@vinicunca/eslint-config 3.21.0 → 3.21.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.d.ts +233 -247
- package/dist/index.js +3 -3
- package/package.json +9 -9
package/dist/index.d.ts
CHANGED
|
@@ -2918,11 +2918,21 @@ interface RuleOptions {
|
|
|
2918
2918
|
* @see https://eslint-react.xyz/docs/rules/no-useless-forward-ref
|
|
2919
2919
|
*/
|
|
2920
2920
|
'react/ensure-forward-ref-using-ref'?: Linter.RuleEntry<[]>;
|
|
2921
|
+
/**
|
|
2922
|
+
* Enforces that the 'key' attribute is placed before the spread attribute in JSX elements.
|
|
2923
|
+
* @see https://eslint-react.xyz/docs/rules/jsx-key-before-spread
|
|
2924
|
+
*/
|
|
2925
|
+
'react/jsx-key-before-spread'?: Linter.RuleEntry<[]>;
|
|
2921
2926
|
/**
|
|
2922
2927
|
* Disallow duplicate props in JSX elements.
|
|
2923
2928
|
* @see https://eslint-react.xyz/docs/rules/jsx-no-duplicate-props
|
|
2924
2929
|
*/
|
|
2925
2930
|
'react/jsx-no-duplicate-props'?: Linter.RuleEntry<[]>;
|
|
2931
|
+
/**
|
|
2932
|
+
* Disallows 'IIFE' in JSX elements.
|
|
2933
|
+
* @see https://eslint-react.xyz/docs/rules/jsx-no-iife
|
|
2934
|
+
*/
|
|
2935
|
+
'react/jsx-no-iife'?: Linter.RuleEntry<[]>;
|
|
2926
2936
|
/**
|
|
2927
2937
|
* Disallow undefined variables in JSX.
|
|
2928
2938
|
* @see https://eslint-react.xyz/docs/rules/jsx-no-undef
|
|
@@ -2979,7 +2989,7 @@ interface RuleOptions {
|
|
|
2979
2989
|
*/
|
|
2980
2990
|
'react/no-children-to-array'?: Linter.RuleEntry<[]>;
|
|
2981
2991
|
/**
|
|
2982
|
-
* Disallow class components.
|
|
2992
|
+
* Disallow class components except for error boundaries.
|
|
2983
2993
|
* @see https://eslint-react.xyz/docs/rules/no-class-component
|
|
2984
2994
|
*/
|
|
2985
2995
|
'react/no-class-component'?: Linter.RuleEntry<[]>;
|
|
@@ -3078,6 +3088,11 @@ interface RuleOptions {
|
|
|
3078
3088
|
* @see https://eslint-react.xyz/docs/rules/no-missing-key
|
|
3079
3089
|
*/
|
|
3080
3090
|
'react/no-missing-key'?: Linter.RuleEntry<[]>;
|
|
3091
|
+
/**
|
|
3092
|
+
* Prevents incorrect usage of `captureOwnerStack`.
|
|
3093
|
+
* @see https://eslint-react.xyz/docs/rules/no-misused-capture-owner-stack
|
|
3094
|
+
*/
|
|
3095
|
+
'react/no-misused-capture-owner-stack'?: Linter.RuleEntry<[]>;
|
|
3081
3096
|
/**
|
|
3082
3097
|
* Disallow nesting component definitions inside other components.
|
|
3083
3098
|
* @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
|
|
@@ -3088,6 +3103,11 @@ interface RuleOptions {
|
|
|
3088
3103
|
* @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
|
|
3089
3104
|
*/
|
|
3090
3105
|
'react/no-nested-components'?: Linter.RuleEntry<[]>;
|
|
3106
|
+
/**
|
|
3107
|
+
* Disallow nesting lazy component declarations inside other components.
|
|
3108
|
+
* @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
|
|
3109
|
+
*/
|
|
3110
|
+
'react/no-nested-lazy-component-declarations'?: Linter.RuleEntry<[]>;
|
|
3091
3111
|
/**
|
|
3092
3112
|
* Disallow `propTypes` in favor of TypeScript or another type-checking solution.
|
|
3093
3113
|
* @see https://eslint-react.xyz/docs/rules/no-prop-types
|
|
@@ -3104,7 +3124,7 @@ interface RuleOptions {
|
|
|
3104
3124
|
*/
|
|
3105
3125
|
'react/no-set-state-in-component-did-mount'?: Linter.RuleEntry<[]>;
|
|
3106
3126
|
/**
|
|
3107
|
-
*
|
|
3127
|
+
* Disallow calling `this.setState` in `componentDidUpdate` outside of functions, such as callbacks.
|
|
3108
3128
|
* @see https://eslint-react.xyz/docs/rules/no-set-state-in-component-did-update
|
|
3109
3129
|
*/
|
|
3110
3130
|
'react/no-set-state-in-component-did-update'?: Linter.RuleEntry<[]>;
|
|
@@ -3114,7 +3134,7 @@ interface RuleOptions {
|
|
|
3114
3134
|
*/
|
|
3115
3135
|
'react/no-set-state-in-component-will-update'?: Linter.RuleEntry<[]>;
|
|
3116
3136
|
/**
|
|
3117
|
-
*
|
|
3137
|
+
* Replaces string refs with callback refs.
|
|
3118
3138
|
* @see https://eslint-react.xyz/docs/rules/no-string-refs
|
|
3119
3139
|
*/
|
|
3120
3140
|
'react/no-string-refs'?: Linter.RuleEntry<[]>;
|
|
@@ -3767,12 +3787,12 @@ interface RuleOptions {
|
|
|
3767
3787
|
* Parameters should be passed in the correct order
|
|
3768
3788
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2234/javascript
|
|
3769
3789
|
*/
|
|
3770
|
-
'sonar/arguments-order'?: Linter.RuleEntry<
|
|
3790
|
+
'sonar/arguments-order'?: Linter.RuleEntry<[]>;
|
|
3771
3791
|
/**
|
|
3772
3792
|
* "arguments" should not be accessed directly
|
|
3773
3793
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3513/javascript
|
|
3774
3794
|
*/
|
|
3775
|
-
'sonar/arguments-usage'?: Linter.RuleEntry<
|
|
3795
|
+
'sonar/arguments-usage'?: Linter.RuleEntry<[]>;
|
|
3776
3796
|
/**
|
|
3777
3797
|
* Callbacks of array methods should have return statements
|
|
3778
3798
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3796/javascript
|
|
@@ -3817,22 +3837,22 @@ interface RuleOptions {
|
|
|
3817
3837
|
* Policies granting all privileges are security-sensitive
|
|
3818
3838
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6302/javascript
|
|
3819
3839
|
*/
|
|
3820
|
-
'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<
|
|
3840
|
+
'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<[]>;
|
|
3821
3841
|
/**
|
|
3822
3842
|
* Policies granting access to all resources of an account are security-sensitive
|
|
3823
3843
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6304/javascript
|
|
3824
3844
|
*/
|
|
3825
|
-
'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<
|
|
3845
|
+
'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<[]>;
|
|
3826
3846
|
/**
|
|
3827
3847
|
* AWS IAM policies should limit the scope of permissions given
|
|
3828
3848
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6317/javascript
|
|
3829
3849
|
*/
|
|
3830
|
-
'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<
|
|
3850
|
+
'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<[]>;
|
|
3831
3851
|
/**
|
|
3832
3852
|
* Policies authorizing public access to resources are security-sensitive
|
|
3833
3853
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6270/javascript
|
|
3834
3854
|
*/
|
|
3835
|
-
'sonar/aws-iam-public-access'?: Linter.RuleEntry<
|
|
3855
|
+
'sonar/aws-iam-public-access'?: Linter.RuleEntry<[]>;
|
|
3836
3856
|
/**
|
|
3837
3857
|
* Using unencrypted Elasticsearch domains is security-sensitive
|
|
3838
3858
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6308/javascript
|
|
@@ -3852,7 +3872,7 @@ interface RuleOptions {
|
|
|
3852
3872
|
* Granting access to S3 buckets to all or authenticated users is security-sensitive
|
|
3853
3873
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6265/javascript
|
|
3854
3874
|
*/
|
|
3855
|
-
'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<
|
|
3875
|
+
'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<[]>;
|
|
3856
3876
|
/**
|
|
3857
3877
|
* Authorizing HTTP communications with S3 buckets is security-sensitive
|
|
3858
3878
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6249/javascript
|
|
@@ -3862,18 +3882,18 @@ interface RuleOptions {
|
|
|
3862
3882
|
* Allowing public ACLs or policies on a S3 bucket is security-sensitive
|
|
3863
3883
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6281/javascript
|
|
3864
3884
|
*/
|
|
3865
|
-
'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<
|
|
3885
|
+
'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<[]>;
|
|
3866
3886
|
/**
|
|
3867
3887
|
* Disabling server-side encryption of S3 buckets is security-sensitive
|
|
3868
3888
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6245/javascript
|
|
3869
3889
|
* @deprecated
|
|
3870
3890
|
*/
|
|
3871
|
-
'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<
|
|
3891
|
+
'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<[]>;
|
|
3872
3892
|
/**
|
|
3873
3893
|
* Disabling versioning of S3 buckets is security-sensitive
|
|
3874
3894
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6252/javascript
|
|
3875
3895
|
*/
|
|
3876
|
-
'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<
|
|
3896
|
+
'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<[]>;
|
|
3877
3897
|
/**
|
|
3878
3898
|
* Using unencrypted SageMaker notebook instances is security-sensitive
|
|
3879
3899
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6319/javascript
|
|
@@ -3898,7 +3918,7 @@ interface RuleOptions {
|
|
|
3898
3918
|
* Variables should be used in the blocks where they are declared
|
|
3899
3919
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2392/javascript
|
|
3900
3920
|
*/
|
|
3901
|
-
'sonar/block-scoped-var'?: Linter.RuleEntry<
|
|
3921
|
+
'sonar/block-scoped-var'?: Linter.RuleEntry<[]>;
|
|
3902
3922
|
/**
|
|
3903
3923
|
* Optional boolean parameters should have default value
|
|
3904
3924
