eslint-plugin-react-dom 5.2.5-next.1 → 5.3.0-beta.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +18 -9
- package/package.json +9 -9
package/dist/index.js
CHANGED
|
@@ -24,7 +24,7 @@ var __exportAll = (all, no_symbols) => {
|
|
|
24
24
|
//#endregion
|
|
25
25
|
//#region package.json
|
|
26
26
|
var name$2 = "eslint-plugin-react-dom";
|
|
27
|
-
var version = "5.
|
|
27
|
+
var version = "5.3.0-beta.0";
|
|
28
28
|
|
|
29
29
|
//#endregion
|
|
30
30
|
//#region src/utils/create-jsx-element-resolver.ts
|
|
@@ -1672,8 +1672,7 @@ function create$4(context) {
|
|
|
1672
1672
|
}
|
|
1673
1673
|
|
|
1674
1674
|
//#endregion
|
|
1675
|
-
//#region src/rules/no-unsafe-iframe-sandbox/
|
|
1676
|
-
const RULE_NAME$3 = "no-unsafe-iframe-sandbox";
|
|
1675
|
+
//#region src/rules/no-unsafe-iframe-sandbox/lib.ts
|
|
1677
1676
|
const UNSAFE_SANDBOX_VALUES = ["allow-scripts", "allow-same-origin"];
|
|
1678
1677
|
/**
|
|
1679
1678
|
* Check if the sandbox attribute value contains an unsafe combination
|
|
@@ -1686,6 +1685,10 @@ function isUnsafeSandboxCombination(value) {
|
|
|
1686
1685
|
if (typeof value !== "string") return false;
|
|
1687
1686
|
return UNSAFE_SANDBOX_VALUES.every((v) => value.includes(v));
|
|
1688
1687
|
}
|
|
1688
|
+
|
|
1689
|
+
//#endregion
|
|
1690
|
+
//#region src/rules/no-unsafe-iframe-sandbox/no-unsafe-iframe-sandbox.ts
|
|
1691
|
+
const RULE_NAME$3 = "no-unsafe-iframe-sandbox";
|
|
1689
1692
|
var no_unsafe_iframe_sandbox_default = createRule({
|
|
1690
1693
|
meta: {
|
|
1691
1694
|
type: "problem",
|
|
@@ -1712,8 +1715,7 @@ function create$3(context) {
|
|
|
1712
1715
|
}
|
|
1713
1716
|
|
|
1714
1717
|
//#endregion
|
|
1715
|
-
//#region src/rules/no-unsafe-target-blank/
|
|
1716
|
-
const RULE_NAME$2 = "no-unsafe-target-blank";
|
|
1718
|
+
//#region src/rules/no-unsafe-target-blank/lib.ts
|
|
1717
1719
|
/**
|
|
1718
1720
|
* Check if a value appears to be an external link.
|
|
1719
1721
|
* External links typically start with http(s):// or have protocol-relative format.
