<[]>;
6175
6268
  /**
6176
6269
  * enforce using `toBeCalledWith()` or `toHaveBeenCalledWith()`
6177
6270
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-with.md
@@ -6337,6 +6430,11 @@ interface RuleOptions {
6337
6430
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/valid-title.md
6338
6431
  */
6339
6432
  'test/valid-title'?: Linter.RuleEntry<TestValidTitle>;
6433
+ /**
6434
+ * disallow `.todo` usage
6435
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/warn-todo.md
6436
+ */
6437
+ 'test/warn-todo'?: Linter.RuleEntry<[]>;
6340
6438
  /**
6341
6439
  * enforce linebreaks after opening and before closing array brackets
6342
6440
  * @see https://ota-meshi.github.io/eslint-plugin-toml/rules/array-bracket-newline.html
@@ -7817,7 +7915,7 @@ interface RuleOptions {
7817
7915
  * Order of UnoCSS utilities in class attribute
7818
7916
  * @see https://unocss.dev/integrations/eslint#rules
7819
7917
  */
7820
- 'unocss/order'?: Linter.RuleEntry<[]>;
7918
+ 'unocss/order'?: Linter.RuleEntry<UnocssOrder>;
7821
7919
  /**
7822
7920
  * Order of UnoCSS attributes
7823
7921
  * @see https://unocss.dev/integrations/eslint#rules
@@ -8383,6 +8481,16 @@ interface RuleOptions {
8383
8481
  * @see https://eslint.vuejs.org/rules/no-mutating-props.html
8384
8482
  */
8385
8483
  'vue/no-mutating-props'?: Linter.RuleEntry<VueNoMutatingProps>;
8484
+ /**
8485
+ * Disallow negated conditions in `<template>`
8486
+ * @see https://eslint.vuejs.org/rules/no-negated-condition.html
8487
+ */
8488
+ 'vue/no-negated-condition'?: Linter.RuleEntry<[]>;
8489
+ /**
8490
+ * disallow negated conditions in v-if/v-else
8491
+ * @see https://eslint.vuejs.org/rules/no-negated-v-if-condition.html
8492
+ */
8493
+ 'vue/no-negated-v-if-condition'?: Linter.RuleEntry<[]>;
8386
8494
  /**
8387
8495
  * disallow parsing errors in `<template>`
8388
8496
  * @see https://eslint.vuejs.org/rules/no-parsing-error.html
@@ -11116,10 +11224,17 @@ type NoRestrictedExports = [] | [({
11116
11224
  };
11117
11225
  })];
11118
11226
  // ----- no-restricted-globals -----
11119
- type NoRestrictedGlobals = (string | {
11227
+ type NoRestrictedGlobals = ((string | {
11120
11228
  name: string;
11121
11229
  message?: string;
11122
- })[];
11230
+ })[] | [] | [{
11231
+ globals: (string | {
11232
+ name: string;
11233
+ message?: string;
11234
+ })[];
11235
+ checkGlobalObject?: boolean;
11236
+ globalObjects?: string[];
11237
+ }]);
11123
11238
  // ----- no-restricted-imports -----
11124
11239
  type NoRestrictedImports = ((string | {
11125
11240
  name: string;
@@ -11614,6 +11729,8 @@ type OneVar = [] | [(("always" | "never" | "consecutive") | {
11614
11729
  var?: ("always" | "never" | "consecutive");
11615
11730
  let?: ("always" | "never" | "consecutive");
11616
11731
  const?: ("always" | "never" | "consecutive");
11732
+ using?: ("always" | "never" | "consecutive");
11733
+ awaitUsing?: ("always" | "never" | "consecutive");
11617
11734
  } | {
11618
11735
  initialized?: ("always" | "never" | "consecutive");
11619
11736
  uninitialized?: ("always" | "never" | "consecutive");