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4798/javascript
|
|
@@ -3914,7 +3934,7 @@ interface RuleOptions {
|
|
|
3914
3934
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5742/javascript
|
|
3915
3935
|
* @deprecated
|
|
3916
3936
|
*/
|
|
3917
|
-
'sonar/certificate-transparency'?: Linter.RuleEntry<
|
|
3937
|
+
'sonar/certificate-transparency'?: Linter.RuleEntry<[]>;
|
|
3918
3938
|
/**
|
|
3919
3939
|
* Chai assertions should have only one reason to succeed
|
|
3920
3940
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6092/javascript
|
|
@@ -3960,12 +3980,12 @@ interface RuleOptions {
|
|
|
3960
3980
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3973/javascript
|
|
3961
3981
|
* @deprecated
|
|
3962
3982
|
*/
|
|
3963
|
-
'sonar/conditional-indentation'?: Linter.RuleEntry<
|
|
3983
|
+
'sonar/conditional-indentation'?: Linter.RuleEntry<[]>;
|
|
3964
3984
|
/**
|
|
3965
3985
|
* Allowing confidential information to be logged is security-sensitive
|
|
3966
3986
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5757/javascript
|
|
3967
3987
|
*/
|
|
3968
|
-
'sonar/confidential-information-logging'?: Linter.RuleEntry<
|
|
3988
|
+
'sonar/confidential-information-logging'?: Linter.RuleEntry<[]>;
|
|
3969
3989
|
/**
|
|
3970
3990
|
* Objects should not be created to be dropped immediately without being used
|
|
3971
3991
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1848/javascript
|
|
@@ -3980,12 +4000,12 @@ interface RuleOptions {
|
|
|
3980
4000
|
* Disabling content security policy fetch directives is security-sensitive
|
|
3981
4001
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5728/javascript
|
|
3982
4002
|
*/
|
|
3983
|
-
'sonar/content-security-policy'?: Linter.RuleEntry<
|
|
4003
|
+
'sonar/content-security-policy'?: Linter.RuleEntry<[]>;
|
|
3984
4004
|
/**
|
|
3985
4005
|
* Creating cookies without the "HttpOnly" flag is security-sensitive
|
|
3986
4006
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3330/javascript
|
|
3987
4007
|
*/
|
|
3988
|
-
'sonar/cookie-no-httponly'?: Linter.RuleEntry<
|
|
4008
|
+
'sonar/cookie-no-httponly'?: Linter.RuleEntry<[]>;
|
|
3989
4009
|
/**
|
|
3990
4010
|
* Writing cookies is security-sensitive
|
|
3991
4011
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2255/javascript
|
|
@@ -3996,12 +4016,12 @@ interface RuleOptions {
|
|
|
3996
4016
|
* Having a permissive Cross-Origin Resource Sharing policy is security-sensitive
|
|
3997
4017
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5122/javascript
|
|
3998
4018
|
*/
|
|
3999
|
-
'sonar/cors'?: Linter.RuleEntry<
|
|
4019
|
+
'sonar/cors'?: Linter.RuleEntry<[]>;
|
|
4000
4020
|
/**
|
|
4001
4021
|
* Disabling CSRF protections is security-sensitive
|
|
4002
4022
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4502/javascript
|
|
4003
4023
|
*/
|
|
4004
|
-
'sonar/csrf'?: Linter.RuleEntry<
|
|
4024
|
+
'sonar/csrf'?: Linter.RuleEntry<[]>;
|
|
4005
4025
|
/**
|
|
4006
4026
|
* Cyclomatic Complexity of functions should not be too high
|
|
4007
4027
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1541/javascript
|
|
@@ -4021,17 +4041,17 @@ interface RuleOptions {
|
|
|
4021
4041
|
* Destructuring syntax should be used for assignments
|
|
4022
4042
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3514/javascript
|
|
4023
4043
|
*/
|
|
4024
|
-
'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<
|
|
4044
|
+
'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<[]>;
|
|
4025
4045
|
/**
|
|
4026
4046
|
* Strict equality operators should not be used with dissimilar types
|
|
4027
4047
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3403/javascript
|
|
4028
4048
|
*/
|
|
4029
|
-
'sonar/different-types-comparison'?: Linter.RuleEntry<
|
|
4049
|
+
'sonar/different-types-comparison'?: Linter.RuleEntry<[]>;
|
|
4030
4050
|
/**
|
|
4031
4051
|
* Disabling auto-escaping in template engines is security-sensitive
|
|
4032
4052
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5247/javascript
|
|
4033
4053
|
*/
|
|
4034
|
-
'sonar/disabled-auto-escaping'?: Linter.RuleEntry<
|
|
4054
|
+
'sonar/disabled-auto-escaping'?: Linter.RuleEntry<[]>;
|
|
4035
4055
|
/**
|
|
4036
4056
|
* Using remote artifacts without integrity checks is security-sensitive
|
|
4037
4057
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5725/javascript
|
|
@@ -4047,12 +4067,12 @@ interface RuleOptions {
|
|
|
4047
4067
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5743/javascript
|
|
4048
4068
|
* @deprecated
|
|
4049
4069
|
*/
|
|
4050
|
-
'sonar/dns-prefetching'?: Linter.RuleEntry<
|
|
4070
|
+
'sonar/dns-prefetching'?: Linter.RuleEntry<[]>;
|
|
4051
4071
|
/**
|
|
4052
4072
|
* Character classes in regular expressions should not contain the same character twice
|
|
4053
4073
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5869/javascript
|
|
4054
4074
|
*/
|
|
4055
|
-
'sonar/duplicates-in-character-class'?: Linter.RuleEntry<
|
|
4075
|
+
'sonar/duplicates-in-character-class'?: Linter.RuleEntry<[]>;
|
|
4056
4076
|
/**
|
|
4057
4077
|
* "if ... else if" constructs should end with "else" clauses
|
|
4058
4078
|
* @see https://sonarsource.github.io/rspec/#/rspec/S126/javascript
|
|
@@ -4109,7 +4129,7 @@ interface RuleOptions {
|
|
|
4109
4129
|
* File uploads should be restricted
|
|
4110
4130
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2598/javascript
|
|
4111
4131
|
*/
|
|
4112
|
-
'sonar/file-uploads'?: Linter.RuleEntry<
|
|
4132
|
+
'sonar/file-uploads'?: Linter.RuleEntry<[]>;
|
|
4113
4133
|
/**
|
|
4114
4134
|
* Track uses of "FIXME" tags
|
|
4115
4135
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1134/javascript
|
|
@@ -4124,17 +4144,17 @@ interface RuleOptions {
|
|
|
4124
4144
|
* A "for" loop update clause should move the counter in the right direction
|
|
4125
4145
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2251/javascript
|
|
4126
4146
|
*/
|
|
4127
|
-
'sonar/for-loop-increment-sign'?: Linter.RuleEntry<
|
|
4147
|
+
'sonar/for-loop-increment-sign'?: Linter.RuleEntry<[]>;
|
|
4128
4148
|
/**
|
|
4129
4149
|
* Disabling content security policy frame-ancestors directive is security-sensitive
|
|
4130
4150
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5732/javascript
|
|
4131
4151
|
*/
|
|
4132
|
-
'sonar/frame-ancestors'?: Linter.RuleEntry<
|
|
4152
|
+
'sonar/frame-ancestors'?: Linter.RuleEntry<[]>;
|
|
4133
4153
|
/**
|
|
4134
4154
|
* Functions should not be defined inside loops
|
|
4135
4155
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1515/javascript
|
|
4136
4156
|
*/
|
|
4137
|
-
'sonar/function-inside-loop'?: Linter.RuleEntry<
|
|
4157
|
+
'sonar/function-inside-loop'?: Linter.RuleEntry<[]>;
|
|
4138
4158
|
/**
|
|
4139
4159
|
* Function and method names should comply with a naming convention
|
|
4140
4160
|
* @see https://sonarsource.github.io/rspec/#/rspec/S100/javascript
|
|
@@ -4144,7 +4164,7 @@ interface RuleOptions {
|
|
|
4144
4164
|
* Functions should always return the same type
|
|
4145
4165
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3800/javascript
|
|
4146
4166
|
*/
|
|
4147
|
-
'sonar/function-return-type'?: Linter.RuleEntry<
|
|
4167
|
+
'sonar/function-return-type'?: Linter.RuleEntry<[]>;
|
|
4148
4168
|
/**
|
|
4149
4169
|
* Future reserved words should not be used as identifiers
|
|
4150
4170
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1527/javascript
|
|
@@ -4169,12 +4189,12 @@ interface RuleOptions {
|
|
|
4169
4189
|
* "in" should not be used with primitive types
|
|
4170
4190
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3785/javascript
|
|
4171
4191
|
*/
|
|
4172
|
-
'sonar/in-operator-type-error'?: Linter.RuleEntry<
|
|
4192
|
+
'sonar/in-operator-type-error'?: Linter.RuleEntry<[]>;
|
|
4173
4193
|
/**
|
|
4174
4194
|
* Functions should be called consistently with or without "new"
|
|
4175
4195
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3686/javascript
|
|
4176
4196
|
*/
|
|
4177
|
-
'sonar/inconsistent-function-call'?: Linter.RuleEntry<
|
|
4197
|
+
'sonar/inconsistent-function-call'?: Linter.RuleEntry<[]>;
|
|
4178
4198
|
/**
|
|
4179
4199
|
* "indexOf" checks should not be for positive numbers
|
|
4180
4200
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2692/javascript
|
|
@@ -4184,17 +4204,17 @@ interface RuleOptions {
|
|
|
4184
4204
|
* Creating cookies without the "secure" flag is security-sensitive
|
|
4185
4205
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2092/javascript
|
|
4186
4206
|
*/
|
|
4187
|
-
'sonar/insecure-cookie'?: Linter.RuleEntry<
|
|
4207
|
+
'sonar/insecure-cookie'?: Linter.RuleEntry<[]>;
|
|
4188
4208
|
/**
|
|
4189
4209
|
* JWT should be signed and verified with strong cipher algorithms
|
|
4190
4210
