@vinicunca/eslint-config 3.21.0 → 3.22.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/index.d.ts +257 -255
  2. package/dist/index.js +5 -4
  3. package/package.json +16 -16
package/dist/index.d.ts CHANGED
@@ -1274,7 +1274,7 @@ interface RuleOptions {
1274
1274
  * Enforce heading levels increment by one
1275
1275
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/heading-increment.md
1276
1276
  */
1277
- 'markdown/heading-increment'?: Linter.RuleEntry<[]>;
1277
+ 'markdown/heading-increment'?: Linter.RuleEntry<MarkdownHeadingIncrement>;
1278
1278
  /**
1279
1279
  * Disallow bare URLs
1280
1280
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-bare-urls.md
@@ -1319,7 +1319,7 @@ interface RuleOptions {
1319
1319
  * Disallow headings without a space after the hash characters
1320
1320
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-missing-atx-heading-space.md
1321
1321
  */
1322
- 'markdown/no-missing-atx-heading-space'?: Linter.RuleEntry<[]>;
1322
+ 'markdown/no-missing-atx-heading-space'?: Linter.RuleEntry<MarkdownNoMissingAtxHeadingSpace>;
1323
1323
  /**
1324
1324
  * Disallow missing label references
1325
1325
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-missing-label-refs.md
@@ -1340,6 +1340,11 @@ interface RuleOptions {
1340
1340
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-reversed-media-syntax.md
1341
1341
  */
1342
1342
  'markdown/no-reversed-media-syntax'?: Linter.RuleEntry<[]>;
1343
+ /**
1344
+ * Disallow spaces around emphasis markers
1345
+ * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-space-in-emphasis.md
1346
+ */
1347
+ 'markdown/no-space-in-emphasis'?: Linter.RuleEntry<MarkdownNoSpaceInEmphasis>;
1343
1348
  /**
1344
1349
  * Disallow unused definitions
1345
1350
  * @see https://github.com/eslint/markdown/blob/main/docs/rules/no-unused-definitions.md
@@ -2918,11 +2923,21 @@ interface RuleOptions {
2918
2923
  * @see https://eslint-react.xyz/docs/rules/no-useless-forward-ref
2919
2924
  */
2920
2925
  'react/ensure-forward-ref-using-ref'?: Linter.RuleEntry<[]>;
2926
+ /**
2927
+ * Enforces that the 'key' attribute is placed before the spread attribute in JSX elements.
2928
+ * @see https://eslint-react.xyz/docs/rules/jsx-key-before-spread
2929
+ */
2930
+ 'react/jsx-key-before-spread'?: Linter.RuleEntry<[]>;
2921
2931
  /**
2922
2932
  * Disallow duplicate props in JSX elements.
2923
2933
  * @see https://eslint-react.xyz/docs/rules/jsx-no-duplicate-props
2924
2934
  */
2925
2935
  'react/jsx-no-duplicate-props'?: Linter.RuleEntry<[]>;
2936
+ /**
2937
+ * Disallows 'IIFE' in JSX elements.
2938
+ * @see https://eslint-react.xyz/docs/rules/jsx-no-iife
2939
+ */
2940
+ 'react/jsx-no-iife'?: Linter.RuleEntry<[]>;
2926
2941
  /**
2927
2942
  * Disallow undefined variables in JSX.
2928
2943
  * @see https://eslint-react.xyz/docs/rules/jsx-no-undef
@@ -2979,7 +2994,7 @@ interface RuleOptions {
2979
2994
  */
2980
2995
  'react/no-children-to-array'?: Linter.RuleEntry<[]>;
2981
2996
  /**
2982
- * Disallow class components.
2997
+ * Disallow class components except for error boundaries.
2983
2998
  * @see https://eslint-react.xyz/docs/rules/no-class-component
2984
2999
  */
2985
3000
  'react/no-class-component'?: Linter.RuleEntry<[]>;
@@ -3078,6 +3093,11 @@ interface RuleOptions {
3078
3093
  * @see https://eslint-react.xyz/docs/rules/no-missing-key
3079
3094
  */
3080
3095
  'react/no-missing-key'?: Linter.RuleEntry<[]>;
3096
+ /**
3097
+ * Prevents incorrect usage of `captureOwnerStack`.
3098
+ * @see https://eslint-react.xyz/docs/rules/no-misused-capture-owner-stack
3099
+ */
3100
+ 'react/no-misused-capture-owner-stack'?: Linter.RuleEntry<[]>;
3081
3101
  /**
3082
3102
  * Disallow nesting component definitions inside other components.
3083
3103
  * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
@@ -3088,6 +3108,11 @@ interface RuleOptions {
3088
3108
  * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
3089
3109
  */
3090
3110
  'react/no-nested-components'?: Linter.RuleEntry<[]>;
3111
+ /**
3112
+ * Disallow nesting lazy component declarations inside other components.
3113
+ * @see https://eslint-react.xyz/docs/rules/no-nested-component-definitions
3114
+ */
3115
+ 'react/no-nested-lazy-component-declarations'?: Linter.RuleEntry<[]>;
3091
3116
  /**
3092
3117
  * Disallow `propTypes` in favor of TypeScript or another type-checking solution.
3093
3118
  * @see https://eslint-react.xyz/docs/rules/no-prop-types
@@ -3104,7 +3129,7 @@ interface RuleOptions {
3104
3129
  */
3105
3130
  'react/no-set-state-in-component-did-mount'?: Linter.RuleEntry<[]>;
3106
3131
  /**
3107
- * Disallows calling `this.setState` in `componentDidUpdate` outside of functions, such as callbacks.
3132
+ * Disallow calling `this.setState` in `componentDidUpdate` outside of functions, such as callbacks.
3108
3133
  * @see https://eslint-react.xyz/docs/rules/no-set-state-in-component-did-update
3109
3134
  */
3110
3135
  'react/no-set-state-in-component-did-update'?: Linter.RuleEntry<[]>;
@@ -3114,7 +3139,7 @@ interface RuleOptions {
3114
3139
  */
3115
3140
  'react/no-set-state-in-component-will-update'?: Linter.RuleEntry<[]>;
3116
3141
  /**
3117
- * Disallow deprecated string `refs`.
3142
+ * Replaces string refs with callback refs.
3118
3143
  * @see https://eslint-react.xyz/docs/rules/no-string-refs
3119
3144
  */
3120
3145
  'react/no-string-refs'?: Linter.RuleEntry<[]>;
@@ -3767,12 +3792,12 @@ interface RuleOptions {
3767
3792
  * Parameters should be passed in the correct order
3768
3793
  * @see https://sonarsource.github.io/rspec/#/rspec/S2234/javascript
3769
3794
  */
3770
- 'sonar/arguments-order'?: Linter.RuleEntry<SonarArgumentsOrder>;
3795
+ 'sonar/arguments-order'?: Linter.RuleEntry<[]>;
3771
3796
  /**
3772
3797
  * "arguments" should not be accessed directly
3773
3798
  * @see https://sonarsource.github.io/rspec/#/rspec/S3513/javascript
3774
3799
  */
3775
- 'sonar/arguments-usage'?: Linter.RuleEntry<SonarArgumentsUsage>;
3800
+ 'sonar/arguments-usage'?: Linter.RuleEntry<[]>;
3776
3801
  /**
3777
3802
  * Callbacks of array methods should have return statements
3778
3803
  * @see https://sonarsource.github.io/rspec/#/rspec/S3796/javascript
@@ -3817,22 +3842,22 @@ interface RuleOptions {
3817
3842
  * Policies granting all privileges are security-sensitive
3818
3843
  * @see https://sonarsource.github.io/rspec/#/rspec/S6302/javascript
3819
3844
  */
3820
- 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<SonarAwsIamAllPrivileges>;
3845
+ 'sonar/aws-iam-all-privileges'?: Linter.RuleEntry<[]>;
3821
3846
  /**
3822
3847
  * Policies granting access to all resources of an account are security-sensitive
3823
3848
  * @see https://sonarsource.github.io/rspec/#/rspec/S6304/javascript
3824
3849
  */
3825
- 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<SonarAwsIamAllResourcesAccessible>;
3850
+ 'sonar/aws-iam-all-resources-accessible'?: Linter.RuleEntry<[]>;
3826
3851
  /**
3827
3852
  * AWS IAM policies should limit the scope of permissions given
3828
3853
  * @see https://sonarsource.github.io/rspec/#/rspec/S6317/javascript
3829
3854
  */
3830
- 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<SonarAwsIamPrivilegeEscalation>;
3855
+ 'sonar/aws-iam-privilege-escalation'?: Linter.RuleEntry<[]>;
3831
3856
  /**
3832
3857
  * Policies authorizing public access to resources are security-sensitive
3833
3858
  * @see https://sonarsource.github.io/rspec/#/rspec/S6270/javascript
3834
3859
  */
3835
- 'sonar/aws-iam-public-access'?: Linter.RuleEntry<SonarAwsIamPublicAccess>;
3860
+ 'sonar/aws-iam-public-access'?: Linter.RuleEntry<[]>;
3836
3861
  /**
3837
3862
  * Using unencrypted Elasticsearch domains is security-sensitive
3838
3863
  * @see https://sonarsource.github.io/rspec/#/rspec/S6308/javascript
@@ -3852,7 +3877,7 @@ interface RuleOptions {
3852
3877
  * Granting access to S3 buckets to all or authenticated users is security-sensitive
3853
3878
  * @see https://sonarsource.github.io/rspec/#/rspec/S6265/javascript
3854
3879
  */
3855
- 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<SonarAwsS3BucketGrantedAccess>;
3880
+ 'sonar/aws-s3-bucket-granted-access'?: Linter.RuleEntry<[]>;
3856
3881
  /**
3857
3882
  * Authorizing HTTP communications with S3 buckets is security-sensitive
3858
3883
  * @see https://sonarsource.github.io/rspec/#/rspec/S6249/javascript
@@ -3862,18 +3887,18 @@ interface RuleOptions {
3862
3887