@@ -13652,35 +13769,11 @@ type SolidStyleProp = [] | [{
13652
13769
  styleProps?: [string, ...(string)[]];
13653
13770
  allowString?: boolean;
13654
13771
  }];
13655
- // ----- sonar/arguments-order -----
13656
- type SonarArgumentsOrder = [] | [("sonar-runtime" | "metric")];
13657
- // ----- sonar/arguments-usage -----
13658
- type SonarArgumentsUsage = [] | [("sonar-runtime" | "metric")];
13659
13772
  // ----- sonar/arrow-function-convention -----
13660
13773
  type SonarArrowFunctionConvention = [] | [{
13661
13774
  requireParameterParentheses?: boolean;
13662
13775
  requireBodyBraces?: boolean;
13663
13776
  }];
13664
- // ----- sonar/aws-iam-all-privileges -----
13665
- type SonarAwsIamAllPrivileges = [] | [("sonar-runtime" | "metric")];
13666
- // ----- sonar/aws-iam-all-resources-accessible -----
13667
- type SonarAwsIamAllResourcesAccessible = [] | [("sonar-runtime" | "metric")];
13668
- // ----- sonar/aws-iam-privilege-escalation -----
13669
- type SonarAwsIamPrivilegeEscalation = [] | [("sonar-runtime" | "metric")];
13670
- // ----- sonar/aws-iam-public-access -----
13671
- type SonarAwsIamPublicAccess = [] | [("sonar-runtime" | "metric")];
13672
- // ----- sonar/aws-s3-bucket-granted-access -----
13673
- type SonarAwsS3BucketGrantedAccess = [] | [("sonar-runtime" | "metric")];
13674
- // ----- sonar/aws-s3-bucket-public-access -----
13675
- type SonarAwsS3BucketPublicAccess = [] | [("sonar-runtime" | "metric")];
13676
- // ----- sonar/aws-s3-bucket-server-encryption -----
13677
- type SonarAwsS3BucketServerEncryption = [] | [("sonar-runtime" | "metric")];
13678
- // ----- sonar/aws-s3-bucket-versioning -----
13679
- type SonarAwsS3BucketVersioning = [] | [("sonar-runtime" | "metric")];
13680
- // ----- sonar/block-scoped-var -----
13681
- type SonarBlockScopedVar = [] | [("sonar-runtime" | "metric")];
13682
- // ----- sonar/certificate-transparency -----
13683
- type SonarCertificateTransparency = [] | [("sonar-runtime" | "metric")];
13684
13777
  // ----- sonar/class-name -----
13685
13778
  type SonarClassName = [] | [{
13686
13779
  format?: string;
@@ -13693,39 +13786,15 @@ type SonarCommentRegex = [] | [{
13693
13786
  message?: string;
13694
13787
  flags?: string;
13695
13788
  }];
13696
- // ----- sonar/conditional-indentation -----
13697
- type SonarConditionalIndentation = [] | [("sonar-runtime" | "metric")];
13698
- // ----- sonar/confidential-information-logging -----
13699
- type SonarConfidentialInformationLogging = [] | [("sonar-runtime" | "metric")];
13700
13789
  // ----- sonar/content-length -----
13701
13790
  type SonarContentLength = [] | [{
13702
13791
  fileUploadSizeLimit?: number;
13703
13792
  standardSizeLimit?: number;
13704
13793
  }];
13705
- // ----- sonar/content-security-policy -----
13706
- type SonarContentSecurityPolicy = [] | [("sonar-runtime" | "metric")];
13707
- // ----- sonar/cookie-no-httponly -----
13708
- type SonarCookieNoHttponly = [] | [("sonar-runtime" | "metric")];
13709
- // ----- sonar/cors -----
13710
- type SonarCors = [] | [("sonar-runtime" | "metric")];
13711