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5659/javascript
|
|
4191
4211
|
*/
|
|
4192
|
-
'sonar/insecure-jwt-token'?: Linter.RuleEntry<
|
|
4212
|
+
'sonar/insecure-jwt-token'?: Linter.RuleEntry<[]>;
|
|
4193
4213
|
/**
|
|
4194
4214
|
* Assertion arguments should be passed in the correct order
|
|
4195
4215
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3415/javascript
|
|
4196
4216
|
*/
|
|
4197
|
-
'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<
|
|
4217
|
+
'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<[]>;
|
|
4198
4218
|
/**
|
|
4199
4219
|
* React components should not render non-boolean condition values
|
|
4200
4220
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6439/javascript
|
|
@@ -4294,12 +4314,12 @@ interface RuleOptions {
|
|
|
4294
4314
|
* Tests should not execute any code after "done()" is called
|
|
4295
4315
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6079/javascript
|
|
4296
4316
|
*/
|
|
4297
|
-
'sonar/no-code-after-done'?: Linter.RuleEntry<
|
|
4317
|
+
'sonar/no-code-after-done'?: Linter.RuleEntry<[]>;
|
|
4298
4318
|
/**
|
|
4299
4319
|
* Mergeable "if" statements should be combined
|
|
4300
4320
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1066/javascript
|
|
4301
4321
|
*/
|
|
4302
|
-
'sonar/no-collapsible-if'?: Linter.RuleEntry<
|
|
4322
|
+
'sonar/no-collapsible-if'?: Linter.RuleEntry<[]>;
|
|
4303
4323
|
/**
|
|
4304
4324
|
* Collection size and array length comparisons should make sense
|
|
4305
4325
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3981/javascript
|
|
@@ -4329,7 +4349,7 @@ interface RuleOptions {
|
|
|
4329
4349
|
* Union and intersection types should not include duplicated constituents
|
|
4330
4350
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4621/javascript
|
|
4331
4351
|
*/
|
|
4332
|
-
'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<
|
|
4352
|
+
'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<[]>;
|
|
4333
4353
|
/**
|
|
4334
4354
|
* String literals should not be duplicated
|
|
4335
4355
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1192/javascript
|
|
@@ -4339,12 +4359,12 @@ interface RuleOptions {
|
|
|
4339
4359
|
* Two branches in a conditional structure should not have exactly the same implementation
|
|
4340
4360
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1871/javascript
|
|
4341
4361
|
*/
|
|
4342
|
-
'sonar/no-duplicated-branches'?: Linter.RuleEntry<
|
|
4362
|
+
'sonar/no-duplicated-branches'?: Linter.RuleEntry<[]>;
|
|
4343
4363
|
/**
|
|
4344
4364
|
* Collection elements should not be replaced unconditionally
|
|
4345
4365
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4143/javascript
|
|
4346
4366
|
*/
|
|
4347
|
-
'sonar/no-element-overwrite'?: Linter.RuleEntry<
|
|
4367
|
+
'sonar/no-element-overwrite'?: Linter.RuleEntry<[]>;
|
|
4348
4368
|
/**
|
|
4349
4369
|
* Reluctant quantifiers in regular expressions should be followed by an expression that can't match the empty string
|
|
4350
4370
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6019/javascript
|
|
@@ -4389,7 +4409,7 @@ interface RuleOptions {
|
|
|
4389
4409
|
* Function calls should not pass extra arguments
|
|
4390
4410
|
* @see https://sonarsource.github.io/rspec/#/rspec/S930/javascript
|
|
4391
4411
|
*/
|
|
4392
|
-
'sonar/no-extra-arguments'?: Linter.RuleEntry<
|
|
4412
|
+
'sonar/no-extra-arguments'?: Linter.RuleEntry<[]>;
|
|
4393
4413
|
/**
|
|
4394
4414
|
* Switch cases should end with an unconditional "break" statement
|
|
4395
4415
|
* @see https://sonarsource.github.io/rspec/#/rspec/S128/javascript
|
|
@@ -4419,7 +4439,7 @@ interface RuleOptions {
|
|
|
4419
4439
|
* Boolean expressions should not be gratuitous
|
|
4420
4440
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2589/javascript
|
|
4421
4441
|
*/
|
|
4422
|
-
'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<
|
|
4442
|
+
'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<[]>;
|
|
4423
4443
|
/**
|
|
4424
4444
|
* Using hardcoded IP addresses is security-sensitive
|
|
4425
4445
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1313/javascript
|
|
@@ -4444,12 +4464,12 @@ interface RuleOptions {
|
|
|
4444
4464
|
* "if/else if" chains and "switch" cases should not have the same condition
|
|
4445
4465
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1862/javascript
|
|
4446
4466
|
*/
|
|
4447
|
-
'sonar/no-identical-conditions'?: Linter.RuleEntry<
|
|
4467
|
+
'sonar/no-identical-conditions'?: Linter.RuleEntry<[]>;
|
|
4448
4468
|
/**
|
|
4449
4469
|
* Identical expressions should not be used on both sides of a binary operator
|
|
4450
4470
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1764/javascript
|
|
4451
4471
|
*/
|
|
4452
|
-
'sonar/no-identical-expressions'?: Linter.RuleEntry<
|
|
4472
|
+
'sonar/no-identical-expressions'?: Linter.RuleEntry<[]>;
|
|
4453
4473
|
/**
|
|
4454
4474
|
* Functions should not have identical implementations
|
|
4455
4475
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4144/javascript
|
|
@@ -4489,12 +4509,12 @@ interface RuleOptions {
|
|
|
4489
4509
|
* Functions should use "return" consistently
|
|
4490
4510
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3801/javascript
|
|
4491
4511
|
*/
|
|
4492
|
-
'sonar/no-inconsistent-returns'?: Linter.RuleEntry<
|
|
4512
|
+
'sonar/no-inconsistent-returns'?: Linter.RuleEntry<[]>;
|
|
4493
4513
|
/**
|
|
4494
4514
|
* Strings and non-strings should not be added
|
|
4495
4515
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3402/javascript
|
|
4496
4516
|
*/
|
|
4497
|
-
'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<
|
|
4517
|
+
'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<[]>;
|
|
4498
4518
|
/**
|
|
4499
4519
|
* Users should not use internal APIs
|
|
4500
4520
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6627/javascript
|
|
@@ -4505,11 +4525,6 @@ interface RuleOptions {
|
|
|
4505
4525
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5604/javascript
|
|
4506
4526
|
*/
|
|
4507
4527
|
'sonar/no-intrusive-permissions'?: Linter.RuleEntry<SonarNoIntrusivePermissions>;
|
|
4508
|
-
/**
|
|
4509
|
-
* "await" should only be used with promises
|
|
4510
|
-
* @see https://sonarsource.github.io/rspec/#/rspec/S4123/javascript
|
|
4511
|
-
*/
|
|
4512
|
-
'sonar/no-invalid-await'?: Linter.RuleEntry<[]>;
|
|
4513
4528
|
/**
|
|
4514
4529
|
* Regular expressions should be syntactically valid
|
|
4515
4530
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5856/javascript
|
|
@@ -4519,7 +4534,7 @@ interface RuleOptions {
|
|
|
4519
4534
|
* Function returns should not be invariant
|
|
4520
4535
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3516/javascript
|
|
4521
4536
|
*/
|
|
4522
|
-
'sonar/no-invariant-returns'?: Linter.RuleEntry<
|
|
4537
|
+
'sonar/no-invariant-returns'?: Linter.RuleEntry<[]>;
|
|
4523
4538
|
/**
|
|
4524
4539
|
* Boolean checks should not be inverted
|
|
4525
4540
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1940/javascript
|
|
@@ -4529,7 +4544,7 @@ interface RuleOptions {
|
|
|
4529
4544
|
* Forwarding client IP address is security-sensitive
|
|
4530
4545
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5759/javascript
|
|
4531
4546
|
*/
|
|
4532
|
-
'sonar/no-ip-forward'?: Linter.RuleEntry<
|
|
4547
|
+
'sonar/no-ip-forward'?: Linter.RuleEntry<[]>;
|
|
4533
4548
|
/**
|
|
4534
4549
|
* Labels should not be used
|
|
4535
4550
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1119/javascript
|
|
@@ -4544,7 +4559,7 @@ interface RuleOptions {
|
|
|
4544
4559
|
* Allowing browsers to sniff MIME types is security-sensitive
|
|
4545
4560
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5734/javascript
|
|
4546
4561
|
*/
|
|
4547
|
-
'sonar/no-mime-sniff'?: Linter.RuleEntry<
|
|
4562
|
+
'sonar/no-mime-sniff'?: Linter.RuleEntry<[]>;
|
|
4548
4563
|
/**
|
|
4549
4564
|
* Array-mutating methods should not be used misleadingly
|
|
4550
4565
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4043/javascript
|
|
@@ -4559,7 +4574,7 @@ interface RuleOptions {
|
|
|
4559
4574
|
* Allowing mixed-content is security-sensitive
|
|
4560
4575
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5730/javascript
|
|
4561
4576
|
*/
|
|
4562
|
-
'sonar/no-mixed-content'?: Linter.RuleEntry<
|
|
4577
|
+
'sonar/no-mixed-content'?: Linter.RuleEntry<[]>;
|
|
4563
4578
|
/**
|
|
4564
4579
|
* Assignments should not be made from within sub-expressions
|
|
4565
4580
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1121/javascript
|
|
@@ -4629,23 +4644,23 @@ interface RuleOptions {
|
|
|
4629
4644
|
* Optional property declarations should not use both '?' and 'undefined' syntax
|
|
4630
4645
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4782/javascript