  * Allowing public ACLs or policies on a S3 bucket is security-sensitive
3863
3888
  * @see https://sonarsource.github.io/rspec/#/rspec/S6281/javascript
3864
3889
  */
3865
- 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<SonarAwsS3BucketPublicAccess>;
3890
+ 'sonar/aws-s3-bucket-public-access'?: Linter.RuleEntry<[]>;
3866
3891
  /**
3867
3892
  * Disabling server-side encryption of S3 buckets is security-sensitive
3868
3893
  * @see https://sonarsource.github.io/rspec/#/rspec/S6245/javascript
3869
3894
  * @deprecated
3870
3895
  */
3871
- 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<SonarAwsS3BucketServerEncryption>;
3896
+ 'sonar/aws-s3-bucket-server-encryption'?: Linter.RuleEntry<[]>;
3872
3897
  /**
3873
3898
  * Disabling versioning of S3 buckets is security-sensitive
3874
3899
  * @see https://sonarsource.github.io/rspec/#/rspec/S6252/javascript
3875
3900
  */
3876
- 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<SonarAwsS3BucketVersioning>;
3901
+ 'sonar/aws-s3-bucket-versioning'?: Linter.RuleEntry<[]>;
3877
3902
  /**
3878
3903
  * Using unencrypted SageMaker notebook instances is security-sensitive
3879
3904
  * @see https://sonarsource.github.io/rspec/#/rspec/S6319/javascript
@@ -3898,7 +3923,7 @@ interface RuleOptions {
3898
3923
  * Variables should be used in the blocks where they are declared
3899
3924
  * @see https://sonarsource.github.io/rspec/#/rspec/S2392/javascript
3900
3925
  */
3901
- 'sonar/block-scoped-var'?: Linter.RuleEntry<SonarBlockScopedVar>;
3926
+ 'sonar/block-scoped-var'?: Linter.RuleEntry<[]>;
3902
3927
  /**
3903
3928
  * Optional boolean parameters should have default value
3904
3929
  * @see https://sonarsource.github.io/rspec/#/rspec/S4798/javascript
@@ -3914,7 +3939,7 @@ interface RuleOptions {
3914
3939
  * @see https://sonarsource.github.io/rspec/#/rspec/S5742/javascript
3915
3940
  * @deprecated
3916
3941
  */
3917
- 'sonar/certificate-transparency'?: Linter.RuleEntry<SonarCertificateTransparency>;
3942
+ 'sonar/certificate-transparency'?: Linter.RuleEntry<[]>;
3918
3943
  /**
3919
3944
  * Chai assertions should have only one reason to succeed
3920
3945
  * @see https://sonarsource.github.io/rspec/#/rspec/S6092/javascript
@@ -3960,12 +3985,12 @@ interface RuleOptions {
3960
3985
  * @see https://sonarsource.github.io/rspec/#/rspec/S3973/javascript
3961
3986
  * @deprecated
3962
3987
  */
3963
- 'sonar/conditional-indentation'?: Linter.RuleEntry<SonarConditionalIndentation>;
3988
+ 'sonar/conditional-indentation'?: Linter.RuleEntry<[]>;
3964
3989
  /**
3965
3990
  * Allowing confidential information to be logged is security-sensitive
3966
3991
  * @see https://sonarsource.github.io/rspec/#/rspec/S5757/javascript
3967
3992
  */
3968
- 'sonar/confidential-information-logging'?: Linter.RuleEntry<SonarConfidentialInformationLogging>;
3993
+ 'sonar/confidential-information-logging'?: Linter.RuleEntry<[]>;
3969
3994
  /**
3970
3995
  * Objects should not be created to be dropped immediately without being used
3971
3996
  * @see https://sonarsource.github.io/rspec/#/rspec/S1848/javascript
@@ -3980,12 +4005,12 @@ interface RuleOptions {
3980
4005
  * Disabling content security policy fetch directives is security-sensitive
3981
4006
  * @see https://sonarsource.github.io/rspec/#/rspec/S5728/javascript
3982
4007
  */
3983
- 'sonar/content-security-policy'?: Linter.RuleEntry<SonarContentSecurityPolicy>;
4008
+ 'sonar/content-security-policy'?: Linter.RuleEntry<[]>;
3984
4009
  /**
3985
4010
  * Creating cookies without the "HttpOnly" flag is security-sensitive
3986
4011
  * @see https://sonarsource.github.io/rspec/#/rspec/S3330/javascript
3987
4012
  */
3988
- 'sonar/cookie-no-httponly'?: Linter.RuleEntry<SonarCookieNoHttponly>;
4013
+ 'sonar/cookie-no-httponly'?: Linter.RuleEntry<[]>;
3989
4014
  /**
3990
4015
  * Writing cookies is security-sensitive
3991
4016
  * @see https://sonarsource.github.io/rspec/#/rspec/S2255/javascript
@@ -3996,12 +4021,12 @@ interface RuleOptions {
3996
4021
  * Having a permissive Cross-Origin Resource Sharing policy is security-sensitive
3997
4022
  * @see https://sonarsource.github.io/rspec/#/rspec/S5122/javascript
3998
4023
  */
3999
- 'sonar/cors'?: Linter.RuleEntry<SonarCors>;
4024
+ 'sonar/cors'?: Linter.RuleEntry<[]>;
4000
4025
  /**
4001
4026
  * Disabling CSRF protections is security-sensitive
4002
4027
  * @see https://sonarsource.github.io/rspec/#/rspec/S4502/javascript
4003
4028
  */
4004
- 'sonar/csrf'?: Linter.RuleEntry<SonarCsrf>;
4029
+ 'sonar/csrf'?: Linter.RuleEntry<[]>;
4005
4030
  /**
4006
4031
  * Cyclomatic Complexity of functions should not be too high
4007
4032
  * @see https://sonarsource.github.io/rspec/#/rspec/S1541/javascript
@@ -4021,17 +4046,17 @@ interface RuleOptions {
4021
4046
  * Destructuring syntax should be used for assignments
4022
4047
  * @see https://sonarsource.github.io/rspec/#/rspec/S3514/javascript
4023
4048
  */
4024
- 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<SonarDestructuringAssignmentSyntax>;
4049
+ 'sonar/destructuring-assignment-syntax'?: Linter.RuleEntry<[]>;
4025
4050
  /**
4026
4051
  * Strict equality operators should not be used with dissimilar types
4027
4052
  * @see https://sonarsource.github.io/rspec/#/rspec/S3403/javascript
4028
4053
  */
4029
- 'sonar/different-types-comparison'?: Linter.RuleEntry<SonarDifferentTypesComparison>;
4054
+ 'sonar/different-types-comparison'?: Linter.RuleEntry<[]>;
4030
4055
  /**
4031
4056
  * Disabling auto-escaping in template engines is security-sensitive
4032
4057
  * @see https://sonarsource.github.io/rspec/#/rspec/S5247/javascript
4033
4058
  */
4034
- 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<SonarDisabledAutoEscaping>;
4059
+ 'sonar/disabled-auto-escaping'?: Linter.RuleEntry<[]>;
4035
4060
  /**
4036
4061
  * Using remote artifacts without integrity checks is security-sensitive
4037
4062
  * @see https://sonarsource.github.io/rspec/#/rspec/S5725/javascript
@@ -4047,12 +4072,12 @@ interface RuleOptions {
4047
4072
  * @see https://sonarsource.github.io/rspec/#/rspec/S5743/javascript
4048
4073
  * @deprecated
4049
4074
  */
4050
- 'sonar/dns-prefetching'?: Linter.RuleEntry<SonarDnsPrefetching>;
4075
+ 'sonar/dns-prefetching'?: Linter.RuleEntry<[]>;
4051
4076
  /**
4052
4077
  * Character classes in regular expressions should not contain the same character twice
4053
4078
  * @see https://sonarsource.github.io/rspec/#/rspec/S5869/javascript
4054
4079
  */
4055
- 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<SonarDuplicatesInCharacterClass>;
4080
+ 'sonar/duplicates-in-character-class'?: Linter.RuleEntry<[]>;
4056
4081
  /**
4057
4082
  * "if ... else if" constructs should end with "else" clauses
4058
4083
  * @see https://sonarsource.github.io/rspec/#/rspec/S126/javascript
@@ -4109,7 +4134,7 @@ interface RuleOptions {
4109
4134
  * File uploads should be restricted
4110
4135
  * @see https://sonarsource.github.io/rspec/#/rspec/S2598/javascript
4111
4136
  */
4112
- 'sonar/file-uploads'?: Linter.RuleEntry<SonarFileUploads>;
4137
+ 'sonar/file-uploads'?: Linter.RuleEntry<[]>;
4113
4138
  /**
4114
4139
  * Track uses of "FIXME" tags
4115
4140
  * @see https://sonarsource.github.io/rspec/#/rspec/S1134/javascript
@@ -4124,17 +4149,17 @@ interface RuleOptions {
4124
4149
  * A "for" loop update clause should move the counter in the right direction
4125
4150
  * @see https://sonarsource.github.io/rspec/#/rspec/S2251/javascript
4126
4151
  */
4127
- 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<SonarForLoopIncrementSign>;
4152
+ 'sonar/for-loop-increment-sign'?: Linter.RuleEntry<[]>;
4128
4153
  /**
4129
4154
  * Disabling content security policy frame-ancestors directive is security-sensitive
4130
4155
  * @see https://sonarsource.github.io/rspec/#/rspec/S5732/javascript
4131
4156
  */
4132
- 'sonar/frame-ancestors'?: Linter.RuleEntry<SonarFrameAncestors>;
4157
+ 'sonar/frame-ancestors'?: Linter.RuleEntry<[]>;
4133
4158
  /**
4134
4159
  * Functions should not be defined inside loops
4135
4160
  * @see https://sonarsource.github.io/rspec/#/rspec/S1515/javascript
4136
4161
  */
4137
- 'sonar/function-inside-loop'?: Linter.RuleEntry<SonarFunctionInsideLoop>;
4162
+ 'sonar/function-inside-loop'?: Linter.RuleEntry<[]>;
4138
4163
  /**
4139
4164
  * Function and method names should comply with a naming convention
4140
4165
  * @see https://sonarsource.github.io/rspec/#/rspec/S100/javascript
@@ -4144,7 +4169,7 @@ interface RuleOptions {