- // ----- sonar/csrf -----
13712
- type SonarCsrf = [] | [("sonar-runtime" | "metric")];
13713
13794
  // ----- sonar/cyclomatic-complexity -----
13714
13795
  type SonarCyclomaticComplexity = [] | [{
13715
13796
  threshold?: number;
13716
- }] | [{
13717
- threshold?: number;
13718
- }, ("sonar-runtime" | "metric")];
13719
- // ----- sonar/destructuring-assignment-syntax -----
13720
- type SonarDestructuringAssignmentSyntax = [] | [("sonar-runtime" | "metric")];
13721
- // ----- sonar/different-types-comparison -----
13722
- type SonarDifferentTypesComparison = [] | [("sonar-runtime" | "metric")];
13723
- // ----- sonar/disabled-auto-escaping -----
13724
- type SonarDisabledAutoEscaping = [] | [("sonar-runtime" | "metric")];
13725
- // ----- sonar/dns-prefetching -----
13726
- type SonarDnsPrefetching = [] | [("sonar-runtime" | "metric")];
13727
- // ----- sonar/duplicates-in-character-class -----
13728
- type SonarDuplicatesInCharacterClass = [] | [("sonar-runtime" | "metric")];
13797
+ }];
13729
13798
  // ----- sonar/enforce-trailing-comma -----
13730
13799
  type SonarEnforceTrailingComma = [] | [(_SonarEnforceTrailingCommaValue | {
13731
13800
  arrays?: _SonarEnforceTrailingCommaValueWithIgnore;
@@ -13739,38 +13808,16 @@ type _SonarEnforceTrailingCommaValueWithIgnore = ("always-multiline" | "always"
13739
13808
  // ----- sonar/expression-complexity -----
13740
13809
  type SonarExpressionComplexity = [] | [{
13741
13810
  max?: number;
13742
- }] | [{
13743
- max?: number;
13744
- }, ("sonar-runtime" | "metric")];
13811
+ }];
13745
13812
  // ----- sonar/file-header -----
13746
13813
  type SonarFileHeader = [] | [{
13747
13814
  headerFormat?: string;
13748
13815
  isRegularExpression?: boolean;
13749
13816
  }];
13750
- // ----- sonar/file-uploads -----
13751
- type SonarFileUploads = [] | [("sonar-runtime" | "metric")];
13752
- // ----- sonar/for-loop-increment-sign -----
13753
- type SonarForLoopIncrementSign = [] | [("sonar-runtime" | "metric")];
13754
- // ----- sonar/frame-ancestors -----
13755
- type SonarFrameAncestors = [] | [("sonar-runtime" | "metric")];
13756
- // ----- sonar/function-inside-loop -----
13757
- type SonarFunctionInsideLoop = [] | [("sonar-runtime" | "metric")];
13758
13817
  // ----- sonar/function-name -----
13759
13818
  type SonarFunctionName = [] | [{
13760
13819
  format?: string;
13761
13820
  }];
13762
- // ----- sonar/function-return-type -----
13763
- type SonarFunctionReturnType = [] | [("sonar-runtime" | "metric")];
13764
- // ----- sonar/in-operator-type-error -----
13765
- type SonarInOperatorTypeError = [] | [("sonar-runtime" | "metric")];
13766
- // ----- sonar/inconsistent-function-call -----
13767
- type SonarInconsistentFunctionCall = [] | [("sonar-runtime" | "metric")];
13768
- // ----- sonar/insecure-cookie -----
13769
- type SonarInsecureCookie = [] | [("sonar-runtime" | "metric")];
13770
- // ----- sonar/insecure-jwt-token -----
13771
- type SonarInsecureJwtToken = [] | [("sonar-runtime" | "metric")];
13772
- // ----- sonar/inverted-assertion-arguments -----
13773