|
|
4631
4646
|
*/
|
|
4632
|
-
'sonar/no-redundant-optional'?: Linter.RuleEntry<
|
|
4647
|
+
'sonar/no-redundant-optional'?: Linter.RuleEntry<[]>;
|
|
4633
4648
|
/**
|
|
4634
4649
|
* Redundant pairs of parentheses should be removed
|
|
4635
4650
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1110/javascript
|
|
4636
4651
|
* @deprecated
|
|
4637
4652
|
*/
|
|
4638
|
-
'sonar/no-redundant-parentheses'?: Linter.RuleEntry<
|
|
4653
|
+
'sonar/no-redundant-parentheses'?: Linter.RuleEntry<[]>;
|
|
4639
4654
|
/**
|
|
4640
4655
|
* Variables should be defined before being used
|
|
4641
4656
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3827/javascript
|
|
4642
4657
|
*/
|
|
4643
|
-
'sonar/no-reference-error'?: Linter.RuleEntry<
|
|
4658
|
+
'sonar/no-reference-error'?: Linter.RuleEntry<[]>;
|
|
4644
4659
|
/**
|
|
4645
4660
|
* Disabling strict HTTP no-referrer policy is security-sensitive
|
|
4646
4661
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5736/javascript
|
|
4647
4662
|
*/
|
|
4648
|
-
'sonar/no-referrer-policy'?: Linter.RuleEntry<
|
|
4663
|
+
'sonar/no-referrer-policy'?: Linter.RuleEntry<[]>;
|
|
4649
4664
|
/**
|
|
4650
4665
|
* Regular expressions should not contain multiple spaces
|
|
4651
4666
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6326/javascript
|
|
@@ -4665,17 +4680,17 @@ interface RuleOptions {
|
|
|
4665
4680
|
* Assertions should not be given twice the same argument
|
|
4666
4681
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5863/javascript
|
|
4667
4682
|
*/
|
|
4668
|
-
'sonar/no-same-argument-assert'?: Linter.RuleEntry<
|
|
4683
|
+
'sonar/no-same-argument-assert'?: Linter.RuleEntry<[]>;
|
|
4669
4684
|
/**
|
|
4670
4685
|
* Conditionals should start on new lines
|
|
4671
4686
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3972/javascript
|
|
4672
4687
|
*/
|
|
4673
|
-
'sonar/no-same-line-conditional'?: Linter.RuleEntry<
|
|
4688
|
+
'sonar/no-same-line-conditional'?: Linter.RuleEntry<[]>;
|
|
4674
4689
|
/**
|
|
4675
4690
|
* Methods should not contain selector parameters
|
|
4676
4691
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2301/javascript
|
|
4677
4692
|
*/
|
|
4678
|
-
'sonar/no-selector-parameter'?: Linter.RuleEntry<
|
|
4693
|
+
'sonar/no-selector-parameter'?: Linter.RuleEntry<[]>;
|
|
4679
4694
|
/**
|
|
4680
4695
|
* Tests should not be skipped without providing a reason
|
|
4681
4696
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1607/javascript
|
|
@@ -4706,7 +4721,7 @@ interface RuleOptions {
|
|
|
4706
4721
|
* Promise rejections should not be caught by "try" blocks
|
|
4707
4722
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4822/javascript
|
|
4708
4723
|
*/
|
|
4709
|
-
'sonar/no-try-promise'?: Linter.RuleEntry<
|
|
4724
|
+
'sonar/no-try-promise'?: Linter.RuleEntry<[]>;
|
|
4710
4725
|
/**
|
|
4711
4726
|
* "undefined" should not be passed as the value of optional parameters
|
|
4712
4727
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4623/javascript
|
|
@@ -4781,7 +4796,7 @@ interface RuleOptions {
|
|
|
4781
4796
|
* Variables declared with "var" should be declared before they are used
|
|
4782
4797
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1526/javascript
|
|
4783
4798
|
*/
|
|
4784
|
-
'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<
|
|
4799
|
+
'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<[]>;
|
|
4785
4800
|
/**
|
|
4786
4801
|
* Disabling Vue.js built-in escaping is security-sensitive
|
|
4787
4802
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6299/javascript
|
|
@@ -4812,7 +4827,7 @@ interface RuleOptions {
|
|
|
4812
4827
|
* Arithmetic operators should only have numbers as operands
|
|
4813
4828
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3760/javascript
|
|
4814
4829
|
*/
|
|
4815
|
-
'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<
|
|
4830
|
+
'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<[]>;
|
|
4816
4831
|
/**
|
|
4817
4832
|
* Properties of variables with "null" or "undefined" values should not be accessed
|
|
4818
4833
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2259/javascript
|
|
@@ -4939,7 +4954,7 @@ interface RuleOptions {
|
|
|
4939
4954
|
* Shorthand object properties should be grouped at the beginning or end of an object declaration
|
|
4940
4955
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3499/javascript
|
|
4941
4956
|
*/
|
|
4942
|
-
'sonar/shorthand-property-grouping'?: Linter.RuleEntry<
|
|
4957
|
+
'sonar/shorthand-property-grouping'?: Linter.RuleEntry<[]>;
|
|
4943
4958
|
/**
|
|
4944
4959
|
* Character classes in regular expressions should not contain only one character
|
|
4945
4960
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6397/javascript
|
|
@@ -4981,17 +4996,17 @@ interface RuleOptions {
|
|
|
4981
4996
|
* Regular expressions with the global flag should be used with caution
|
|
4982
4997
|
* @see https://sonarsource.github.io/rspec/#/rspec/S6351/javascript
|
|
4983
4998
|
*/
|
|
4984
|
-
'sonar/stateful-regex'?: Linter.RuleEntry<
|
|
4999
|
+
'sonar/stateful-regex'?: Linter.RuleEntry<[]>;
|
|
4985
5000
|
/**
|
|
4986
5001
|
* Disabling Strict-Transport-Security policy is security-sensitive
|
|
4987
5002
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5739/javascript
|
|
4988
5003
|
*/
|
|
4989
|
-
'sonar/strict-transport-security'?: Linter.RuleEntry<
|
|
5004
|
+
'sonar/strict-transport-security'?: Linter.RuleEntry<[]>;
|
|
4990
5005
|
/**
|
|
4991
5006
|
* Comparison operators should not be used with strings
|
|
4992
5007
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3003/javascript
|
|
4993
5008
|
*/
|
|
4994
|
-
'sonar/strings-comparison'?: Linter.RuleEntry<
|
|
5009
|
+
'sonar/strings-comparison'?: Linter.RuleEntry<[]>;
|
|
4995
5010
|
/**
|
|
4996
5011
|
* "super()" should be invoked appropriately
|
|
4997
5012
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3854/javascript
|
|
@@ -5021,12 +5036,12 @@ interface RuleOptions {
|
|
|
5021
5036
|
* Loops should not contain more than a single "break" or "continue" statement
|
|
5022
5037
|
* @see https://sonarsource.github.io/rspec/#/rspec/S135/javascript
|
|
5023
5038
|
*/
|
|
5024
|
-
'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<
|
|
5039
|
+
'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<[]>;
|
|
5025
5040
|
/**
|
|
5026
5041
|
* Regular expressions using Unicode character classes or property escapes should enable the unicode flag
|
|
5027
5042
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5867/javascript
|
|
5028
5043
|
*/
|
|
5029
|
-
'sonar/unicode-aware-regex'?: Linter.RuleEntry<
|
|
5044
|
+
'sonar/unicode-aware-regex'?: Linter.RuleEntry<[]>;
|
|
5030
5045
|
/**
|
|
5031
5046
|
* Unnecessary imports should be removed
|
|
5032
5047
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1128/javascript
|
|
@@ -5036,32 +5051,33 @@ interface RuleOptions {
|
|
|
5036
5051
|
* Names of regular expressions named groups should be used
|
|
5037
5052
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5860/javascript
|
|
5038
5053
|
*/
|
|
5039
|
-
'sonar/unused-named-groups'?: Linter.RuleEntry<
|
|
5054
|
+
'sonar/unused-named-groups'?: Linter.RuleEntry<[]>;
|
|
5040
5055
|
/**
|
|
5041
5056
|
* Server certificates should be verified during SSL/TLS connections
|
|
5042
5057
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4830/javascript
|
|
5043
5058
|
*/
|
|
5044
|
-
'sonar/unverified-certificate'?: Linter.RuleEntry<
|
|
5059
|
+
'sonar/unverified-certificate'?: Linter.RuleEntry<[]>;
|
|
5045
5060
|
/**
|
|
5046
5061
|
* Server hostnames should be verified during SSL/TLS connections
|
|
5047
5062
|
* @see https://sonarsource.github.io/rspec/#/rspec/S5527/javascript
|
|
5048
5063
|
*/
|
|
5049
|
-
'sonar/unverified-hostname'?: Linter.RuleEntry<
|
|
5064
|
+
'sonar/unverified-hostname'?: Linter.RuleEntry<[]>;
|
|
5050
5065
|
/**
|
|
5051
5066
|
* "const" variables should not be reassigned
|
|
5052
5067
|
* @see https://sonarsource.github.io/rspec/#/rspec/S3500/javascript
|
|
5053
5068
|
*/
|
|
5054
|
-
'sonar/updated-const-var'?: Linter.RuleEntry<
|
|
5069
|
+
'sonar/updated-const-var'?: Linter.RuleEntry<[]>;
|
|
5055
5070
|
/**
|
|
5056
5071
|
* Loop counters should not be assigned within the loop body
|
|
5057
5072
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2310/javascript
|
|
5073
|
+
* @deprecated
|
|
5058
5074
|
*/
|
|
5059
|
-
'sonar/updated-loop-counter'?: Linter.RuleEntry<
|
|
5075
|
+
'sonar/updated-loop-counter'?: Linter.RuleEntry<[]>;
|
|
5060
5076
|
/**
|
|
5061
5077
|
* Type aliases should be used
|
|
5062
5078
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4323/javascript
|
|
5063
5079
|
*/
|
|
5064
|