4144
4169
  * Functions should always return the same type
4145
4170
  * @see https://sonarsource.github.io/rspec/#/rspec/S3800/javascript
4146
4171
  */
4147
- 'sonar/function-return-type'?: Linter.RuleEntry<SonarFunctionReturnType>;
4172
+ 'sonar/function-return-type'?: Linter.RuleEntry<[]>;
4148
4173
  /**
4149
4174
  * Future reserved words should not be used as identifiers
4150
4175
  * @see https://sonarsource.github.io/rspec/#/rspec/S1527/javascript
@@ -4169,12 +4194,12 @@ interface RuleOptions {
4169
4194
  * "in" should not be used with primitive types
4170
4195
  * @see https://sonarsource.github.io/rspec/#/rspec/S3785/javascript
4171
4196
  */
4172
- 'sonar/in-operator-type-error'?: Linter.RuleEntry<SonarInOperatorTypeError>;
4197
+ 'sonar/in-operator-type-error'?: Linter.RuleEntry<[]>;
4173
4198
  /**
4174
4199
  * Functions should be called consistently with or without "new"
4175
4200
  * @see https://sonarsource.github.io/rspec/#/rspec/S3686/javascript
4176
4201
  */
4177
- 'sonar/inconsistent-function-call'?: Linter.RuleEntry<SonarInconsistentFunctionCall>;
4202
+ 'sonar/inconsistent-function-call'?: Linter.RuleEntry<[]>;
4178
4203
  /**
4179
4204
  * "indexOf" checks should not be for positive numbers
4180
4205
  * @see https://sonarsource.github.io/rspec/#/rspec/S2692/javascript
@@ -4184,17 +4209,17 @@ interface RuleOptions {
4184
4209
  * Creating cookies without the "secure" flag is security-sensitive
4185
4210
  * @see https://sonarsource.github.io/rspec/#/rspec/S2092/javascript
4186
4211
  */
4187
- 'sonar/insecure-cookie'?: Linter.RuleEntry<SonarInsecureCookie>;
4212
+ 'sonar/insecure-cookie'?: Linter.RuleEntry<[]>;
4188
4213
  /**
4189
4214
  * JWT should be signed and verified with strong cipher algorithms
4190
4215
  * @see https://sonarsource.github.io/rspec/#/rspec/S5659/javascript
4191
4216
  */
4192
- 'sonar/insecure-jwt-token'?: Linter.RuleEntry<SonarInsecureJwtToken>;
4217
+ 'sonar/insecure-jwt-token'?: Linter.RuleEntry<[]>;
4193
4218
  /**
4194
4219
  * Assertion arguments should be passed in the correct order
4195
4220
  * @see https://sonarsource.github.io/rspec/#/rspec/S3415/javascript
4196
4221
  */
4197
- 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<SonarInvertedAssertionArguments>;
4222
+ 'sonar/inverted-assertion-arguments'?: Linter.RuleEntry<[]>;
4198
4223
  /**
4199
4224
  * React components should not render non-boolean condition values
4200
4225
  * @see https://sonarsource.github.io/rspec/#/rspec/S6439/javascript
@@ -4294,12 +4319,12 @@ interface RuleOptions {
4294
4319
  * Tests should not execute any code after "done()" is called
4295
4320
  * @see https://sonarsource.github.io/rspec/#/rspec/S6079/javascript
4296
4321
  */
4297
- 'sonar/no-code-after-done'?: Linter.RuleEntry<SonarNoCodeAfterDone>;
4322
+ 'sonar/no-code-after-done'?: Linter.RuleEntry<[]>;
4298
4323
  /**
4299
4324
  * Mergeable "if" statements should be combined
4300
4325
  * @see https://sonarsource.github.io/rspec/#/rspec/S1066/javascript
4301
4326
  */
4302
- 'sonar/no-collapsible-if'?: Linter.RuleEntry<SonarNoCollapsibleIf>;
4327
+ 'sonar/no-collapsible-if'?: Linter.RuleEntry<[]>;
4303
4328
  /**
4304
4329
  * Collection size and array length comparisons should make sense
4305
4330
  * @see https://sonarsource.github.io/rspec/#/rspec/S3981/javascript
@@ -4329,7 +4354,7 @@ interface RuleOptions {
4329
4354
  * Union and intersection types should not include duplicated constituents
4330
4355
  * @see https://sonarsource.github.io/rspec/#/rspec/S4621/javascript
4331
4356
  */
4332
- 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<SonarNoDuplicateInComposite>;
4357
+ 'sonar/no-duplicate-in-composite'?: Linter.RuleEntry<[]>;
4333
4358
  /**
4334
4359
  * String literals should not be duplicated
4335
4360
  * @see https://sonarsource.github.io/rspec/#/rspec/S1192/javascript
@@ -4339,12 +4364,12 @@ interface RuleOptions {
4339
4364
  * Two branches in a conditional structure should not have exactly the same implementation
4340
4365
  * @see https://sonarsource.github.io/rspec/#/rspec/S1871/javascript
4341
4366
  */
4342
- 'sonar/no-duplicated-branches'?: Linter.RuleEntry<SonarNoDuplicatedBranches>;
4367
+ 'sonar/no-duplicated-branches'?: Linter.RuleEntry<[]>;
4343
4368
  /**
4344
4369
  * Collection elements should not be replaced unconditionally
4345
4370
  * @see https://sonarsource.github.io/rspec/#/rspec/S4143/javascript
4346
4371
  */
4347
- 'sonar/no-element-overwrite'?: Linter.RuleEntry<SonarNoElementOverwrite>;
4372
+ 'sonar/no-element-overwrite'?: Linter.RuleEntry<[]>;
4348
4373
  /**
4349
4374
  * Reluctant quantifiers in regular expressions should be followed by an expression that can't match the empty string
4350
4375
  * @see https://sonarsource.github.io/rspec/#/rspec/S6019/javascript
@@ -4381,7 +4406,7 @@ interface RuleOptions {
4381
4406
  */
4382
4407
  'sonar/no-equals-in-for-termination'?: Linter.RuleEntry<[]>;
4383
4408
  /**
4384
- * Exclusive tests should not be commited to version control
4409
+ * Exclusive tests should not be committed to version control
4385
4410
  * @see https://sonarsource.github.io/rspec/#/rspec/S6426/javascript
4386
4411
  */
4387
4412
  'sonar/no-exclusive-tests'?: Linter.RuleEntry<[]>;
@@ -4389,7 +4414,7 @@ interface RuleOptions {
4389
4414
  * Function calls should not pass extra arguments
4390
4415
  * @see https://sonarsource.github.io/rspec/#/rspec/S930/javascript
4391
4416
  */
4392
- 'sonar/no-extra-arguments'?: Linter.RuleEntry<SonarNoExtraArguments>;
4417
+ 'sonar/no-extra-arguments'?: Linter.RuleEntry<[]>;
4393
4418
  /**
4394
4419
  * Switch cases should end with an unconditional "break" statement
4395
4420
  * @see https://sonarsource.github.io/rspec/#/rspec/S128/javascript
@@ -4419,7 +4444,7 @@ interface RuleOptions {
4419
4444
  * Boolean expressions should not be gratuitous
4420
4445
  * @see https://sonarsource.github.io/rspec/#/rspec/S2589/javascript
4421
4446
  */
4422
- 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<SonarNoGratuitousExpressions>;
4447
+ 'sonar/no-gratuitous-expressions'?: Linter.RuleEntry<[]>;
4423
4448
  /**
4424
4449
  * Using hardcoded IP addresses is security-sensitive
4425
4450
  * @see https://sonarsource.github.io/rspec/#/rspec/S1313/javascript
@@ -4444,12 +4469,12 @@ interface RuleOptions {
4444
4469
  * "if/else if" chains and "switch" cases should not have the same condition
4445
4470
  * @see https://sonarsource.github.io/rspec/#/rspec/S1862/javascript
4446
4471
  */
4447
- 'sonar/no-identical-conditions'?: Linter.RuleEntry<SonarNoIdenticalConditions>;
4472
+ 'sonar/no-identical-conditions'?: Linter.RuleEntry<[]>;
4448
4473
  /**
4449
4474
  * Identical expressions should not be used on both sides of a binary operator
4450
4475
  * @see https://sonarsource.github.io/rspec/#/rspec/S1764/javascript
4451
4476
  */
4452
- 'sonar/no-identical-expressions'?: Linter.RuleEntry<SonarNoIdenticalExpressions>;
4477
+ 'sonar/no-identical-expressions'?: Linter.RuleEntry<[]>;
4453
4478
  /**
4454
4479
  * Functions should not have identical implementations
4455
4480
  * @see https://sonarsource.github.io/rspec/#/rspec/S4144/javascript
@@ -4489,12 +4514,12 @@ interface RuleOptions {
4489
4514
  * Functions should use "return" consistently
4490
4515
  * @see https://sonarsource.github.io/rspec/#/rspec/S3801/javascript
4491
4516
  */
4492
- 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<SonarNoInconsistentReturns>;
4517
+ 'sonar/no-inconsistent-returns'?: Linter.RuleEntry<[]>;
4493
4518
  /**
4494
4519
  * Strings and non-strings should not be added
4495
4520
  * @see https://sonarsource.github.io/rspec/#/rspec/S3402/javascript
4496
4521
  */
4497
- 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<SonarNoIncorrectStringConcat>;
4522
+ 'sonar/no-incorrect-string-concat'?: Linter.RuleEntry<[]>;
4498
4523
  /**
4499
4524
  * Users should not use internal APIs
4500
4525
  * @see https://sonarsource.github.io/rspec/#/rspec/S6627/javascript
@@ -4505,11 +4530,6 @@ interface RuleOptions {
4505
4530
  * @see https://sonarsource.github.io/rspec/#/rspec/S5604/javascript
4506
4531
  */
4507
4532
  'sonar/no-intrusive-permissions'?: Linter.RuleEntry<SonarNoIntrusivePermissions>;
4508
- /**
4509
- * "await" should only be used with promises
4510
- * @see https://sonarsource.github.io/rspec/#/rspec/S4123/javascript
4511
- */
4512
- 'sonar/no-invalid-await'?: Linter.RuleEntry<[]>;
4513
4533