- type SonarInvertedAssertionArguments = [] | [("sonar-runtime" | "metric")];
13774
13821
  // ----- sonar/max-lines -----
13775
13822
  type SonarMaxLines = [] | [{
13776
13823
  maximum?: number;
@@ -13788,37 +13835,16 @@ type SonarMaxUnionSize = [] | [{
13788
13835
  // ----- sonar/nested-control-flow -----
13789
13836
  type SonarNestedControlFlow = [] | [{
13790
13837
  maximumNestingLevel?: number;
13791
- }] | [{
13792
- maximumNestingLevel?: number;
13793
- }, ("sonar-runtime" | "metric")];
13838
+ }];
13794
13839
  // ----- sonar/new-operator-misuse -----
13795
13840
  type SonarNewOperatorMisuse = [] | [{
13796
13841
  considerJSDoc?: boolean;
13797
- }] | [{
13798
- considerJSDoc?: boolean;
13799
- }, unknown];
13800
- // ----- sonar/no-code-after-done -----
13801
- type SonarNoCodeAfterDone = [] | [("sonar-runtime" | "metric")];
13802
- // ----- sonar/no-collapsible-if -----
13803
- type SonarNoCollapsibleIf = [] | [("sonar-runtime" | "metric")];
13804
- // ----- sonar/no-duplicate-in-composite -----
13805
- type SonarNoDuplicateInComposite = [] | [("sonar-runtime" | "metric")];
13842
+ }];
13806
13843
  // ----- sonar/no-duplicate-string -----
13807
13844
  type SonarNoDuplicateString = [] | [{
13808
13845
  threshold?: number;
13809
13846
  ignoreStrings?: string;
13810
- }] | [{
13811
- threshold?: number;
13812
- ignoreStrings?: string;
13813
- }, ("sonar-runtime" | "metric")];
13814
- // ----- sonar/no-duplicated-branches -----
13815
- type SonarNoDuplicatedBranches = [] | [("sonar-runtime" | "metric")];
13816
- // ----- sonar/no-element-overwrite -----
13817
- type SonarNoElementOverwrite = [] | [("sonar-runtime" | "metric")];
13818
- // ----- sonar/no-extra-arguments -----
13819
- type SonarNoExtraArguments = [] | [("sonar-runtime" | "metric")];
13820
- // ----- sonar/no-gratuitous-expressions -----
13821
- type SonarNoGratuitousExpressions = [] | [("sonar-runtime" | "metric")];
13847
+ }];
13822
13848
  // ----- sonar/no-hardcoded-passwords -----
13823
13849
  type SonarNoHardcodedPasswords = [] | [{
13824
13850
  passwordWords?: string[];
@@ -13828,94 +13854,28 @@ type SonarNoHardcodedSecrets = [] | [{
13828
13854
  secretWords?: string;
13829
13855
  randomnessSensibility?: number;
13830
13856
  }];
13831
- // ----- sonar/no-identical-conditions -----
13832
- type SonarNoIdenticalConditions = [] | [("sonar-runtime" | "metric")];
13833
- // ----- sonar/no-identical-expressions -----
13834
- type SonarNoIdenticalExpressions = [] | [("sonar-runtime" | "metric")];
13835
13857
  // ----- sonar/no-identical-functions -----
13836
- type SonarNoIdenticalFunctions = [] | [number] | [number, ("sonar-runtime" | "metric")];
13858
+ type SonarNoIdenticalFunctions = [] | [number];
13837
13859
  // ----- sonar/no-implicit-dependencies -----
13838
13860
  type SonarNoImplicitDependencies = [] | [{
13839
13861
  whitelist?: string[];
13840
13862
  }];
13841
- // ----- sonar/no-inconsistent-returns -----
13842
- type SonarNoInconsistentReturns = [] | [("sonar-runtime" | "metric")];
13843
- // ----- sonar/no-incorrect-string-concat -----
13844