-
'sonar/use-type-alias'?: Linter.RuleEntry<
|
|
5080
|
+
'sonar/use-type-alias'?: Linter.RuleEntry<[]>;
|
|
5065
5081
|
/**
|
|
5066
5082
|
* Results of operations on strings should not be ignored
|
|
5067
5083
|
* @see https://sonarsource.github.io/rspec/#/rspec/S1154/javascript
|
|
@@ -5103,7 +5119,7 @@ interface RuleOptions {
|
|
|
5103
5119
|
* XML parsers should not be vulnerable to XXE attacks
|
|
5104
5120
|
* @see https://sonarsource.github.io/rspec/#/rspec/S2755/javascript
|
|
5105
5121
|
*/
|
|
5106
|
-
'sonar/xml-parser-xxe'?: Linter.RuleEntry<
|
|
5122
|
+
'sonar/xml-parser-xxe'?: Linter.RuleEntry<[]>;
|
|
5107
5123
|
/**
|
|
5108
5124
|
* Executing XPath expressions is security-sensitive
|
|
5109
5125
|
* @see https://sonarsource.github.io/rspec/#/rspec/S4817/javascript
|
|
@@ -5663,6 +5679,11 @@ interface RuleOptions {
|
|
|
5663
5679
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/comment-directive/
|
|
5664
5680
|
*/
|
|
5665
5681
|
'svelte/comment-directive'?: Linter.RuleEntry<SvelteCommentDirective>;
|
|
5682
|
+
/**
|
|
5683
|
+
* enforce a consistent style for CSS selectors
|
|
5684
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/consistent-selector-style/
|
|
5685
|
+
*/
|
|
5686
|
+
'svelte/consistent-selector-style'?: Linter.RuleEntry<SvelteConsistentSelectorStyle>;
|
|
5666
5687
|
/**
|
|
5667
5688
|
* derived store should use same variable names between values and callback
|
|
5668
5689
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/derived-has-same-inputs-outputs/
|
|
@@ -5723,6 +5744,11 @@ interface RuleOptions {
|
|
|
5723
5744
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/mustache-spacing/
|
|
5724
5745
|
*/
|
|
5725
5746
|
'svelte/mustache-spacing'?: Linter.RuleEntry<SvelteMustacheSpacing>;
|
|
5747
|
+
/**
|
|
5748
|
+
* Warns against the use of `addEventListener`
|
|
5749
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-add-event-listener/
|
|
5750
|
+
*/
|
|
5751
|
+
'svelte/no-add-event-listener'?: Linter.RuleEntry<[]>;
|
|
5726
5752
|
/**
|
|
5727
5753
|
* disallow the use of `{@debug}`
|
|
5728
5754
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-at-debug-tags/
|
|
@@ -5761,6 +5787,7 @@ interface RuleOptions {
|
|
|
5761
5787
|
/**
|
|
5762
5788
|
* disallow dynamic slot name
|
|
5763
5789
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-dynamic-slot-name/
|
|
5790
|
+
* @deprecated
|
|
5764
5791
|
*/
|
|
5765
5792
|
'svelte/no-dynamic-slot-name'?: Linter.RuleEntry<[]>;
|
|
5766
5793
|
/**
|
|
@@ -5776,6 +5803,7 @@ interface RuleOptions {
|
|
|
5776
5803
|
/**
|
|
5777
5804
|
* disallow using goto() without the base path
|
|
5778
5805
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-goto-without-base/
|
|
5806
|
+
* @deprecated
|
|
5779
5807
|
*/
|
|
5780
5808
|
'svelte/no-goto-without-base'?: Linter.RuleEntry<[]>;
|
|
5781
5809
|
/**
|
|
@@ -5803,6 +5831,11 @@ interface RuleOptions {
|
|
|
5803
5831
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-inspect/
|
|
5804
5832
|
*/
|
|
5805
5833
|
'svelte/no-inspect'?: Linter.RuleEntry<[]>;
|
|
5834
|
+
/**
|
|
5835
|
+
* disallow using navigation (links, goto, pushState, replaceState) without the base path
|
|
5836
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-navigation-without-base/
|
|
5837
|
+
*/
|
|
5838
|
+
'svelte/no-navigation-without-base'?: Linter.RuleEntry<SvelteNoNavigationWithoutBase>;
|
|
5806
5839
|
/**
|
|
5807
5840
|
* disallow use of not function in event handler
|
|
5808
5841
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-not-function-handler/
|
|
@@ -5813,6 +5846,11 @@ interface RuleOptions {
|
|
|
5813
5846
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-object-in-text-mustaches/
|
|
5814
5847
|
*/
|
|
5815
5848
|
'svelte/no-object-in-text-mustaches'?: Linter.RuleEntry<[]>;
|
|
5849
|
+
/**
|
|
5850
|
+
* Checks for invalid raw HTML elements
|
|
5851
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-raw-special-elements/
|
|
5852
|
+
*/
|
|
5853
|
+
'svelte/no-raw-special-elements'?: Linter.RuleEntry<[]>;
|
|
5816
5854
|
/**
|
|
5817
5855
|
* it's not necessary to define functions in reactive statements
|
|
5818
5856
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-reactive-functions/
|
|
@@ -5858,6 +5896,11 @@ interface RuleOptions {
|
|
|
5858
5896
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-target-blank/
|
|
5859
5897
|
*/
|
|
5860
5898
|
'svelte/no-target-blank'?: Linter.RuleEntry<SvelteNoTargetBlank>;
|
|
5899
|
+
/**
|
|
5900
|
+
* disallow using top-level browser global variables
|
|
5901
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-top-level-browser-globals/
|
|
5902
|
+
*/
|
|
5903
|
+
'svelte/no-top-level-browser-globals'?: Linter.RuleEntry<[]>;
|
|
5861
5904
|
/**
|
|
5862
5905
|
* disallow trailing whitespace at the end of lines
|
|
5863
5906
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-trailing-spaces/
|
|
@@ -5868,16 +5911,31 @@ interface RuleOptions {
|
|
|
5868
5911
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unknown-style-directive-property/
|
|
5869
5912
|
*/
|
|
5870
5913
|
'svelte/no-unknown-style-directive-property'?: Linter.RuleEntry<SvelteNoUnknownStyleDirectiveProperty>;
|
|
5914
|
+
/**
|
|
5915
|
+
* Disallow unnecessary $state wrapping of reactive classes
|
|
5916
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unnecessary-state-wrap/
|
|
5917
|
+
*/
|
|
5918
|
+
'svelte/no-unnecessary-state-wrap'?: Linter.RuleEntry<SvelteNoUnnecessaryStateWrap>;
|
|
5871
5919
|
/**
|
|
5872
5920
|
* disallow the use of a class in the template without a corresponding style
|
|
5873
5921
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-class-name/
|
|
5874
5922
|
*/
|
|
5875
5923
|
'svelte/no-unused-class-name'?: Linter.RuleEntry<SvelteNoUnusedClassName>;
|
|
5924
|
+
/**
|
|
5925
|
+
* Warns about defined Props properties that are unused
|
|
5926
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-props/
|
|
5927
|
+
*/
|
|
5928
|
+
'svelte/no-unused-props'?: Linter.RuleEntry<SvelteNoUnusedProps>;
|
|
5876
5929
|
/**
|
|
5877
5930
|
* disallow unused svelte-ignore comments
|
|
5878
5931
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-svelte-ignore/
|
|
5879
5932
|
*/
|
|
5880
5933
|
'svelte/no-unused-svelte-ignore'?: Linter.RuleEntry<[]>;
|
|
5934
|
+
/**
|
|
5935
|
+
* disallow explicit children snippet where it's not needed
|
|
5936
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-children-snippet/
|
|
5937
|
+
*/
|
|
5938
|
+
'svelte/no-useless-children-snippet'?: Linter.RuleEntry<[]>;
|
|
5881
5939
|
/**
|
|
5882
5940
|
* disallow unnecessary mustache interpolations
|
|
5883
5941
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-mustaches/
|
|
@@ -5888,6 +5946,11 @@ interface RuleOptions {
|
|
|
5888
5946
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-class-directive/
|
|
5889
5947
|
*/
|
|
5890
5948
|
'svelte/prefer-class-directive'?: Linter.RuleEntry<SveltePreferClassDirective>;
|
|
5949
|
+
/**
|
|
5950
|
+
* Require `const` declarations for variables that are never reassigned after declared
|
|
5951
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-const/
|
|
5952
|
+
*/
|
|
5953
|
+
'svelte/prefer-const'?: Linter.RuleEntry<SveltePreferConst>;
|
|
5891
5954
|
/**
|
|
5892
5955
|
* destructure values from object stores for better change tracking & fewer redraws
|
|
5893
5956
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-destructured-store-props/
|
|
@@ -5898,6 +5961,16 @@ interface RuleOptions {
|
|
|
5898
5961
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-style-directive/
|
|
5899
5962
|
*/
|
|
5900
5963
|
'svelte/prefer-style-directive'?: Linter.RuleEntry<[]>;
|
|
5964
|
+
/**
|
|
5965
|
+
* disallow using mutable instances of built-in classes where a reactive alternative is provided by svelte/reactivity
|
|
5966
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-svelte-reactivity/
|
|
5967
|
+
*/
|
|
5968
|
+
'svelte/prefer-svelte-reactivity'?: Linter.RuleEntry<[]>;
|
|
5969
|
+
/**
|
|
5970
|
+
* Prefer using writable $derived instead of $state and $effect
|
|
5971
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-writable-derived/
|
|
5972
|
+
*/
|
|
5973
|
+
'svelte/prefer-writable-derived'?: Linter.RuleEntry<[]>;
|
|
5901
5974
|
/**
|
|
5902
5975
|
* require keyed `{#each}` block
|
|
5903
5976
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-each-key/
|
|
@@ -5908,6 +5981,11 @@ interface RuleOptions {
|
|
|
5908
5981
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-dispatcher-types/
|
|
5909
5982
|
*/
|
|
5910
5983
|
'svelte/require-event-dispatcher-types'?: Linter.RuleEntry<[]>;
|
|
5984
|
+
/**
|
|
5985
|
+
* require component event names to start with "on"
|
|
5986