  /**
4514
4534
  * Regular expressions should be syntactically valid
4515
4535
  * @see https://sonarsource.github.io/rspec/#/rspec/S5856/javascript
@@ -4519,7 +4539,7 @@ interface RuleOptions {
4519
4539
  * Function returns should not be invariant
4520
4540
  * @see https://sonarsource.github.io/rspec/#/rspec/S3516/javascript
4521
4541
  */
4522
- 'sonar/no-invariant-returns'?: Linter.RuleEntry<SonarNoInvariantReturns>;
4542
+ 'sonar/no-invariant-returns'?: Linter.RuleEntry<[]>;
4523
4543
  /**
4524
4544
  * Boolean checks should not be inverted
4525
4545
  * @see https://sonarsource.github.io/rspec/#/rspec/S1940/javascript
@@ -4529,7 +4549,7 @@ interface RuleOptions {
4529
4549
  * Forwarding client IP address is security-sensitive
4530
4550
  * @see https://sonarsource.github.io/rspec/#/rspec/S5759/javascript
4531
4551
  */
4532
- 'sonar/no-ip-forward'?: Linter.RuleEntry<SonarNoIpForward>;
4552
+ 'sonar/no-ip-forward'?: Linter.RuleEntry<[]>;
4533
4553
  /**
4534
4554
  * Labels should not be used
4535
4555
  * @see https://sonarsource.github.io/rspec/#/rspec/S1119/javascript
@@ -4544,7 +4564,7 @@ interface RuleOptions {
4544
4564
  * Allowing browsers to sniff MIME types is security-sensitive
4545
4565
  * @see https://sonarsource.github.io/rspec/#/rspec/S5734/javascript
4546
4566
  */
4547
- 'sonar/no-mime-sniff'?: Linter.RuleEntry<SonarNoMimeSniff>;
4567
+ 'sonar/no-mime-sniff'?: Linter.RuleEntry<[]>;
4548
4568
  /**
4549
4569
  * Array-mutating methods should not be used misleadingly
4550
4570
  * @see https://sonarsource.github.io/rspec/#/rspec/S4043/javascript
@@ -4559,7 +4579,7 @@ interface RuleOptions {
4559
4579
  * Allowing mixed-content is security-sensitive
4560
4580
  * @see https://sonarsource.github.io/rspec/#/rspec/S5730/javascript
4561
4581
  */
4562
- 'sonar/no-mixed-content'?: Linter.RuleEntry<SonarNoMixedContent>;
4582
+ 'sonar/no-mixed-content'?: Linter.RuleEntry<[]>;
4563
4583
  /**
4564
4584
  * Assignments should not be made from within sub-expressions
4565
4585
  * @see https://sonarsource.github.io/rspec/#/rspec/S1121/javascript
@@ -4590,11 +4610,6 @@ interface RuleOptions {
4590
4610
  * @see https://sonarsource.github.io/rspec/#/rspec/S4624/javascript
4591
4611
  */
4592
4612
  'sonar/no-nested-template-literals'?: Linter.RuleEntry<[]>;
4593
- /**
4594
- * Loops with at most one iteration should be refactored
4595
- * @see https://sonarsource.github.io/rspec/#/rspec/S1751/javascript
4596
- */
4597
- 'sonar/no-one-iteration-loop'?: Linter.RuleEntry<[]>;
4598
4613
  /**
4599
4614
  * Searching OS commands in PATH is security-sensitive
4600
4615
  * @see https://sonarsource.github.io/rspec/#/rspec/S4036/javascript
@@ -4629,23 +4644,23 @@ interface RuleOptions {
4629
4644
  * Optional property declarations should not use both '?' and 'undefined' syntax
4630
4645
  * @see https://sonarsource.github.io/rspec/#/rspec/S4782/javascript
4631
4646
  */
4632
- 'sonar/no-redundant-optional'?: Linter.RuleEntry<SonarNoRedundantOptional>;
4647
+ 'sonar/no-redundant-optional'?: Linter.RuleEntry<[]>;
4633
4648
  /**
4634
4649
  * Redundant pairs of parentheses should be removed
4635
4650
  * @see https://sonarsource.github.io/rspec/#/rspec/S1110/javascript
4636
4651
  * @deprecated
4637
4652
  */
4638
- 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<SonarNoRedundantParentheses>;
4653
+ 'sonar/no-redundant-parentheses'?: Linter.RuleEntry<[]>;
4639
4654
  /**
4640
4655
  * Variables should be defined before being used
4641
4656
  * @see https://sonarsource.github.io/rspec/#/rspec/S3827/javascript
4642
4657
  */
4643
- 'sonar/no-reference-error'?: Linter.RuleEntry<SonarNoReferenceError>;
4658
+ 'sonar/no-reference-error'?: Linter.RuleEntry<[]>;
4644
4659
  /**
4645
4660
  * Disabling strict HTTP no-referrer policy is security-sensitive
4646
4661
  * @see https://sonarsource.github.io/rspec/#/rspec/S5736/javascript
4647
4662
  */
4648
- 'sonar/no-referrer-policy'?: Linter.RuleEntry<SonarNoReferrerPolicy>;
4663
+ 'sonar/no-referrer-policy'?: Linter.RuleEntry<[]>;
4649
4664
  /**
4650
4665
  * Regular expressions should not contain multiple spaces
4651
4666
  * @see https://sonarsource.github.io/rspec/#/rspec/S6326/javascript
@@ -4665,17 +4680,17 @@ interface RuleOptions {
4665
4680
  * Assertions should not be given twice the same argument
4666
4681
  * @see https://sonarsource.github.io/rspec/#/rspec/S5863/javascript
4667
4682
  */
4668
- 'sonar/no-same-argument-assert'?: Linter.RuleEntry<SonarNoSameArgumentAssert>;
4683
+ 'sonar/no-same-argument-assert'?: Linter.RuleEntry<[]>;
4669
4684
  /**
4670
4685
  * Conditionals should start on new lines
4671
4686
  * @see https://sonarsource.github.io/rspec/#/rspec/S3972/javascript
4672
4687
  */
4673
- 'sonar/no-same-line-conditional'?: Linter.RuleEntry<SonarNoSameLineConditional>;
4688
+ 'sonar/no-same-line-conditional'?: Linter.RuleEntry<[]>;
4674
4689
  /**
4675
4690
  * Methods should not contain selector parameters
4676
4691
  * @see https://sonarsource.github.io/rspec/#/rspec/S2301/javascript
4677
4692
  */
4678
- 'sonar/no-selector-parameter'?: Linter.RuleEntry<SonarNoSelectorParameter>;
4693
+ 'sonar/no-selector-parameter'?: Linter.RuleEntry<[]>;
4679
4694
  /**
4680
4695
  * Tests should not be skipped without providing a reason
4681
4696
  * @see https://sonarsource.github.io/rspec/#/rspec/S1607/javascript
@@ -4706,7 +4721,7 @@ interface RuleOptions {
4706
4721
  * Promise rejections should not be caught by "try" blocks
4707
4722
  * @see https://sonarsource.github.io/rspec/#/rspec/S4822/javascript
4708
4723
  */
4709
- 'sonar/no-try-promise'?: Linter.RuleEntry<SonarNoTryPromise>;
4724
+ 'sonar/no-try-promise'?: Linter.RuleEntry<[]>;
4710
4725
  /**
4711
4726
  * "undefined" should not be passed as the value of optional parameters
4712
4727
  * @see https://sonarsource.github.io/rspec/#/rspec/S4623/javascript
@@ -4781,7 +4796,7 @@ interface RuleOptions {
4781
4796
  * Variables declared with "var" should be declared before they are used
4782
4797
  * @see https://sonarsource.github.io/rspec/#/rspec/S1526/javascript
4783
4798
  */
4784
- 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<SonarNoVariableUsageBeforeDeclaration>;
4799
+ 'sonar/no-variable-usage-before-declaration'?: Linter.RuleEntry<[]>;
4785
4800
  /**
4786
4801
  * Disabling Vue.js built-in escaping is security-sensitive
4787
4802
  * @see https://sonarsource.github.io/rspec/#/rspec/S6299/javascript
@@ -4812,7 +4827,7 @@ interface RuleOptions {
4812
4827
  * Arithmetic operators should only have numbers as operands
4813
4828
  * @see https://sonarsource.github.io/rspec/#/rspec/S3760/javascript
4814
4829
  */
4815
- 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<SonarNonNumberInArithmeticExpression>;
4830
+ 'sonar/non-number-in-arithmetic-expression'?: Linter.RuleEntry<[]>;
4816
4831
  /**
4817
4832
  * Properties of variables with "null" or "undefined" values should not be accessed
4818
4833
  * @see https://sonarsource.github.io/rspec/#/rspec/S2259/javascript
@@ -4939,7 +4954,7 @@ interface RuleOptions {
4939
4954
  * Shorthand object properties should be grouped at the beginning or end of an object declaration
4940
4955
  * @see https://sonarsource.github.io/rspec/#/rspec/S3499/javascript
4941
4956
  */
4942
- 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<SonarShorthandPropertyGrouping>;
4957
+ 'sonar/shorthand-property-grouping'?: Linter.RuleEntry<[]>;
4943
4958
  /**
4944
4959
  * Character classes in regular expressions should not contain only one character
4945
4960
  * @see https://sonarsource.github.io/rspec/#/rspec/S6397/javascript
@@ -4981,17 +4996,17 @@ interface RuleOptions {
4981
4996
  * Regular expressions with the global flag should be used with caution
4982
4997
  * @see https://sonarsource.github.io/rspec/#/rspec/S6351/javascript
4983
4998
  */
4984
- 'sonar/stateful-regex'?: Linter.RuleEntry<SonarStatefulRegex>;
4999
+ 'sonar/stateful-regex'?: Linter.RuleEntry<[]>;
4985
5000
  /**
4986
5001
  * Disabling Strict-Transport-Security policy is security-sensitive
4987
5002
  * @see https://sonarsource.github.io/rspec/#/rspec/S5739/javascript
4988
5003
  */
4989
- 'sonar/strict-transport-security'?: Linter.RuleEntry<SonarStrictTransportSecurity>;
5004
+ 'sonar/strict-transport-security'?: Linter.RuleEntry<[]>;
4990
5005
  /**
4991
5006
  * Comparison operators should not be used with strings
4992
5007
  * @see https://sonarsource.github.io/rspec/#/rspec/S3003/javascript