- type SonarNoIncorrectStringConcat = [] | [("sonar-runtime" | "metric")];
13845
13863
  // ----- sonar/no-intrusive-permissions -----
13846
13864
  type SonarNoIntrusivePermissions = [] | [{
13847
13865
  permissions?: string[];
13848
13866
  }];
13849
- // ----- sonar/no-invariant-returns -----
13850
- type SonarNoInvariantReturns = [] | [("sonar-runtime" | "metric")];
13851
- // ----- sonar/no-ip-forward -----
13852
- type SonarNoIpForward = [] | [("sonar-runtime" | "metric")];
13853
- // ----- sonar/no-mime-sniff -----
13854
- type SonarNoMimeSniff = [] | [("sonar-runtime" | "metric")];
13855
- // ----- sonar/no-mixed-content -----
13856
- type SonarNoMixedContent = [] | [("sonar-runtime" | "metric")];
13857
13867
  // ----- sonar/no-nested-functions -----
13858
13868
  type SonarNoNestedFunctions = [] | [{
13859
13869
  threshold?: number;
13860
- }] | [{
13861
- threshold?: number;
13862
- }, ("sonar-runtime" | "metric")];
13863
- // ----- sonar/no-redundant-optional -----
13864
- type SonarNoRedundantOptional = [] | [("sonar-runtime" | "metric")];
13865
- // ----- sonar/no-redundant-parentheses -----
13866
- type SonarNoRedundantParentheses = [] | [("sonar-runtime" | "metric")];
13867
- // ----- sonar/no-reference-error -----
13868
- type SonarNoReferenceError = [] | [("sonar-runtime" | "metric")];
13869
- // ----- sonar/no-referrer-policy -----
13870
- type SonarNoReferrerPolicy = [] | [("sonar-runtime" | "metric")];
13871
- // ----- sonar/no-same-argument-assert -----
13872
- type SonarNoSameArgumentAssert = [] | [("sonar-runtime" | "metric")];
13873
- // ----- sonar/no-same-line-conditional -----
13874
- type SonarNoSameLineConditional = [] | [("sonar-runtime" | "metric")];
13875
- // ----- sonar/no-selector-parameter -----
13876
- type SonarNoSelectorParameter = [] | [("sonar-runtime" | "metric")];
13877
- // ----- sonar/no-try-promise -----
13878
- type SonarNoTryPromise = [] | [("sonar-runtime" | "metric")];
13879
- // ----- sonar/no-variable-usage-before-declaration -----
13880
- type SonarNoVariableUsageBeforeDeclaration = [] | [("sonar-runtime" | "metric")];
13881
- // ----- sonar/non-number-in-arithmetic-expression -----
13882
- type SonarNonNumberInArithmeticExpression = [] | [("sonar-runtime" | "metric")];
13870
+ }];
13883
13871
  // ----- sonar/regex-complexity -----
13884
13872
  type SonarRegexComplexity = [] | [{
13885
13873
  threshold?: number;
13886
- }] | [{
13887
- threshold?: number;
13888
- }, ("sonar-runtime" | "metric")];
13889
- // ----- sonar/shorthand-property-grouping -----
13890
- type SonarShorthandPropertyGrouping = [] | [("sonar-runtime" | "metric")];
13891
- // ----- sonar/stateful-regex -----
13892
- type SonarStatefulRegex = [] | [("sonar-runtime" | "metric")];
13893
- // ----- sonar/strict-transport-security -----
13894
- type SonarStrictTransportSecurity = [] | [("sonar-runtime" | "metric")];
13895
- // ----- sonar/strings-comparison -----
13896
- type SonarStringsComparison = [] | [("sonar-runtime" | "metric")];
13897
- // ----- sonar/too-many-break-or-continue-in-loop -----
13898