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-prefix/
|
|
5987
|
+
*/
|
|
5988
|
+
'svelte/require-event-prefix'?: Linter.RuleEntry<SvelteRequireEventPrefix>;
|
|
5911
5989
|
/**
|
|
5912
5990
|
* require style attributes that can be optimized
|
|
5913
5991
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-optimized-style-attribute/
|
|
@@ -5968,6 +6046,11 @@ interface RuleOptions {
|
|
|
5968
6046
|
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-prop-names-in-kit-pages/
|
|
5969
6047
|
*/
|
|
5970
6048
|
'svelte/valid-prop-names-in-kit-pages'?: Linter.RuleEntry<[]>;
|
|
6049
|
+
/**
|
|
6050
|
+
* require valid style element parsing
|
|
6051
|
+
* @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-style-parse/
|
|
6052
|
+
*/
|
|
6053
|
+
'svelte/valid-style-parse'?: Linter.RuleEntry<[]>;
|
|
5971
6054
|
/**
|
|
5972
6055
|
* Enforce spacing around colons of switch statements
|
|
5973
6056
|
* @see https://eslint.org/docs/latest/rules/switch-colon-spacing
|
|
@@ -6172,6 +6255,16 @@ interface RuleOptions {
|
|
|
6172
6255
|
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/padding-around-test-blocks.md
|
|
6173
6256
|
*/
|
|
6174
6257
|
'test/padding-around-test-blocks'?: Linter.RuleEntry<[]>;
|
|
6258
|
+
/**
|
|
6259
|
+
* enforce using `toBeCalledOnce()` or `toHaveBeenCalledOnce()`
|
|
6260
|
+
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-once.md
|
|
6261
|
+
*/
|
|
6262
|
+
'test/prefer-called-once'?: Linter.RuleEntry<[]>;
|
|
6263
|
+
/**
|
|
6264
|
+
* enforce using `toBeCalledTimes(1)` or `toHaveBeenCalledTimes(1)`
|
|
6265
|
+
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-times.md
|
|
6266
|
+
*/
|
|
6267
|
+
'test/prefer-called-times'?: Linter.RuleEntry<[]>;
|
|
6175
6268
|
/**
|
|
6176
6269
|
* enforce using `toBeCalledWith()` or `toHaveBeenCalledWith()`
|
|
6177
6270
|
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-with.md
|
|
@@ -6337,6 +6430,11 @@ interface RuleOptions {
|
|
|
6337
6430
|
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/valid-title.md
|
|
6338
6431
|
*/
|
|
6339
6432
|
'test/valid-title'?: Linter.RuleEntry<TestValidTitle>;
|
|
6433
|
+
/**
|
|
6434
|
+
* disallow `.todo` usage
|
|
6435
|
+
* @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/warn-todo.md
|
|
6436
|
+
*/
|
|
6437
|
+
'test/warn-todo'?: Linter.RuleEntry<[]>;
|
|
6340
6438
|
/**
|
|
6341
6439
|
* enforce linebreaks after opening and before closing array brackets
|
|
6342
6440
|
* @see https://ota-meshi.github.io/eslint-plugin-toml/rules/array-bracket-newline.html
|
|
@@ -11126,10 +11224,17 @@ type NoRestrictedExports = [] | [({
|
|
|
11126
11224
|
};
|
|
11127
11225
|
})];
|
|
11128
11226
|
// ----- no-restricted-globals -----
|
|
11129
|
-
type NoRestrictedGlobals = (string | {
|
|
11227
|
+
type NoRestrictedGlobals = ((string | {
|
|
11130
11228
|
name: string;
|
|
11131
11229
|
message?: string;
|
|
11132
|
-
})[]
|
|
11230
|
+
})[] | [] | [{
|
|
11231
|
+
globals: (string | {
|
|
11232
|
+
name: string;
|
|
11233
|
+
message?: string;
|
|
11234
|
+
})[];
|
|
11235
|
+
checkGlobalObject?: boolean;
|
|
11236
|
+
globalObjects?: string[];
|
|
11237
|
+
}]);
|
|
11133
11238
|
// ----- no-restricted-imports -----
|
|
11134
11239
|
type NoRestrictedImports = ((string | {
|
|
11135
11240
|
name: string;
|
|
@@ -11624,6 +11729,8 @@ type OneVar = [] | [(("always" | "never" | "consecutive") | {
|
|
|
11624
11729
|
var?: ("always" | "never" | "consecutive");
|
|
11625
11730
|
let?: ("always" | "never" | "consecutive");
|
|
11626
11731
|
const?: ("always" | "never" | "consecutive");
|
|
11732
|
+
using?: ("always" | "never" | "consecutive");
|
|
11733
|
+
awaitUsing?: ("always" | "never" | "consecutive");
|
|
11627
11734
|
} | {
|
|
11628
11735
|
initialized?: ("always" | "never" | "consecutive");
|
|
11629
11736
|
uninitialized?: ("always" | "never" | "consecutive");
|
|
@@ -13662,35 +13769,11 @@ type SolidStyleProp = [] | [{
|
|
|
13662
13769
|
styleProps?: [string, ...(string)[]];
|
|
13663
13770
|
allowString?: boolean;
|
|
13664
13771
|
}];
|
|
13665
|
-
// ----- sonar/arguments-order -----
|
|
13666
|
-
type SonarArgumentsOrder = [] | [("sonar-runtime" | "metric")];
|
|
13667
|
-
// ----- sonar/arguments-usage -----
|
|
13668
|
-
type SonarArgumentsUsage = [] | [("sonar-runtime" | "metric")];
|
|
13669
13772
|
// ----- sonar/arrow-function-convention -----
|
|
13670
13773
|
type SonarArrowFunctionConvention = [] | [{
|
|
13671
13774
|
requireParameterParentheses?: boolean;
|
|
13672
13775
|
requireBodyBraces?: boolean;
|
|
13673
13776
|
}];
|
|
13674
|
-
// ----- sonar/aws-iam-all-privileges -----
|
|
13675
|
-
type SonarAwsIamAllPrivileges = [] | [("sonar-runtime" | "metric")];
|
|
13676
|
-
// ----- sonar/aws-iam-all-resources-accessible -----
|
|
13677
|
-
type SonarAwsIamAllResourcesAccessible = [] | [("sonar-runtime" | "metric")];
|
|
13678
|
-
// ----- sonar/aws-iam-privilege-escalation -----
|
|
13679
|
-
type SonarAwsIamPrivilegeEscalation = [] | [("sonar-runtime" | "metric")];
|
|
13680
|
-
// ----- sonar/aws-iam-public-access -----
|
|
13681
|
-
type SonarAwsIamPublicAccess = [] | [("sonar-runtime" | "metric")];
|
|
13682
|
-
// ----- sonar/aws-s3-bucket-granted-access -----
|
|
13683
|
-
type SonarAwsS3BucketGrantedAccess = [] | [("sonar-runtime" | "metric")];
|
|
13684
|
-
// ----- sonar/aws-s3-bucket-public-access -----
|
|
13685
|
-
type SonarAwsS3BucketPublicAccess = [] | [("sonar-runtime" | "metric")];
|
|
13686
|
-
// ----- sonar/aws-s3-bucket-server-encryption -----
|
|
13687
|
-
type SonarAwsS3BucketServerEncryption = [] | [("sonar-runtime" | "metric")];
|
|
13688
|
-
// ----- sonar/aws-s3-bucket-versioning -----
|
|
13689
|
-
type SonarAwsS3BucketVersioning = [] | [("sonar-runtime" | "metric")];
|
|
13690
|
-
// ----- sonar/block-scoped-var -----
|
|
13691
|
-
type SonarBlockScopedVar = [] | [("sonar-runtime" | "metric")];
|
|
13692
|
-
// ----- sonar/certificate-transparency -----
|
|
13693
|
-
type SonarCertificateTransparency = [] | [("sonar-runtime" | "metric")];
|
|
13694
13777
|
// ----- sonar/class-name -----
|
|
13695
13778
|
type SonarClassName = [] | [{
|
|
13696
13779
|
format?: string;
|
|
@@ -13703,39 +13786,15 @@ type SonarCommentRegex = [] | [{
|
|
|
13703
13786
|
message?: string;
|
|
13704
13787
|
flags?: string;
|
|
13705
13788
|
}];
|
|
13706
|
-
// ----- sonar/conditional-indentation -----
|
|
13707
|
-
type SonarConditionalIndentation = [] | [("sonar-runtime" | "metric")];
|
|
13708
|
-
// ----- sonar/confidential-information-logging -----
|
|
13709
|
-
type SonarConfidentialInformationLogging = [] | [("sonar-runtime" | "metric")];
|
|
13710
13789
|
// ----- sonar/content-length -----
|
|
13711
13790
|
type SonarContentLength = [] | [{
|
|
13712
13791
|
fileUploadSizeLimit?: number;
|
|
13713
13792
|
standardSizeLimit?: number;
|
|
13714
13793
|
}];
|
|
13715
|
-
// ----- sonar/content-security-policy -----
|
|
13716
|
-
type SonarContentSecurityPolicy = [] | [("sonar-runtime" | "metric")];
|
|
13717
|
-
// ----- sonar/cookie-no-httponly -----
|
|
13718
|
-
type SonarCookieNoHttponly = [] | [("sonar-runtime" | "metric")];
|
|
13719
|
-
// ----- sonar/cors -----
|
|
13720
|
-
type SonarCors = [] | [("sonar-runtime" | "metric")];
|
|
13721
|
-
// ----- sonar/csrf -----
|
|
13722
|
-
type SonarCsrf = [] | [("sonar-runtime" | "metric")];
|
|
13723
13794
|
// ----- sonar/cyclomatic-complexity -----
|
|
13724
13795
|
type SonarCyclomaticComplexity = [] | [{
|
|
13725
13796
|
threshold?: number;
|
|
13726
|
-
}]
|
|
13727
|
-
threshold?: number;
|
|
13728
|
-
}, ("sonar-runtime" | "metric")];
|
|
13729
|
-
// ----- sonar/destructuring-assignment-syntax -----
|
|
13730
|
-
type SonarDestructuringAssignmentSyntax = [] | [("sonar-runtime" | "metric")];
|
|
13731
|
-
// ----- sonar/different-types-comparison -----
|
|
13732
|
-
type SonarDifferentTypesComparison = [] | [("sonar-runtime" | "metric")];
|
|
13733
|
-
// ----- sonar/disabled-auto-escaping -----
|
|
13734
|
-
type SonarDisabledAutoEscaping = [] | [("sonar-runtime" | "metric")];
|
|
13735
|
-
// ----- sonar/dns-prefetching -----
|
|
13736
|
-
type SonarDnsPrefetching = [] | [("sonar-runtime" | "metric")];
|
|
13737
|
-
// ----- sonar/duplicates-in-character-class -----
|
|
13738
|
-
type SonarDuplicatesInCharacterClass = [] | [("sonar-runtime" | "metric")];
|
|
13797
|
+
}];
|
|
13739
13798
|
// ----- sonar/enforce-trailing-comma -----
|
|
13740
13799
|
type SonarEnforceTrailingComma = [] | [(_SonarEnforceTrailingCommaValue | {
|
|
13741
13800
|
arrays?: _SonarEnforceTrailingCommaValueWithIgnore;
|
|
@@ -13749,38 +13808,16 @@ type _SonarEnforceTrailingCommaValueWithIgnore = ("always-multiline" | "always"
|
|
|
13749
13808
|
// ----- sonar/expression-complexity -----
|
|