4993
5008
  */
4994
- 'sonar/strings-comparison'?: Linter.RuleEntry<SonarStringsComparison>;
5009
+ 'sonar/strings-comparison'?: Linter.RuleEntry<[]>;
4995
5010
  /**
4996
5011
  * "super()" should be invoked appropriately
4997
5012
  * @see https://sonarsource.github.io/rspec/#/rspec/S3854/javascript
@@ -5021,12 +5036,12 @@ interface RuleOptions {
5021
5036
  * Loops should not contain more than a single "break" or "continue" statement
5022
5037
  * @see https://sonarsource.github.io/rspec/#/rspec/S135/javascript
5023
5038
  */
5024
- 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<SonarTooManyBreakOrContinueInLoop>;
5039
+ 'sonar/too-many-break-or-continue-in-loop'?: Linter.RuleEntry<[]>;
5025
5040
  /**
5026
5041
  * Regular expressions using Unicode character classes or property escapes should enable the unicode flag
5027
5042
  * @see https://sonarsource.github.io/rspec/#/rspec/S5867/javascript
5028
5043
  */
5029
- 'sonar/unicode-aware-regex'?: Linter.RuleEntry<SonarUnicodeAwareRegex>;
5044
+ 'sonar/unicode-aware-regex'?: Linter.RuleEntry<[]>;
5030
5045
  /**
5031
5046
  * Unnecessary imports should be removed
5032
5047
  * @see https://sonarsource.github.io/rspec/#/rspec/S1128/javascript
@@ -5036,32 +5051,32 @@ interface RuleOptions {
5036
5051
  * Names of regular expressions named groups should be used
5037
5052
  * @see https://sonarsource.github.io/rspec/#/rspec/S5860/javascript
5038
5053
  */
5039
- 'sonar/unused-named-groups'?: Linter.RuleEntry<SonarUnusedNamedGroups>;
5054
+ 'sonar/unused-named-groups'?: Linter.RuleEntry<[]>;
5040
5055
  /**
5041
5056
  * Server certificates should be verified during SSL/TLS connections
5042
5057
  * @see https://sonarsource.github.io/rspec/#/rspec/S4830/javascript
5043
5058
  */
5044
- 'sonar/unverified-certificate'?: Linter.RuleEntry<SonarUnverifiedCertificate>;
5059
+ 'sonar/unverified-certificate'?: Linter.RuleEntry<[]>;
5045
5060
  /**
5046
5061
  * Server hostnames should be verified during SSL/TLS connections
5047
5062
  * @see https://sonarsource.github.io/rspec/#/rspec/S5527/javascript
5048
5063
  */
5049
- 'sonar/unverified-hostname'?: Linter.RuleEntry<SonarUnverifiedHostname>;
5064
+ 'sonar/unverified-hostname'?: Linter.RuleEntry<[]>;
5050
5065
  /**
5051
5066
  * "const" variables should not be reassigned
5052
5067
  * @see https://sonarsource.github.io/rspec/#/rspec/S3500/javascript
5053
5068
  */
5054
- 'sonar/updated-const-var'?: Linter.RuleEntry<SonarUpdatedConstVar>;
5069
+ 'sonar/updated-const-var'?: Linter.RuleEntry<[]>;
5055
5070
  /**
5056
5071
  * Loop counters should not be assigned within the loop body
5057
5072
  * @see https://sonarsource.github.io/rspec/#/rspec/S2310/javascript
5058
5073
  */
5059
- 'sonar/updated-loop-counter'?: Linter.RuleEntry<SonarUpdatedLoopCounter>;
5074
+ 'sonar/updated-loop-counter'?: Linter.RuleEntry<[]>;
5060
5075
  /**
5061
5076
  * Type aliases should be used
5062
5077
  * @see https://sonarsource.github.io/rspec/#/rspec/S4323/javascript
5063
5078
  */
5064
- 'sonar/use-type-alias'?: Linter.RuleEntry<SonarUseTypeAlias>;
5079
+ 'sonar/use-type-alias'?: Linter.RuleEntry<[]>;
5065
5080
  /**
5066
5081
  * Results of operations on strings should not be ignored
5067
5082
  * @see https://sonarsource.github.io/rspec/#/rspec/S1154/javascript
@@ -5103,7 +5118,7 @@ interface RuleOptions {
5103
5118
  * XML parsers should not be vulnerable to XXE attacks
5104
5119
  * @see https://sonarsource.github.io/rspec/#/rspec/S2755/javascript
5105
5120
  */
5106
- 'sonar/xml-parser-xxe'?: Linter.RuleEntry<SonarXmlParserXxe>;
5121
+ 'sonar/xml-parser-xxe'?: Linter.RuleEntry<[]>;
5107
5122
  /**
5108
5123
  * Executing XPath expressions is security-sensitive
5109
5124
  * @see https://sonarsource.github.io/rspec/#/rspec/S4817/javascript
@@ -5663,6 +5678,11 @@ interface RuleOptions {
5663
5678
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/comment-directive/
5664
5679
  */
5665
5680
  'svelte/comment-directive'?: Linter.RuleEntry<SvelteCommentDirective>;
5681
+ /**
5682
+ * enforce a consistent style for CSS selectors
5683
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/consistent-selector-style/
5684
+ */
5685
+ 'svelte/consistent-selector-style'?: Linter.RuleEntry<SvelteConsistentSelectorStyle>;
5666
5686
  /**
5667
5687
  * derived store should use same variable names between values and callback
5668
5688
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/derived-has-same-inputs-outputs/
@@ -5723,6 +5743,11 @@ interface RuleOptions {
5723
5743
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/mustache-spacing/
5724
5744
  */
5725
5745
  'svelte/mustache-spacing'?: Linter.RuleEntry<SvelteMustacheSpacing>;
5746
+ /**
5747
+ * Warns against the use of `addEventListener`
5748
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-add-event-listener/
5749
+ */
5750
+ 'svelte/no-add-event-listener'?: Linter.RuleEntry<[]>;
5726
5751
  /**
5727
5752
  * disallow the use of `{@debug}`
5728
5753
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-at-debug-tags/
@@ -5761,6 +5786,7 @@ interface RuleOptions {
5761
5786
  /**
5762
5787
  * disallow dynamic slot name
5763
5788
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-dynamic-slot-name/
5789
+ * @deprecated
5764
5790
  */
5765
5791
  'svelte/no-dynamic-slot-name'?: Linter.RuleEntry<[]>;
5766
5792
  /**
@@ -5776,6 +5802,7 @@ interface RuleOptions {
5776
5802
  /**
5777
5803
  * disallow using goto() without the base path
5778
5804
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-goto-without-base/
5805
+ * @deprecated
5779
5806
  */
5780
5807
  'svelte/no-goto-without-base'?: Linter.RuleEntry<[]>;
5781
5808
  /**
@@ -5803,6 +5830,11 @@ interface RuleOptions {
5803
5830
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-inspect/
5804
5831
  */
5805
5832
  'svelte/no-inspect'?: Linter.RuleEntry<[]>;
5833
+ /**
5834
+ * disallow using navigation (links, goto, pushState, replaceState) without the base path
5835
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-navigation-without-base/
5836
+ */
5837
+ 'svelte/no-navigation-without-base'?: Linter.RuleEntry<SvelteNoNavigationWithoutBase>;
5806
5838
  /**
5807
5839
  * disallow use of not function in event handler
5808
5840
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-not-function-handler/
@@ -5813,6 +5845,11 @@ interface RuleOptions {
5813
5845
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-object-in-text-mustaches/
5814
5846
  */
5815
5847
  'svelte/no-object-in-text-mustaches'?: Linter.RuleEntry<[]>;
5848
+ /**
5849
+ * Checks for invalid raw HTML elements
5850
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-raw-special-elements/
5851
+ */
5852
+ 'svelte/no-raw-special-elements'?: Linter.RuleEntry<[]>;
5816
5853
  /**
5817
5854
  * it's not necessary to define functions in reactive statements
5818
5855
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-reactive-functions/
@@ -5858,6 +5895,11 @@ interface RuleOptions {
5858
5895
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-target-blank/
5859
5896
  */
5860
5897
  'svelte/no-target-blank'?: Linter.RuleEntry<SvelteNoTargetBlank>;
5898
+ /**
5899
+ * disallow using top-level browser global variables
5900
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-top-level-browser-globals/
5901
+ */
5902
+ 'svelte/no-top-level-browser-globals'?: Linter.RuleEntry<[]>;
5861
5903
  /**
5862
5904
  * disallow trailing whitespace at the end of lines
5863
5905
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-trailing-spaces/
@@ -5868,16 +5910,31 @@ interface RuleOptions {
5868
5910
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unknown-style-directive-property/
5869
5911
  */
5870
5912
  'svelte/no-unknown-style-directive-property'?: Linter.RuleEntry<SvelteNoUnknownStyleDirectiveProperty>;
5913
+ /**
5914
+ * Disallow unnecessary $state wrapping of reactive classes
5915
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unnecessary-state-wrap/
5916
+ */
5917
+ 'svelte/no-unnecessary-state-wrap'?: Linter.RuleEntry<SvelteNoUnnecessaryStateWrap>;
5871
5918
  /**
5872
5919
  * disallow the use of a class in the template without a corresponding style
5873
5920
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-class-name/
5874
5921
  */
5875
5922
  'svelte/no-unused-class-name'?: Linter.RuleEntry<SvelteNoUnusedClassName>;
5923
+ /**
5924
+ * Warns about defined Props properties that are unused