|
|
@@ -1734,6 +1736,10 @@ function isSafeRel(value) {
|
|
|
1734
1736
|
if (typeof value !== "string") return false;
|
|
1735
1737
|
return value === "noreferrer" || /\bnoreferrer\b/u.test(value);
|
|
1736
1738
|
}
|
|
1739
|
+
|
|
1740
|
+
//#endregion
|
|
1741
|
+
//#region src/rules/no-unsafe-target-blank/no-unsafe-target-blank.ts
|
|
1742
|
+
const RULE_NAME$2 = "no-unsafe-target-blank";
|
|
1737
1743
|
var no_unsafe_target_blank_default = createRule({
|
|
1738
1744
|
meta: {
|
|
1739
1745
|
type: "problem",
|
|
@@ -1848,9 +1854,8 @@ function getFix(context, node) {
|
|
|
1848
1854
|
}
|
|
1849
1855
|
|
|
1850
1856
|
//#endregion
|
|
1851
|
-
//#region src/rules/no-void-elements-with-children/
|
|
1852
|
-
const
|
|
1853
|
-
const voidElements = new Set([
|
|
1857
|
+
//#region src/rules/no-void-elements-with-children/lib.ts
|
|
1858
|
+
const VOID_ELEMENTS = new Set([
|
|
1854
1859
|
"area",
|
|
1855
1860
|
"base",
|
|
1856
1861
|
"br",
|
|
@@ -1868,6 +1873,10 @@ const voidElements = new Set([
|
|
|
1868
1873
|
"track",
|
|
1869
1874
|
"wbr"
|
|
1870
1875
|
]);
|
|
1876
|
+
|
|
1877
|
+
//#endregion
|
|
1878
|
+
//#region src/rules/no-void-elements-with-children/no-void-elements-with-children.ts
|
|
1879
|
+
const RULE_NAME = "no-void-elements-with-children";
|
|
1871
1880
|
var no_void_elements_with_children_default = createRule({
|
|
1872
1881
|
meta: {
|
|
1873
1882
|
type: "problem",
|
|
@@ -1883,7 +1892,7 @@ function create(context) {
|
|
|
1883
1892
|
const resolver = createJsxElementResolver(context);
|
|
1884
1893
|
return merge({ JSXElement(node) {
|
|
1885
1894
|
const { domElementType } = resolver.resolve(node);
|
|
1886
|
-
if (!
|
|
1895
|
+
if (!VOID_ELEMENTS.has(domElementType)) return;
|
|
1887
1896
|
if (node.children.length > 0 || hasAnyAttribute(context, node, ["children", "dangerouslySetInnerHTML"])) context.report({
|
|
1888
1897
|
data: { elementType: domElementType },
|
|
1889
1898
|
messageId: "default",
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "eslint-plugin-react-dom",
|
|
3
|
-
"version": "5.
|
|
3
|
+
"version": "5.3.0-beta.0",
|
|
4
4
|
"description": "ESLint React's ESLint plugin for DOM related rules.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"react",
|
|
@@ -43,23 +43,23 @@
|
|
|
43
43
|
"@typescript-eslint/utils": "^8.58.2",
|
|
44
44
|
"compare-versions": "^6.1.1",
|
|
45
45
|
"ts-pattern": "^5.9.0",
|
|
46
|
-
"@eslint-react/ast": "5.
|
|
47
|
-
"@eslint-react/
|
|
48
|
-
"@eslint-react/jsx": "5.
|
|
49
|
-
"@eslint-react/
|
|
50
|
-
"@eslint-react/
|
|
51
|
-
"@eslint-react/var": "5.
|
|
46
|
+
"@eslint-react/ast": "5.3.0-beta.0",
|
|
47
|
+
"@eslint-react/eslint": "5.3.0-beta.0",
|
|
48
|
+
"@eslint-react/jsx": "5.3.0-beta.0",
|
|
49
|
+
"@eslint-react/shared": "5.3.0-beta.0",
|
|
50
|
+
"@eslint-react/core": "5.3.0-beta.0",
|
|
51
|
+
"@eslint-react/var": "5.3.0-beta.0"
|
|
52
52
|
},
|
|
53
53
|
"devDependencies": {
|
|
54
54
|
"@types/react": "^19.2.14",
|
|
55
55
|
"@types/react-dom": "^19.2.3",
|
|
56
|
-
"eslint": "^10.2.
|
|
56
|
+
"eslint": "^10.2.1",
|
|
57
57
|
"tsdown": "^0.21.9",
|
|
58
58
|
"@local/configs": "0.0.0",
|
|
59
59
|
"@local/eff": "3.0.0-beta.72"
|
|
60
60
|
},
|
|
61
61
|
"peerDependencies": {
|
|
62
|
-
"eslint": "^10.2.
|
|
62
|
+
"eslint": "^10.2.1",
|
|
63
63
|
"typescript": "*"
|
|
64
64
|
},
|
|
65
65
|
"engines": {
|