13750
13809
|
type SonarExpressionComplexity = [] | [{
|
|
13751
13810
|
max?: number;
|
|
13752
|
-
}]
|
|
13753
|
-
max?: number;
|
|
13754
|
-
}, ("sonar-runtime" | "metric")];
|
|
13811
|
+
}];
|
|
13755
13812
|
// ----- sonar/file-header -----
|
|
13756
13813
|
type SonarFileHeader = [] | [{
|
|
13757
13814
|
headerFormat?: string;
|
|
13758
13815
|
isRegularExpression?: boolean;
|
|
13759
13816
|
}];
|
|
13760
|
-
// ----- sonar/file-uploads -----
|
|
13761
|
-
type SonarFileUploads = [] | [("sonar-runtime" | "metric")];
|
|
13762
|
-
// ----- sonar/for-loop-increment-sign -----
|
|
13763
|
-
type SonarForLoopIncrementSign = [] | [("sonar-runtime" | "metric")];
|
|
13764
|
-
// ----- sonar/frame-ancestors -----
|
|
13765
|
-
type SonarFrameAncestors = [] | [("sonar-runtime" | "metric")];
|
|
13766
|
-
// ----- sonar/function-inside-loop -----
|
|
13767
|
-
type SonarFunctionInsideLoop = [] | [("sonar-runtime" | "metric")];
|
|
13768
13817
|
// ----- sonar/function-name -----
|
|
13769
13818
|
type SonarFunctionName = [] | [{
|
|
13770
13819
|
format?: string;
|
|
13771
13820
|
}];
|
|
13772
|
-
// ----- sonar/function-return-type -----
|
|
13773
|
-
type SonarFunctionReturnType = [] | [("sonar-runtime" | "metric")];
|
|
13774
|
-
// ----- sonar/in-operator-type-error -----
|
|
13775
|
-
type SonarInOperatorTypeError = [] | [("sonar-runtime" | "metric")];
|
|
13776
|
-
// ----- sonar/inconsistent-function-call -----
|
|
13777
|
-
type SonarInconsistentFunctionCall = [] | [("sonar-runtime" | "metric")];
|
|
13778
|
-
// ----- sonar/insecure-cookie -----
|
|
13779
|
-
type SonarInsecureCookie = [] | [("sonar-runtime" | "metric")];
|
|
13780
|
-
// ----- sonar/insecure-jwt-token -----
|
|
13781
|
-
type SonarInsecureJwtToken = [] | [("sonar-runtime" | "metric")];
|
|
13782
|
-
// ----- sonar/inverted-assertion-arguments -----
|
|
13783
|
-
type SonarInvertedAssertionArguments = [] | [("sonar-runtime" | "metric")];
|
|
13784
13821
|
// ----- sonar/max-lines -----
|
|
13785
13822
|
type SonarMaxLines = [] | [{
|
|
13786
13823
|
maximum?: number;
|
|
@@ -13798,37 +13835,16 @@ type SonarMaxUnionSize = [] | [{
|
|
|
13798
13835
|
// ----- sonar/nested-control-flow -----
|
|
13799
13836
|
type SonarNestedControlFlow = [] | [{
|
|
13800
13837
|
maximumNestingLevel?: number;
|
|
13801
|
-
}]
|
|
13802
|
-
maximumNestingLevel?: number;
|
|
13803
|
-
}, ("sonar-runtime" | "metric")];
|
|
13838
|
+
}];
|
|
13804
13839
|
// ----- sonar/new-operator-misuse -----
|
|
13805
13840
|
type SonarNewOperatorMisuse = [] | [{
|
|
13806
13841
|
considerJSDoc?: boolean;
|
|
13807
|
-
}]
|
|
13808
|
-
considerJSDoc?: boolean;
|
|
13809
|
-
}, unknown];
|
|
13810
|
-
// ----- sonar/no-code-after-done -----
|
|
13811
|
-
type SonarNoCodeAfterDone = [] | [("sonar-runtime" | "metric")];
|
|
13812
|
-
// ----- sonar/no-collapsible-if -----
|
|
13813
|
-
type SonarNoCollapsibleIf = [] | [("sonar-runtime" | "metric")];
|
|
13814
|
-
// ----- sonar/no-duplicate-in-composite -----
|
|
13815
|
-
type SonarNoDuplicateInComposite = [] | [("sonar-runtime" | "metric")];
|
|
13842
|
+
}];
|
|
13816
13843
|
// ----- sonar/no-duplicate-string -----
|
|
13817
13844
|
type SonarNoDuplicateString = [] | [{
|
|
13818
13845
|
threshold?: number;
|
|
13819
13846
|
ignoreStrings?: string;
|
|
13820
|
-
}]
|
|
13821
|
-
threshold?: number;
|
|
13822
|
-
ignoreStrings?: string;
|
|
13823
|
-
}, ("sonar-runtime" | "metric")];
|
|
13824
|
-
// ----- sonar/no-duplicated-branches -----
|
|
13825
|
-
type SonarNoDuplicatedBranches = [] | [("sonar-runtime" | "metric")];
|
|
13826
|
-
// ----- sonar/no-element-overwrite -----
|
|
13827
|
-
type SonarNoElementOverwrite = [] | [("sonar-runtime" | "metric")];
|
|
13828
|
-
// ----- sonar/no-extra-arguments -----
|
|
13829
|
-
type SonarNoExtraArguments = [] | [("sonar-runtime" | "metric")];
|
|
13830
|
-
// ----- sonar/no-gratuitous-expressions -----
|
|
13831
|
-
type SonarNoGratuitousExpressions = [] | [("sonar-runtime" | "metric")];
|
|
13847
|
+
}];
|
|
13832
13848
|
// ----- sonar/no-hardcoded-passwords -----
|
|
13833
13849
|
type SonarNoHardcodedPasswords = [] | [{
|
|
13834
13850
|
passwordWords?: string[];
|
|
@@ -13838,94 +13854,28 @@ type SonarNoHardcodedSecrets = [] | [{
|
|
|
13838
13854
|
secretWords?: string;
|
|
13839
13855
|
randomnessSensibility?: number;
|
|
13840
13856
|
}];
|
|
13841
|
-
// ----- sonar/no-identical-conditions -----
|
|
13842
|
-
type SonarNoIdenticalConditions = [] | [("sonar-runtime" | "metric")];
|
|
13843
|
-
// ----- sonar/no-identical-expressions -----
|
|
13844
|
-
type SonarNoIdenticalExpressions = [] | [("sonar-runtime" | "metric")];
|
|
13845
13857
|
// ----- sonar/no-identical-functions -----
|
|
13846
|
-
type SonarNoIdenticalFunctions = [] | [number]
|
|
13858
|
+
type SonarNoIdenticalFunctions = [] | [number];
|
|
13847
13859
|
// ----- sonar/no-implicit-dependencies -----
|
|
13848
13860
|
type SonarNoImplicitDependencies = [] | [{
|
|
13849
13861
|
whitelist?: string[];
|
|
13850
13862
|
}];
|
|
13851
|
-
// ----- sonar/no-inconsistent-returns -----
|
|
13852
|
-
type SonarNoInconsistentReturns = [] | [("sonar-runtime" | "metric")];
|
|
13853
|
-
// ----- sonar/no-incorrect-string-concat -----
|
|
13854
|
-
type SonarNoIncorrectStringConcat = [] | [("sonar-runtime" | "metric")];
|
|
13855
13863
|
// ----- sonar/no-intrusive-permissions -----
|
|
13856
13864
|
type SonarNoIntrusivePermissions = [] | [{
|
|
13857
13865
|
permissions?: string[];
|
|
13858
13866
|
}];
|
|
13859
|
-
// ----- sonar/no-invariant-returns -----
|
|
13860
|
-
type SonarNoInvariantReturns = [] | [("sonar-runtime" | "metric")];
|
|
13861
|
-
// ----- sonar/no-ip-forward -----
|
|
13862
|
-
type SonarNoIpForward = [] | [("sonar-runtime" | "metric")];
|
|
13863
|
-
// ----- sonar/no-mime-sniff -----
|
|
13864
|
-
type SonarNoMimeSniff = [] | [("sonar-runtime" | "metric")];
|
|
13865
|
-
// ----- sonar/no-mixed-content -----
|
|
13866
|
-
type SonarNoMixedContent = [] | [("sonar-runtime" | "metric")];
|
|
13867
13867
|
// ----- sonar/no-nested-functions -----
|
|
13868
13868
|
type SonarNoNestedFunctions = [] | [{
|
|
13869
13869
|
threshold?: number;
|
|
13870
|
-
}]
|
|
13871
|
-
threshold?: number;
|
|
13872
|
-
}, ("sonar-runtime" | "metric")];
|
|
13873
|
-
// ----- sonar/no-redundant-optional -----
|
|
13874
|
-
type SonarNoRedundantOptional = [] | [("sonar-runtime" | "metric")];
|
|
13875
|
-
// ----- sonar/no-redundant-parentheses -----
|
|
13876
|
-
type SonarNoRedundantParentheses = [] | [("sonar-runtime" | "metric")];
|
|
13877
|
-
// ----- sonar/no-reference-error -----
|
|
13878
|
-
type SonarNoReferenceError = [] | [("sonar-runtime" | "metric")];
|
|
13879
|
-
// ----- sonar/no-referrer-policy -----
|
|
13880
|
-
type SonarNoReferrerPolicy = [] | [("sonar-runtime" | "metric")];
|
|
13881
|
-
// ----- sonar/no-same-argument-assert -----
|
|
13882
|
-
type SonarNoSameArgumentAssert = [] | [("sonar-runtime" | "metric")];
|
|
13883
|
-
// ----- sonar/no-same-line-conditional -----
|
|
13884
|
-
type SonarNoSameLineConditional = [] | [("sonar-runtime" | "metric")];
|
|
13885
|
-
// ----- sonar/no-selector-parameter -----
|
|
13886
|
-
type SonarNoSelectorParameter = [] | [("sonar-runtime" | "metric")];
|
|
13887
|
-
// ----- sonar/no-try-promise -----
|
|
13888
|
-
type SonarNoTryPromise = [] | [("sonar-runtime" | "metric")];
|
|
13889
|
-
// ----- sonar/no-variable-usage-before-declaration -----
|
|
13890
|
-
type SonarNoVariableUsageBeforeDeclaration = [] | [("sonar-runtime" | "metric")];
|
|
13891
|
-
// ----- sonar/non-number-in-arithmetic-expression -----
|
|
13892
|
-
type SonarNonNumberInArithmeticExpression = [] | [("sonar-runtime" | "metric")];
|
|
13870
|
+
}];
|
|
13893
13871
|
// ----- sonar/regex-complexity -----
|
|
13894
13872
|
type SonarRegexComplexity = [] | [{
|
|
13895
13873
|
threshold?: number;
|
|
13896
|
-
}]
|
|
13897
|
-
threshold?: number;
|
|
13898
|
-
}, ("sonar-runtime" | "metric")];
|
|
13899
|
-
// ----- sonar/shorthand-property-grouping -----
|
|
13900
|
-
type SonarShorthandPropertyGrouping = [] | [("sonar-runtime" | "metric")];
|
|
13901
|
-
// ----- sonar/stateful-regex -----
|
|
13902
|
-
type SonarStatefulRegex = [] | [("sonar-runtime" | "metric")];
|
|
13903
|
-
// ----- sonar/strict-transport-security -----
|
|
13904
|
-
type SonarStrictTransportSecurity = [] | [("sonar-runtime" | "metric")];
|
|
13905
|
-
// ----- sonar/strings-comparison -----
|
|
13906
|
-
type SonarStringsComparison = [] | [("sonar-runtime" | "metric")];
|
|
13907
|
-
// ----- sonar/too-many-break-or-continue-in-loop -----
|
|
13908
|
-
type SonarTooManyBreakOrContinueInLoop = [] | [("sonar-runtime" | "metric")];
|
|
13909
|
-
// ----- sonar/unicode-aware-regex -----