5925
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-props/
5926
+ */
5927
+ 'svelte/no-unused-props'?: Linter.RuleEntry<SvelteNoUnusedProps>;
5876
5928
  /**
5877
5929
  * disallow unused svelte-ignore comments
5878
5930
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-unused-svelte-ignore/
5879
5931
  */
5880
5932
  'svelte/no-unused-svelte-ignore'?: Linter.RuleEntry<[]>;
5933
+ /**
5934
+ * disallow explicit children snippet where it's not needed
5935
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-children-snippet/
5936
+ */
5937
+ 'svelte/no-useless-children-snippet'?: Linter.RuleEntry<[]>;
5881
5938
  /**
5882
5939
  * disallow unnecessary mustache interpolations
5883
5940
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/no-useless-mustaches/
@@ -5888,6 +5945,11 @@ interface RuleOptions {
5888
5945
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-class-directive/
5889
5946
  */
5890
5947
  'svelte/prefer-class-directive'?: Linter.RuleEntry<SveltePreferClassDirective>;
5948
+ /**
5949
+ * Require `const` declarations for variables that are never reassigned after declared
5950
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-const/
5951
+ */
5952
+ 'svelte/prefer-const'?: Linter.RuleEntry<SveltePreferConst>;
5891
5953
  /**
5892
5954
  * destructure values from object stores for better change tracking & fewer redraws
5893
5955
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-destructured-store-props/
@@ -5898,6 +5960,16 @@ interface RuleOptions {
5898
5960
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-style-directive/
5899
5961
  */
5900
5962
  'svelte/prefer-style-directive'?: Linter.RuleEntry<[]>;
5963
+ /**
5964
+ * disallow using mutable instances of built-in classes where a reactive alternative is provided by svelte/reactivity
5965
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-svelte-reactivity/
5966
+ */
5967
+ 'svelte/prefer-svelte-reactivity'?: Linter.RuleEntry<[]>;
5968
+ /**
5969
+ * Prefer using writable $derived instead of $state and $effect
5970
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/prefer-writable-derived/
5971
+ */
5972
+ 'svelte/prefer-writable-derived'?: Linter.RuleEntry<[]>;
5901
5973
  /**
5902
5974
  * require keyed `{#each}` block
5903
5975
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-each-key/
@@ -5908,6 +5980,11 @@ interface RuleOptions {
5908
5980
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-dispatcher-types/
5909
5981
  */
5910
5982
  'svelte/require-event-dispatcher-types'?: Linter.RuleEntry<[]>;
5983
+ /**
5984
+ * require component event names to start with "on"
5985
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-event-prefix/
5986
+ */
5987
+ 'svelte/require-event-prefix'?: Linter.RuleEntry<SvelteRequireEventPrefix>;
5911
5988
  /**
5912
5989
  * require style attributes that can be optimized
5913
5990
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/require-optimized-style-attribute/
@@ -5968,6 +6045,11 @@ interface RuleOptions {
5968
6045
  * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-prop-names-in-kit-pages/
5969
6046
  */
5970
6047
  'svelte/valid-prop-names-in-kit-pages'?: Linter.RuleEntry<[]>;
6048
+ /**
6049
+ * require valid style element parsing
6050
+ * @see https://sveltejs.github.io/eslint-plugin-svelte/rules/valid-style-parse/
6051
+ */
6052
+ 'svelte/valid-style-parse'?: Linter.RuleEntry<[]>;
5971
6053
  /**
5972
6054
  * Enforce spacing around colons of switch statements
5973
6055
  * @see https://eslint.org/docs/latest/rules/switch-colon-spacing
@@ -6172,6 +6254,16 @@ interface RuleOptions {
6172
6254
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/padding-around-test-blocks.md
6173
6255
  */
6174
6256
  'test/padding-around-test-blocks'?: Linter.RuleEntry<[]>;
6257
+ /**
6258
+ * enforce using `toBeCalledOnce()` or `toHaveBeenCalledOnce()`
6259
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-once.md
6260
+ */
6261
+ 'test/prefer-called-once'?: Linter.RuleEntry<[]>;
6262
+ /**
6263
+ * enforce using `toBeCalledTimes(1)` or `toHaveBeenCalledTimes(1)`
6264
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-times.md
6265
+ */
6266
+ 'test/prefer-called-times'?: Linter.RuleEntry<[]>;
6175
6267
  /**
6176
6268
  * enforce using `toBeCalledWith()` or `toHaveBeenCalledWith()`
6177
6269
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/prefer-called-with.md
@@ -6337,6 +6429,11 @@ interface RuleOptions {
6337
6429
  * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/valid-title.md
6338
6430
  */
6339
6431
  'test/valid-title'?: Linter.RuleEntry<TestValidTitle>;
6432
+ /**
6433
+ * disallow `.todo` usage
6434
+ * @see https://github.com/vitest-dev/eslint-plugin-vitest/blob/main/docs/rules/warn-todo.md
6435
+ */
6436
+ 'test/warn-todo'?: Linter.RuleEntry<[]>;
6340
6437
  /**
6341
6438
  * enforce linebreaks after opening and before closing array brackets
6342
6439
  * @see https://ota-meshi.github.io/eslint-plugin-toml/rules/array-bracket-newline.html
@@ -10744,6 +10841,10 @@ type LogicalAssignmentOperators = (([] | ["always"] | ["always", {
10744
10841
  type MarkdownFencedCodeLanguage = [] | [{
10745
10842
  required?: string[];
10746
10843
  }];
10844
+ // ----- markdown/heading-increment -----
10845
+ type MarkdownHeadingIncrement = [] | [{
10846
+ frontmatterTitle?: string;
10847
+ }];
10747
10848
  // ----- markdown/no-duplicate-definitions -----
10748
10849
  type MarkdownNoDuplicateDefinitions = [] | [{
10749
10850
  allowDefinitions?: string[];
@@ -10762,6 +10863,11 @@ type MarkdownNoEmptyDefinitions = [] | [{
10762
10863
  // ----- markdown/no-html -----
10763
10864
  type MarkdownNoHtml = [] | [{
10764
10865
  allowed?: string[];
10866
+ allowedIgnoreCase?: boolean;
10867
+ }];
10868
+ // ----- markdown/no-missing-atx-heading-space -----
10869
+ type MarkdownNoMissingAtxHeadingSpace = [] | [{
10870
+ checkClosedHeadings?: boolean;
10765
10871
  }];
10766
10872
  // ----- markdown/no-missing-link-fragments -----
10767
10873
  type MarkdownNoMissingLinkFragments = [] | [{
@@ -10772,6 +10878,10 @@ type MarkdownNoMissingLinkFragments = [] | [{
10772
10878
  type MarkdownNoMultipleH1 = [] | [{
10773
10879
  frontmatterTitle?: string;
10774
10880
  }];
10881
+ // ----- markdown/no-space-in-emphasis -----
10882
+ type MarkdownNoSpaceInEmphasis = [] | [{
10883
+ checkStrikethrough?: boolean;
10884
+ }];
10775
10885
  // ----- markdown/no-unused-definitions -----
10776
10886
  type MarkdownNoUnusedDefinitions = [] | [{
10777
10887
  allowDefinitions?: string[];
@@ -11126,10 +11236,17 @@ type NoRestrictedExports = [] | [({
11126
11236
  };
11127
11237
  })];
11128
11238
  // ----- no-restricted-globals -----
11129
- type NoRestrictedGlobals = (string | {
11239
+ type NoRestrictedGlobals = ((string | {
11130
11240
  name: string;
11131
11241
  message?: string;
11132
- })[];
11242
+ })[] | [] | [{
11243
+ globals: (string | {
11244
+ name: string;
11245
+ message?: string;
11246
+ })[];
11247
+ checkGlobalObject?: boolean;
11248
+ globalObjects?: string[];
11249
+ }]);
11133
11250
  // ----- no-restricted-imports -----
11134
11251
  type NoRestrictedImports = ((string | {
11135
11252
  name: string;
@@ -11624,6 +11741,8 @@ type OneVar = [] | [(("always" | "never" | "consecutive") | {
11624
11741
  var?: ("always" | "never" | "consecutive");
11625
11742
  let?: ("always" | "never" | "consecutive");
11626
11743
  const?: ("always" | "never" | "consecutive");
11744
+ using?: ("always" | "never" | "consecutive");
11745
+ awaitUsing?: ("always" | "never" | "consecutive");
11627
11746
  } | {
11628
11747
  initialized?: ("always" | "never" | "consecutive");
11629
11748
  uninitialized?: ("always" | "never" | "consecutive");
@@ -13662,35 +13781,11 @@ type SolidStyleProp = [] | [{
13662
13781
  styleProps?: [string, ...(string)[]];
13663
13782
  allowString?: boolean;
13664
13783
  }];
13665
- // ----- sonar/arguments-order -----
13666
- type SonarArgumentsOrder = [] | [("sonar-runtime" | "metric")];
13667
- // ----- sonar/arguments-usage -----
13668
- type SonarArgumentsUsage = [] | [("sonar-runtime" | "metric")];
13669
13784
  // ----- sonar/arrow-function-convention -----
13670
13785
  type SonarArrowFunctionConvention = [] | [{
13671
13786
  requireParameterParentheses?: boolean;
13672
13787
  requireBodyBraces?: boolean;
13673
13788
  }];
13674
- // ----- sonar/aws-iam-all-privileges -----
13675
- type SonarAwsIamAllPrivileges = [] | [("sonar-runtime" | "metric")];
