diff options
Diffstat (limited to 'node_modules/tslint/lib/rules/noEvalRule.js')
-rw-r--r-- | node_modules/tslint/lib/rules/noEvalRule.js | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/node_modules/tslint/lib/rules/noEvalRule.js b/node_modules/tslint/lib/rules/noEvalRule.js index 9067a3fd8..386914433 100644 --- a/node_modules/tslint/lib/rules/noEvalRule.js +++ b/node_modules/tslint/lib/rules/noEvalRule.js @@ -32,7 +32,7 @@ var Rule = /** @class */ (function (_super) { Rule.metadata = { ruleName: "no-eval", description: "Disallows `eval` function invocations.", - rationale: (_a = ["\n `eval()` is dangerous as it allows arbitrary code execution with full privileges. There are\n [alternatives](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval)\n for most of the use cases for `eval()`."], _a.raw = ["\n \\`eval()\\` is dangerous as it allows arbitrary code execution with full privileges. There are\n [alternatives](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval)\n for most of the use cases for \\`eval()\\`."], Lint.Utils.dedent(_a)), + rationale: Lint.Utils.dedent(templateObject_1 || (templateObject_1 = tslib_1.__makeTemplateObject(["\n `eval()` is dangerous as it allows arbitrary code execution with full privileges. There are\n [alternatives](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval)\n for most of the use cases for `eval()`."], ["\n \\`eval()\\` is dangerous as it allows arbitrary code execution with full privileges. There are\n [alternatives](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval)\n for most of the use cases for \\`eval()\\`."]))), optionsDescription: "Not configurable.", options: null, optionExamples: [true], @@ -53,4 +53,4 @@ function walk(ctx) { return ts.forEachChild(node, cb); }); } -var _a; +var templateObject_1; |