|
|
13910
|
-
type SonarUnicodeAwareRegex = [] | [("sonar-runtime" | "metric")];
|
|
13911
|
-
// ----- sonar/unused-named-groups -----
|
|
13912
|
-
type SonarUnusedNamedGroups = [] | [("sonar-runtime" | "metric")];
|
|
13913
|
-
// ----- sonar/unverified-certificate -----
|
|
13914
|
-
type SonarUnverifiedCertificate = [] | [("sonar-runtime" | "metric")];
|
|
13915
|
-
// ----- sonar/unverified-hostname -----
|
|
13916
|
-
type SonarUnverifiedHostname = [] | [("sonar-runtime" | "metric")];
|
|
13917
|
-
// ----- sonar/updated-const-var -----
|
|
13918
|
-
type SonarUpdatedConstVar = [] | [("sonar-runtime" | "metric")];
|
|
13919
|
-
// ----- sonar/updated-loop-counter -----
|
|
13920
|
-
type SonarUpdatedLoopCounter = [] | [("sonar-runtime" | "metric")];
|
|
13921
|
-
// ----- sonar/use-type-alias -----
|
|
13922
|
-
type SonarUseTypeAlias = [] | [("sonar-runtime" | "metric")];
|
|
13874
|
+
}];
|
|
13923
13875
|
// ----- sonar/variable-name -----
|
|
13924
13876
|
type SonarVariableName = [] | [{
|
|
13925
13877
|
format?: string;
|
|
13926
13878
|
}];
|
|
13927
|
-
// ----- sonar/xml-parser-xxe -----
|
|
13928
|
-
type SonarXmlParserXxe = [] | [("sonar-runtime" | "metric")];
|
|
13929
13879
|
// ----- sort-imports -----
|
|
13930
13880
|
type SortImports = [] | [{
|
|
13931
13881
|
ignoreCase?: boolean;
|
|
@@ -15179,6 +15129,11 @@ type SvelteButtonHasType = [] | [{
|
|
|
15179
15129
|
type SvelteCommentDirective = [] | [{
|
|
15180
15130
|
reportUnusedDisableDirectives?: boolean;
|
|
15181
15131
|
}];
|
|
15132
|
+
// ----- svelte/consistent-selector-style -----
|
|
15133
|
+
type SvelteConsistentSelectorStyle = [] | [{
|
|
15134
|
+
checkGlobal?: boolean;
|
|
15135
|
+
style?: [] | [("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type"), ("class" | "id" | "type")];
|
|
15136
|
+
}];
|
|
15182
15137
|
// ----- svelte/first-attribute-linebreak -----
|
|
15183
15138
|
type SvelteFirstAttributeLinebreak = [] | [{
|
|
15184
15139
|
multiline?: ("below" | "beside");
|
|
@@ -15211,7 +15166,8 @@ type SvelteHtmlQuotes = [] | [{
|
|
|
15211
15166
|
type SvelteHtmlSelfClosing = [] | [({
|
|
15212
15167
|
void?: ("never" | "always" | "ignore");
|
|
15213
15168
|
normal?: ("never" | "always" | "ignore");
|
|
15214
|
-
|
|
15169
|
+
svg?: ("never" | "always" | "ignore");
|
|
15170
|
+
math?: ("never" | "always" | "ignore");
|
|
15215
15171
|
component?: ("never" | "always" | "ignore");
|
|
15216
15172
|
svelte?: ("never" | "always" | "ignore");
|
|
15217
15173
|
} | ("all" | "html" | "none"))];
|
|
@@ -15250,6 +15206,13 @@ type SvelteNoInlineStyles = [] | [{
|
|
|
15250
15206
|
type SvelteNoInnerDeclarations = [] | [("functions" | "both")] | [("functions" | "both"), {
|
|
15251
15207
|
blockScopedFunctions?: ("allow" | "disallow");
|
|
15252
15208
|
}];
|
|
15209
|
+
// ----- svelte/no-navigation-without-base -----
|
|
15210
|
+
type SvelteNoNavigationWithoutBase = [] | [{
|
|
15211
|
+
ignoreGoto?: boolean;
|
|
15212
|
+
ignoreLinks?: boolean;
|
|
15213
|
+
ignorePushState?: boolean;
|
|
15214
|
+
ignoreReplaceState?: boolean;
|
|
15215
|
+
}];
|
|
15253
15216
|
// ----- svelte/no-reactive-reassign -----
|
|
15254
15217
|
type SvelteNoReactiveReassign = [] | [{
|
|
15255
15218
|
props?: boolean;
|
|
@@ -15277,10 +15240,22 @@ type SvelteNoUnknownStyleDirectiveProperty = [] | [{
|
|
|
15277
15240
|
ignoreProperties?: [string, ...(string)[]];
|
|
15278
15241
|
ignorePrefixed?: boolean;
|
|
15279
15242
|
}];
|
|
15243
|
+
// ----- svelte/no-unnecessary-state-wrap -----
|
|
15244
|
+
type SvelteNoUnnecessaryStateWrap = [] | [{
|
|
15245
|
+
additionalReactiveClasses?: string[];
|
|
15246
|
+
allowReassign?: boolean;
|
|
15247
|
+
}];
|
|
15280
15248
|
// ----- svelte/no-unused-class-name -----
|
|
15281
15249
|
type SvelteNoUnusedClassName = [] | [{
|
|
15282
15250
|
allowedClassNames?: string[];
|
|
15283
15251
|
}];
|
|
15252
|
+
// ----- svelte/no-unused-props -----
|
|
15253
|
+
type SvelteNoUnusedProps = [] | [{
|
|
15254
|
+
checkImportedTypes?: boolean;
|
|
15255
|
+
ignoreTypePatterns?: string[];
|
|
15256
|
+
ignorePropertyPatterns?: string[];
|
|
15257
|
+
allowUnusedNestedProperties?: boolean;
|
|
15258
|
+
}];
|
|
15284
15259
|
// ----- svelte/no-useless-mustaches -----
|
|
15285
15260
|
type SvelteNoUselessMustaches = [] | [{
|
|
15286
15261
|
ignoreIncludesComment?: boolean;
|
|
@@ -15290,6 +15265,17 @@ type SvelteNoUselessMustaches = [] | [{
|
|
|
15290
15265
|
type SveltePreferClassDirective = [] | [{
|
|
15291
15266
|
prefer?: ("always" | "empty");
|
|
15292
15267
|
}];
|
|
15268
|
+
// ----- svelte/prefer-const -----
|
|
15269
|
+
type SveltePreferConst = [] | [{
|
|
15270
|
+
destructuring?: ("any" | "all");
|
|
15271
|
+
ignoreReadBeforeAssign?: boolean;
|
|
15272
|
+
excludedRunes?: string[];
|
|
15273
|
+
[k: string]: unknown | undefined;
|
|
15274
|
+
}];
|
|
15275
|
+
// ----- svelte/require-event-prefix -----
|
|
15276
|
+
type SvelteRequireEventPrefix = [] | [{
|
|
15277
|
+
checkAsyncFunctions?: boolean;
|
|
15278
|
+
}];
|
|
15293
15279
|
// ----- svelte/shorthand-attribute -----
|
|
15294
15280
|
type SvelteShorthandAttribute = [] | [{
|
|
15295
15281
|
prefer?: ("always" | "never");
|
package/dist/index.js
CHANGED
|
@@ -15,7 +15,7 @@ import globals from "globals";
|
|
|
15
15
|
import { mergeProcessors, processorPassThrough } from "eslint-merge-processors";
|
|
16
16
|
import { configs } from "eslint-plugin-regexp";
|
|
17
17
|
|
|
18
|
-
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.
|
|
18
|
+
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-6AFNPQW2.js
|
|
19
19
|
function r(o) {
|
|
20
20
|
if (typeof o != "object" || o === null) return !1;
|
|
21
21
|
let e$2 = Object.getPrototypeOf(o);
|
|
@@ -23,13 +23,13 @@ function r(o) {
|
|
|
23
23
|
}
|
|
24
24
|
|
|
25
25
|
//#endregion
|
|
26
|
-
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.
|
|
26
|
+
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-Q2HW4RVT.js
|
|
27
27
|
function e$1(r$1) {
|
|
28
28
|
return typeof r$1 == "number" && !Number.isNaN(r$1);
|
|
29
29
|
}
|
|
30
30
|
|
|
31
31
|
//#endregion
|
|
32
|
-
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.
|
|
32
|
+
//#region ../node_modules/.pnpm/@vinicunca+perkakas@1.7.1/node_modules/@vinicunca/perkakas/dist/chunk-AZUJCNUP.js
|
|
33
33
|
function e(o) {
|
|
34
34
|
return typeof o == "boolean";
|
|
35
35
|
}
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@vinicunca/eslint-config",
|
|
3
3
|
"type": "module",
|
|
4
|
-
"version": "3.21.
|
|
4
|
+
"version": "3.21.1",
|
|
5
5
|
"description": "Vinicunca ESLint config",
|
|
6
6
|
"author": {
|
|
7
7
|
"name": "praburangki",
|
|
@@ -113,25 +113,25 @@
|
|
|
113
113
|
"@clack/prompts": "^0.11.0",
|
|
114
114
|
"@eslint-community/eslint-plugin-eslint-comments": "^4.5.0",
|
|
115
115
|
"@eslint/markdown": "^7.1.0",
|
|
116
|
-
"@stylistic/eslint-plugin": "^5.2.
|
|
116
|
+
"@stylistic/eslint-plugin": "^5.2.3",
|
|
117
117
|
"@typescript-eslint/eslint-plugin": "^8.39.0",
|
|
118
118
|
"@typescript-eslint/parser": "^8.39.0",
|
|
119
|
-
"@unocss/eslint-plugin": "^66.4.
|
|
120
|
-
"@vitest/eslint-plugin": "^1.
|
|
119
|
+
"@unocss/eslint-plugin": "^66.4.2",
|
|
120
|
+
"@vitest/eslint-plugin": "^1.3.4",
|
|
121
121
|
"eslint-config-flat-gitignore": "^2.1.0",
|
|
122
122
|
"eslint-flat-config-utils": "^2.1.1",
|
|
123
123
|
"eslint-merge-processors": "^2.0.0",
|
|
124
124
|
"eslint-plugin-antfu": "^3.1.1",
|
|
125
|
-
"eslint-plugin-command": "^3.
|
|
125
|
+
"eslint-plugin-command": "^3.3.1",
|
|
126
126
|
"eslint-plugin-format": "^1.0.1",
|
|
127
127
|
"eslint-plugin-import-lite": "^0.3.0",
|
|
128
|
-
"eslint-plugin-jsdoc": "^
|
|
128
|
+
"eslint-plugin-jsdoc": "^53.0.1",
|
|
129
129
|
"eslint-plugin-jsonc": "^2.20.1",
|
|
130
130
|
"eslint-plugin-n": "^17.21.3",
|
|
131
131
|
"eslint-plugin-no-only-tests": "^3.3.0",
|
|
132
132
|
"eslint-plugin-perfectionist": "^4.15.0",
|
|
133
133
|
"eslint-plugin-pnpm": "^1.1.0",
|
|
134
|
-
"eslint-plugin-regexp": "^2.
|
|
134
|
+
"eslint-plugin-regexp": "^2.10.0",
|
|
135
135
|
"eslint-plugin-sonarjs": "^3.0.2",
|
|
136
136
|
"eslint-plugin-toml": "^0.12.0",
|
|
137
137
|
"eslint-plugin-unicorn": "^60.0.0",
|
|
@@ -139,11 +139,11 @@
|
|
|
139
139
|
"eslint-plugin-vue": "^10.4.0",
|
|
140
140
|
"eslint-plugin-yml": "^1.18.0",
|
|
141
141
|
"eslint-processor-vue-blocks": "^2.0.0",
|
|
142
|
-
"globals": "^16.
|
|
142
|
+
"globals": "^16.3.0",
|
|
143
143
|
"jsonc-eslint-parser": "^2.4.0",
|
|
144
144
|
"local-pkg": "^1.1.1",
|
|
145
145
|
"toml-eslint-parser": "^0.10.0",
|
|
146
|
-
"vue-eslint-parser": "^10.
|
|
146
|
+
"vue-eslint-parser": "^10.2.0",
|
|
147
147
|
"yaml-eslint-parser": "^1.3.0"
|
|
148
148
|
},
|
|
149
149
|
"scripts": {
|