13676
- // ----- sonar/aws-iam-all-resources-accessible -----
13677
- type SonarAwsIamAllResourcesAccessible = [] | [("sonar-runtime" | "metric")];
13678
- // ----- sonar/aws-iam-privilege-escalation -----
13679
- type SonarAwsIamPrivilegeEscalation = [] | [("sonar-runtime" | "metric")];
13680
- // ----- sonar/aws-iam-public-access -----
13681
- type SonarAwsIamPublicAccess = [] | [("sonar-runtime" | "metric")];
13682
- // ----- sonar/aws-s3-bucket-granted-access -----
13683
- type SonarAwsS3BucketGrantedAccess = [] | [("sonar-runtime" | "metric")];
13684
- // ----- sonar/aws-s3-bucket-public-access -----
13685
- type SonarAwsS3BucketPublicAccess = [] | [("sonar-runtime" | "metric")];
13686
- // ----- sonar/aws-s3-bucket-server-encryption -----
13687
- type SonarAwsS3BucketServerEncryption = [] | [("sonar-runtime" | "metric")];
13688
- // ----- sonar/aws-s3-bucket-versioning -----
13689
- type SonarAwsS3BucketVersioning = [] | [("sonar-runtime" | "metric")];
13690
- // ----- sonar/block-scoped-var -----
13691
- type SonarBlockScopedVar = [] | [("sonar-runtime" | "metric")];
13692
- // ----- sonar/certificate-transparency -----
13693
- type SonarCertificateTransparency = [] | [("sonar-runtime" | "metric")];
13694
13789
  // ----- sonar/class-name -----
13695
13790
  type SonarClassName = [] | [{
13696
13791
  format?: string;
@@ -13703,39 +13798,15 @@ type SonarCommentRegex = [] | [{
13703
13798
  message?: string;
13704
13799
  flags?: string;
13705
13800
  }];
13706
- // ----- sonar/conditional-indentation -----
13707
- type SonarConditionalIndentation = [] | [("sonar-runtime" | "metric")];
13708
- // ----- sonar/confidential-information-logging -----
13709
- type SonarConfidentialInformationLogging = [] | [("sonar-runtime" | "metric")];
13710
13801
  // ----- sonar/content-length -----
13711
13802
  type SonarContentLength = [] | [{
13712
13803
  fileUploadSizeLimit?: number;
13713
13804
  standardSizeLimit?: number;
13714
13805
  }];
13715
- // ----- sonar/content-security-policy -----
13716
- type SonarContentSecurityPolicy = [] | [("sonar-runtime" | "metric")];
13717
- // ----- sonar/cookie-no-httponly -----
13718
- type SonarCookieNoHttponly = [] | [("sonar-runtime" | "metric")];
13719
- // ----- sonar/cors -----
13720
- type SonarCors = [] | [("sonar-runtime" | "metric")];
13721
- // ----- sonar/csrf -----
13722
- type SonarCsrf = [] | [("sonar-runtime" | "metric")];
13723
13806
  // ----- sonar/cyclomatic-complexity -----
13724
13807
  type SonarCyclomaticComplexity = [] | [{
13725
13808
  threshold?: number;
13726
- }] | [{
13727
- threshold?: number;
13728
- }, ("sonar-runtime" | "metric")];
13729
- // ----- sonar/destructuring-assignment-syntax -----
13730
- type SonarDestructuringAssignmentSyntax = [] | [("sonar-runtime" | "metric")];
13731
- // ----- sonar/different-types-comparison -----
13732
- type SonarDifferentTypesComparison = [] | [("sonar-runtime" | "metric")];
13733
- // ----- sonar/disabled-auto-escaping -----
13734
- type SonarDisabledAutoEscaping = [] | [("sonar-runtime" | "metric")];
13735
- // ----- sonar/dns-prefetching -----
13736
- type SonarDnsPrefetching = [] | [("sonar-runtime" | "metric")];
13737
- // ----- sonar/duplicates-in-character-class -----
13738
- type SonarDuplicatesInCharacterClass = [] | [("sonar-runtime" | "metric")];
13809
+ }];
13739
13810
  // ----- sonar/enforce-trailing-comma -----
13740
13811
  type SonarEnforceTrailingComma = [] | [(_SonarEnforceTrailingCommaValue | {
13741
13812
  arrays?: _SonarEnforceTrailingCommaValueWithIgnore;
@@ -13749,38 +13820,16 @@ type _SonarEnforceTrailingCommaValueWithIgnore = ("always-multiline" | "always"
13749
13820
  // ----- sonar/expression-complexity -----
13750
13821
  type SonarExpressionComplexity = [] | [{
13751
13822
  max?: number;
13752
- }] | [{
13753
- max?: number;
13754
- }, ("sonar-runtime" | "metric")];
13823
+ }];
13755
13824
  // ----- sonar/file-header -----
13756
13825
  type SonarFileHeader = [] | [{
13757
13826
  headerFormat?: string;
13758
13827
  isRegularExpression?: boolean;
13759
13828
  }];
13760
- // ----- sonar/file-uploads -----
13761
- type SonarFileUploads = [] | [("sonar-runtime" | "metric")];
13762
- // ----- sonar/for-loop-increment-sign -----
13763
- type SonarForLoopIncrementSign = [] | [("sonar-runtime" | "metric")];
13764
- // ----- sonar/frame-ancestors -----
13765
- type SonarFrameAncestors = [] | [("sonar-runtime" | "metric")];
13766
- // ----- sonar/function-inside-loop -----
13767
- type SonarFunctionInsideLoop = [] | [("sonar-runtime" | "metric")];
13768
13829
  // ----- sonar/function-name -----
13769
13830
  type SonarFunctionName = [] | [{
13770
13831
  format?: string;
13771
13832
  }];
13772
- // ----- sonar/function-return-type -----
13773
- type SonarFunctionReturnType = [] | [("sonar-runtime" | "metric")];
13774
- // ----- sonar/in-operator-type-error -----
13775
- type SonarInOperatorTypeError = [] | [("sonar-runtime" | "metric")];
13776
- // ----- sonar/inconsistent-function-call -----
13777
- type SonarInconsistentFunctionCall = [] | [("sonar-runtime" | "metric")];
13778
- // ----- sonar/insecure-cookie -----
13779
- type SonarInsecureCookie = [] | [("sonar-runtime" | "metric")];
13780
- // ----- sonar/insecure-jwt-token -----
13781
- type SonarInsecureJwtToken = [] | [("sonar-runtime" | "metric")];
13782
- // ----- sonar/inverted-assertion-arguments -----
13783
- type SonarInvertedAssertionArguments = [] | [("sonar-runtime" | "metric")];
13784
13833
  // ----- sonar/max-lines -----
13785
13834
  type SonarMaxLines = [] | [{
13786
13835
  maximum?: number;
@@ -13798,37 +13847,16 @@ type SonarMaxUnionSize = [] | [{
13798
13847
  // ----- sonar/nested-control-flow -----
13799
13848
  type SonarNestedControlFlow = [] | [{
13800
13849
  maximumNestingLevel?: number;
13801
- }] | [{
13802
- maximumNestingLevel?: number;
13803
- }, ("sonar-runtime" | "metric")];
13850
+ }];
13804
13851
  // ----- sonar/new-operator-misuse -----
13805
13852
  type SonarNewOperatorMisuse = [] | [{
13806
13853
  considerJSDoc?: boolean;
13807
- }] | [{
13808
- considerJSDoc?: boolean;
13809
- }, unknown];
13810
- // ----- sonar/no-code-after-done -----
13811
- type SonarNoCodeAfterDone = [] | [("sonar-runtime" | "metric")];
13812
- // ----- sonar/no-collapsible-if -----
13813
- type SonarNoCollapsibleIf = [] | [("sonar-runtime" | "metric")];
13814
- // ----- sonar/no-duplicate-in-composite -----
13815
- type SonarNoDuplicateInComposite = [] | [("sonar-runtime" | "metric")];
13854
+ }];
13816
13855
  // ----- sonar/no-duplicate-string -----
13817
13856
  type SonarNoDuplicateString = [] | [{
13818
13857
  threshold?: number;
13819
13858
  ignoreStrings?: string;
13820
- }] | [{
13821
- threshold?: number;
13822
- ignoreStrings?: string;
13823
- }, ("sonar-runtime" | "metric")];
13824
- // ----- sonar/no-duplicated-branches -----
13825
- type SonarNoDuplicatedBranches = [] | [("sonar-runtime" | "metric")];
13826
- // ----- sonar/no-element-overwrite -----
13827
- type SonarNoElementOverwrite = [] | [("sonar-runtime" | "metric")];
13828
- // ----- sonar/no-extra-arguments -----
13829
- type SonarNoExtraArguments = [] | [("sonar-runtime" | "metric")];
13830
- // ----- sonar/no-gratuitous-expressions -----
13831
- type SonarNoGratuitousExpressions = [] | [("sonar-runtime" | "metric")];
13859
+ }];
13832
13860
  // ----- sonar/no-hardcoded-passwords -----
13833
13861
  type SonarNoHardcodedPasswords = [] | [{
13834
13862
  passwordWords?: string[];
@@ -13838,94 +13866,28 @@ type SonarNoHardcodedSecrets = [] | [{
13838
13866
  secretWords?: string;
13839
13867
  randomnessSensibility?: number;
13840
13868
  }];
13841
- // ----- sonar/no-identical-conditions -----
13842
- type SonarNoIdenticalConditions = [] | [("sonar-runtime" | "metric")];
13843
- // ----- sonar/no-identical-expressions -----
13844
- type SonarNoIdenticalExpressions = [] | [("sonar-runtime" | "metric")];
13845
13869
  // ----- sonar/no-identical-functions -----
13846
- type SonarNoIdenticalFunctions = [] | [number] | [number, ("sonar-runtime" | "metric")];
13870
+ type SonarNoIdenticalFunctions = [] | [number];
13847
13871
  // ----- sonar/no-implicit-dependencies -----
13848
13872
  type SonarNoImplicitDependencies = [] | [{
13849
13873
  whitelist?: string[];
13850
13874
  }];
13851
- // ----- sonar/no-inconsistent-returns -----
13852
- type SonarNoInconsistentReturns = [] | [("sonar-runtime" | "metric")];