- type SonarTooManyBreakOrContinueInLoop = [] | [("sonar-runtime" | "metric")];
13899
- // ----- sonar/unicode-aware-regex -----
13900
- type SonarUnicodeAwareRegex = [] | [("sonar-runtime" | "metric")];
13901
- // ----- sonar/unused-named-groups -----
13902
- type SonarUnusedNamedGroups = [] | [("sonar-runtime" | "metric")];
13903
- // ----- sonar/unverified-certificate -----
13904
- type SonarUnverifiedCertificate = [] | [("sonar-runtime" | "metric")];
13905
- // ----- sonar/unverified-hostname -----
13906
- type SonarUnverifiedHostname = [] | [("sonar-runtime" | "metric")];
13907
- // ----- sonar/updated-const-var -----
13908
- type SonarUpdatedConstVar = [] | [("sonar-runtime" | "metric")];
13909
- // ----- sonar/updated-loop-counter -----
13910
- type SonarUpdatedLoopCounter = [] | [("sonar-runtime" | "metric")];
13911
- // ----- sonar/use-type-alias -----
13912
- type SonarUseTypeAlias = [] | [("sonar-runtime" | "metric")];
13874
+ }];
13913
13875
  // ----- sonar/variable-name -----
13914
13876
  type SonarVariableName = [] | [{
13915
13877
  format?: string;
13916
13878
  }];
13917
- // ----- sonar/xml-parser-xxe -----
13918
- type SonarXmlParserXxe = [] | [("sonar-runtime" | "metric")];
13919
13879
  // ----- sort-imports -----
13920
13880
  type SortImports = [] | [{
13921
13881
  ignoreCase?: boolean;
@@ -15169,6 +15129,11 @@ type SvelteButtonHasType = [] | [{
15169
15129
  type SvelteCommentDirective = [] | [{
15170
15130
  reportUnusedDisableDirectives?: boolean;
15171
15131
  }];
15132
+ // ----- svelte/consistent-selector-style -----
15133
+ type SvelteConsistentSelectorStyle = [] | [{
15134
+ checkGlobal?: boolean;
15135
+ style?: [] | [("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type"), ("class" | "id" | "type")];
15136
+ }];
15172
15137
  // ----- svelte/first-attribute-linebreak -----
15173
15138
  type SvelteFirstAttributeLinebreak = [] | [{
15174
15139
  multiline?: ("below" | "beside");
@@ -15201,7 +15166,8 @@ type SvelteHtmlQuotes = [] | [{
15201
15166
  type SvelteHtmlSelfClosing = [] | [({
15202
15167
  void?: ("never" | "always" | "ignore");
15203
15168
  normal?: ("never" | "always" | "ignore");
15204
- foreign?: ("never" | "always" | "ignore");
15169
+ svg?: ("never" | "always" | "ignore");
15170
+ math?: ("never" | "always" | "ignore");
15205
15171
  component?: ("never" | "always" | "ignore");
15206
15172
  svelte?: ("never" | "always" | "ignore");
15207
15173
  } | ("all" | "html" | "none"))];
@@ -15240,6 +15206,13 @@ type SvelteNoInlineStyles = [] | [{
15240
15206
  type SvelteNoInnerDeclarations = [] | [("functions" | "both")] | [("functions" | "both"), {
15241
15207
  blockScopedFunctions?: ("allow" | "disallow");
15242
15208
  }];
15209
+ // ----- svelte/no-navigation-without-base -----
15210
+ type SvelteNoNavigationWithoutBase = [] | [{
15211
+ ignoreGoto?: boolean;
15212
+ ignoreLinks?: boolean;
15213
+ ignorePushState?: boolean;
15214
+ ignoreReplaceState?: boolean;
15215
+ }];
15243
15216
  // ----- svelte/no-reactive-reassign -----
15244
15217
  type SvelteNoReactiveReassign = [] | [{
15245
15218