13853
- // ----- sonar/no-incorrect-string-concat -----
13854
- type SonarNoIncorrectStringConcat = [] | [("sonar-runtime" | "metric")];
13855
13875
  // ----- sonar/no-intrusive-permissions -----
13856
13876
  type SonarNoIntrusivePermissions = [] | [{
13857
13877
  permissions?: string[];
13858
13878
  }];
13859
- // ----- sonar/no-invariant-returns -----
13860
- type SonarNoInvariantReturns = [] | [("sonar-runtime" | "metric")];
13861
- // ----- sonar/no-ip-forward -----
13862
- type SonarNoIpForward = [] | [("sonar-runtime" | "metric")];
13863
- // ----- sonar/no-mime-sniff -----
13864
- type SonarNoMimeSniff = [] | [("sonar-runtime" | "metric")];
13865
- // ----- sonar/no-mixed-content -----
13866
- type SonarNoMixedContent = [] | [("sonar-runtime" | "metric")];
13867
13879
  // ----- sonar/no-nested-functions -----
13868
13880
  type SonarNoNestedFunctions = [] | [{
13869
13881
  threshold?: number;
13870
- }] | [{
13871
- threshold?: number;
13872
- }, ("sonar-runtime" | "metric")];
13873
- // ----- sonar/no-redundant-optional -----
13874
- type SonarNoRedundantOptional = [] | [("sonar-runtime" | "metric")];
13875
- // ----- sonar/no-redundant-parentheses -----
13876
- type SonarNoRedundantParentheses = [] | [("sonar-runtime" | "metric")];
13877
- // ----- sonar/no-reference-error -----
13878
- type SonarNoReferenceError = [] | [("sonar-runtime" | "metric")];
13879
- // ----- sonar/no-referrer-policy -----
13880
- type SonarNoReferrerPolicy = [] | [("sonar-runtime" | "metric")];
13881
- // ----- sonar/no-same-argument-assert -----
13882
- type SonarNoSameArgumentAssert = [] | [("sonar-runtime" | "metric")];
13883
- // ----- sonar/no-same-line-conditional -----
13884
- type SonarNoSameLineConditional = [] | [("sonar-runtime" | "metric")];
13885
- // ----- sonar/no-selector-parameter -----
13886
- type SonarNoSelectorParameter = [] | [("sonar-runtime" | "metric")];
13887
- // ----- sonar/no-try-promise -----
13888
- type SonarNoTryPromise = [] | [("sonar-runtime" | "metric")];
13889
- // ----- sonar/no-variable-usage-before-declaration -----
13890
- type SonarNoVariableUsageBeforeDeclaration = [] | [("sonar-runtime" | "metric")];
13891
- // ----- sonar/non-number-in-arithmetic-expression -----
13892
- type SonarNonNumberInArithmeticExpression = [] | [("sonar-runtime" | "metric")];
13882
+ }];
13893
13883
  // ----- sonar/regex-complexity -----
13894
13884
  type SonarRegexComplexity = [] | [{
13895
13885
  threshold?: number;
13896
- }] | [{
13897
- threshold?: number;
13898
- }, ("sonar-runtime" | "metric")];
13899
- // ----- sonar/shorthand-property-grouping -----
13900
- type SonarShorthandPropertyGrouping = [] | [("sonar-runtime" | "metric")];
13901
- // ----- sonar/stateful-regex -----
13902
- type SonarStatefulRegex = [] | [("sonar-runtime" | "metric")];
13903
- // ----- sonar/strict-transport-security -----
13904
- type SonarStrictTransportSecurity = [] | [("sonar-runtime" | "metric")];
13905
- // ----- sonar/strings-comparison -----
13906
- type SonarStringsComparison = [] | [("sonar-runtime" | "metric")];
13907
- // ----- sonar/too-many-break-or-continue-in-loop -----
13908
- type SonarTooManyBreakOrContinueInLoop = [] | [("sonar-runtime" | "metric")];
13909
- // ----- sonar/unicode-aware-regex -----
13910
- type SonarUnicodeAwareRegex = [] | [("sonar-runtime" | "metric")];
13911
- // ----- sonar/unused-named-groups -----
13912
- type SonarUnusedNamedGroups = [] | [("sonar-runtime" | "metric")];
13913
- // ----- sonar/unverified-certificate -----
13914
- type SonarUnverifiedCertificate = [] | [("sonar-runtime" | "metric")];
13915
- // ----- sonar/unverified-hostname -----
13916
- type SonarUnverifiedHostname = [] | [("sonar-runtime" | "metric")];
13917
- // ----- sonar/updated-const-var -----
13918
- type SonarUpdatedConstVar = [] | [("sonar-runtime" | "metric")];
13919
- // ----- sonar/updated-loop-counter -----
13920
- type SonarUpdatedLoopCounter = [] | [("sonar-runtime" | "metric")];
13921
- // ----- sonar/use-type-alias -----
13922
- type SonarUseTypeAlias = [] | [("sonar-runtime" | "metric")];
13886
+ }];
13923
13887
  // ----- sonar/variable-name -----
13924
13888
  type SonarVariableName = [] | [{
13925
13889
  format?: string;
13926
13890
  }];
13927
- // ----- sonar/xml-parser-xxe -----
13928
- type SonarXmlParserXxe = [] | [("sonar-runtime" | "metric")];
13929
13891
  // ----- sort-imports -----
13930
13892
  type SortImports = [] | [{
13931
13893
  ignoreCase?: boolean;
@@ -15179,6 +15141,11 @@ type SvelteButtonHasType = [] | [{
15179
15141
  type SvelteCommentDirective = [] | [{
15180
15142
  reportUnusedDisableDirectives?: boolean;
15181
15143
  }];
15144
+ // ----- svelte/consistent-selector-style -----
15145
+ type SvelteConsistentSelectorStyle = [] | [{
15146
+ checkGlobal?: boolean;
15147
+ style?: [] | [("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type")] | [("class" | "id" | "type"), ("class" | "id" | "type"), ("class" | "id" | "type")];
15148
+ }];
15182
15149
  // ----- svelte/first-attribute-linebreak -----
15183
15150
  type SvelteFirstAttributeLinebreak = [] | [{
15184
15151
  multiline?: ("below" | "beside");
@@ -15211,7 +15178,8 @@ type SvelteHtmlQuotes = [] | [{
15211
15178
  type SvelteHtmlSelfClosing = [] | [({
15212
15179
  void?: ("never" | "always" | "ignore");
15213
15180
  normal?: ("never" | "always" | "ignore");
15214
- foreign?: ("never" | "always" | "ignore");
15181
+ svg?: ("never" | "always" | "ignore");
15182
+ math?: ("never" | "always" | "ignore");
15215
15183
  component?: ("never" | "always" | "ignore");
15216
15184
  svelte?: ("never" | "always" | "ignore");
15217
15185
  } | ("all" | "html" | "none"))];
@@ -15250,6 +15218,13 @@ type SvelteNoInlineStyles = [] | [{
15250
15218
  type SvelteNoInnerDeclarations = [] | [("functions" | "both")] | [("functions" | "both"), {
15251
15219
  blockScopedFunctions?: ("allow" | "disallow");
15252
15220
  }];
15221
+ // ----- svelte/no-navigation-without-base -----
15222
+ type SvelteNoNavigationWithoutBase = [] | [{
15223
+ ignoreGoto?: boolean;
15224
+ ignoreLinks?: boolean;
15225
+ ignorePushState?: boolean;
15226
+ ignoreReplaceState?: boolean;
15227
+ }];
15253
15228
  // ----- svelte/no-reactive-reassign -----
15254
15229
  type SvelteNoReactiveReassign = [] | [{
15255
15230
  props?: boolean;
@@ -15277,10 +15252,22 @@ type SvelteNoUnknownStyleDirectiveProperty = [] | [{
15277
15252
  ignoreProperties?: [string, ...(string)[]];
15278
15253
  ignorePrefixed?: boolean;
15279
15254
  }];
15255
+ // ----- svelte/no-unnecessary-state-wrap -----
15256
+ type SvelteNoUnnecessaryStateWrap = [] | [{
15257
+ additionalReactiveClasses?: string[];
15258
+ allowReassign?: boolean;
15259
+ }];
15280
15260
  // ----- svelte/no-unused-class-name -----
15281
15261
  type SvelteNoUnusedClassName = [] | [{
15282
15262
  allowedClassNames?: string[];
15283
15263
  }];
15264
+ // ----- svelte/no-unused-props -----
15265
+ type SvelteNoUnusedProps = [] | [{
15266
+ checkImportedTypes?: boolean;
15267
+ ignoreTypePatterns?: string[];
15268
+ ignorePropertyPatterns?: string[];
15269
+ allowUnusedNestedProperties?: boolean;
15270
+ }];
15284
15271
  // ----- svelte/no-useless-mustaches -----
15285
15272
  type SvelteNoUselessMustaches = [] | [{
15286
15273
  ignoreIncludesComment?: boolean;
@@ -15290,6 +15277,17 @@ type SvelteNoUselessMustaches = [] | [{
15290
15277
  type SveltePreferClassDirective = [] | [{
15291
15278
  prefer?: ("always" | "empty");
15292
15279
  }];
15280
+ // ----- svelte/prefer-const -----
15281
+ type SveltePreferConst = [] | [{
15282
+ destructuring?: ("any" | "all");
15283
+ ignoreReadBeforeAssign?: boolean;
15284
+ excludedRunes?: string[];
15285
+ [k: string]: unknown | undefined;
15286
+ }];
15287
+ // ----- svelte/require-event-prefix -----
15288
+ type SvelteRequireEventPrefix = [] | [{
15289
+ checkAsyncFunctions?: boolean;
15290
+ }];
15293
15291
  // ----- svelte/shorthand-attribute -----
15294
15292
  type SvelteShorthandAttribute = [] | [{
15295
15293
  prefer?: ("always" | "never");
@@ -18461,6 +18459,10 @@ interface OptionsUnoCSS extends OptionsOverrides {
18461
18459
  * @default false
18462
18460
  */
18463
18461
  strict?: boolean;
18462
+ /**
18463
+ * Custom path for the uno.config.ts file, useful for monorepo projects.
18464
+ */
18465
+ configPath?: string;
18464
18466
  }
18465
18467
  interface OptionsConfig extends OptionsComponentExts, OptionsProjectType {
18466
18468
  /**