  props?: boolean;
@@ -15267,10 +15240,22 @@ type SvelteNoUnknownStyleDirectiveProperty = [] | [{
15267
15240
  ignoreProperties?: [string, ...(string)[]];
15268
15241
  ignorePrefixed?: boolean;
15269
15242
  }];
15243
+ // ----- svelte/no-unnecessary-state-wrap -----
15244
+ type SvelteNoUnnecessaryStateWrap = [] | [{
15245
+ additionalReactiveClasses?: string[];
15246
+ allowReassign?: boolean;
15247
+ }];
15270
15248
  // ----- svelte/no-unused-class-name -----
15271
15249
  type SvelteNoUnusedClassName = [] | [{
15272
15250
  allowedClassNames?: string[];
15273
15251
  }];
15252
+ // ----- svelte/no-unused-props -----
15253
+ type SvelteNoUnusedProps = [] | [{
15254
+ checkImportedTypes?: boolean;
15255
+ ignoreTypePatterns?: string[];
15256
+ ignorePropertyPatterns?: string[];
15257
+ allowUnusedNestedProperties?: boolean;
15258
+ }];
15274
15259
  // ----- svelte/no-useless-mustaches -----
15275
15260
  type SvelteNoUselessMustaches = [] | [{
15276
15261
  ignoreIncludesComment?: boolean;
@@ -15280,6 +15265,17 @@ type SvelteNoUselessMustaches = [] | [{
15280
15265
  type SveltePreferClassDirective = [] | [{
15281
15266
  prefer?: ("always" | "empty");
15282
15267
  }];
15268
+ // ----- svelte/prefer-const -----
15269
+ type SveltePreferConst = [] | [{
15270
+ destructuring?: ("any" | "all");
15271
+ ignoreReadBeforeAssign?: boolean;
15272
+ excludedRunes?: string[];
15273
+ [k: string]: unknown | undefined;
15274
+ }];
15275
+ // ----- svelte/require-event-prefix -----
15276
+ type SvelteRequireEventPrefix = [] | [{
15277
+ checkAsyncFunctions?: boolean;
15278
+ }];
15283
15279
  // ----- svelte/shorthand-attribute -----
15284
15280
  type SvelteShorthandAttribute = [] | [{
15285
15281
  prefer?: ("always" | "never");
@@ -16705,6 +16701,12 @@ type UnocssEnforceClassCompile = [] | [{
16705
16701
  prefix?: string;
16706
16702
  enableFix?: boolean;
16707
16703
  }];
16704
+ // ----- unocss/order -----
16705
+ type UnocssOrder = [] | [{
16706
+ unoFunctions?: string[];
16707
+ unoVariables?: string[];
16708
+ [k: string]: unknown | undefined;
16709
+ }];
16708
16710
  // ----- unused-imports/no-unused-imports -----
16709
16711
  type UnusedImportsNoUnusedImports = [] | [(("all" | "local") | {
16710
16712
  args?: ("all" | "after-used" | "none");
@@ -17457,6 +17459,7 @@ type VueNoDeprecatedRouterLinkTagProp = [] | [{
17457
17459
  // ----- vue/no-deprecated-slot-attribute -----
17458
17460
  type VueNoDeprecatedSlotAttribute = [] | [{
17459
17461
  ignore?: string[];
17462
+ ignoreParents?: string[];
17460
17463
  }];
17461
17464
  // ----- vue/no-dupe-keys -----
17462
17465
  type VueNoDupeKeys = [] | [{
package/dist/index.js CHANGED
@@ -15,7 +15,7 @@ import globals from "globals";
15
15
  import { mergeProcessors, processorPassThrough } from "eslint-merge-processors";
16
16
  import { configs } from "eslint-plugin-regexp";
17
17
 
18
- //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.5.0/node_modules/@vinicunca/perkakas/dist/chunk-6AFNPQW2.js
18
+ //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-6AFNPQW2.js
19
19
  function r(o) {
20
20
  if (typeof o != "object" || o === null) return !1;
21
21
  let e$2 = Object.getPrototypeOf(o);
@@ -23,13 +23,13 @@ function r(o) {
23
23
  }
24
24
 
25
25
  //#endregion
26
- //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.5.0/node_modules/@vinicunca/perkakas/dist/chunk-Q2HW4RVT.js
26
+ //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-Q2HW4RVT.js
27
27
  function e$1(r$1) {
28
28
  return typeof r$1 == "number" && !Number.isNaN(r$1);
29
29
  }
30
30
 
31
31
  //#endregion
32
- //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.5.0/node_modules/@vinicunca/perkakas/dist/chunk-AZUJCNUP.js
32
+ //#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-AZUJCNUP.js
33
33
  function e(o) {
34
34
  return typeof o == "boolean";
35
35
  }
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@vinicunca/eslint-config",
3
3
  "type": "module",
4
- "version": "3.20.0",
4
+ "version": "3.21.1",
5
5
  "description": "Vinicunca ESLint config",
6
6
  "author": {
7
7
  "name": "praburangki",
@@ -113,37 +113,37 @@
113
113
  "@clack/prompts": "^0.11.0",
114
114
  "@eslint-community/eslint-plugin-eslint-comments": "^4.5.0",
115
115
  "@eslint/markdown": "^7.1.0",
116
- "@stylistic/eslint-plugin": "^5.2.2",
117
- "@typescript-eslint/eslint-plugin": "^8.38.0",
118
- "@typescript-eslint/parser": "^8.38.0",
119
- "@unocss/eslint-plugin": "^66.3.3",
120
- "@vitest/eslint-plugin": "^1.2.7",
116
+ "@stylistic/eslint-plugin": "^5.2.3",
117
+ "@typescript-eslint/eslint-plugin": "^8.39.0",
118
+ "@typescript-eslint/parser": "^8.39.0",
119
+ "@unocss/eslint-plugin": "^66.4.2",
120
+ "@vitest/eslint-plugin": "^1.3.4",
121
121
  "eslint-config-flat-gitignore": "^2.1.0",
122
122
  "eslint-flat-config-utils": "^2.1.1",
123
123
  "eslint-merge-processors": "^2.0.0",
124
124
  "eslint-plugin-antfu": "^3.1.1",
125
- "eslint-plugin-command": "^3.2.1",
125
+ "eslint-plugin-command": "^3.3.1",
126
126
  "eslint-plugin-format": "^1.0.1",
127
127
  "eslint-plugin-import-lite": "^0.3.0",
128
- "eslint-plugin-jsdoc": "^52.0.0",
128
+ "eslint-plugin-jsdoc": "^53.0.1",
129
129
  "eslint-plugin-jsonc": "^2.20.1",
130
130
  "eslint-plugin-n": "^17.21.3",
131
131
  "eslint-plugin-no-only-tests": "^3.3.0",
132
132
  "eslint-plugin-perfectionist": "^4.15.0",
133
133
  "eslint-plugin-pnpm": "^1.1.0",
134
- "eslint-plugin-regexp": "^2.9.0",
134
+ "eslint-plugin-regexp": "^2.10.0",
135
135
  "eslint-plugin-sonarjs": "^3.0.2",
136
136
  "eslint-plugin-toml": "^0.12.0",
137
137
  "eslint-plugin-unicorn": "^60.0.0",
138
138
  "eslint-plugin-unused-imports": "^4.1.4",
139
- "eslint-plugin-vue": "^10.3.0",
139
+ "eslint-plugin-vue": "^10.4.0",
140
140
  "eslint-plugin-yml": "^1.18.0",
141
141
  "eslint-processor-vue-blocks": "^2.0.0",
142
- "globals": "^16.2.0",
142
+ "globals": "^16.3.0",
143
143
  "jsonc-eslint-parser": "^2.4.0",
144
144
  "local-pkg": "^1.1.1",
145
145
  "toml-eslint-parser": "^0.10.0",
146
- "vue-eslint-parser": "^10.1.3",
146
+ "vue-eslint-parser": "^10.2.0",
147
147
  "yaml-eslint-parser": "^1.3.0"
148
148
  },
149
149
  "scripts": {