@volar/typescript
Advanced tools
@@ -304,3 +304,7 @@ "use strict"; | ||
| function getQuickInfoAtPosition(language, getQuickInfoAtPosition) { | ||
| return (filePath, position) => { | ||
| /** | ||
| * Using `...args` for pass through rest params (including internal `verbosityLevel` param). | ||
| * https://github.com/microsoft/TypeScript/blob/dd830711041b7b0cfd3da7937755996b1e1b1c7e/src/services/types.ts#L588 | ||
| */ | ||
| return (filePath, position, ...args) => { | ||
| const fileName = filePath.replace(windowsPathReg, '/'); | ||
@@ -314,3 +318,3 @@ const [serviceScript, targetScript, sourceScript] = (0, utils_1.getServiceScript)(language, fileName); | ||
| for (const [generatePosition] of (0, transform_1.toGeneratedOffsets)(language, serviceScript, sourceScript, position, language_core_1.isHoverEnabled)) { | ||
| const info = getQuickInfoAtPosition(targetScript.id, generatePosition); | ||
| const info = getQuickInfoAtPosition(targetScript.id, generatePosition, ...args); | ||
| if (info) { | ||
@@ -366,3 +370,3 @@ const textSpan = (0, transform_1.transformTextSpan)(sourceScript, language, serviceScript, info.textSpan, true, language_core_1.isHoverEnabled)?.[1]; | ||
| else { | ||
| return getQuickInfoAtPosition(fileName, position); | ||
| return getQuickInfoAtPosition(fileName, position, ...args); | ||
| } | ||
@@ -369,0 +373,0 @@ }; |
+4
-4
| { | ||
| "name": "@volar/typescript", | ||
| "version": "2.4.22", | ||
| "version": "2.4.23", | ||
| "license": "MIT", | ||
@@ -15,3 +15,3 @@ "files": [ | ||
| "dependencies": { | ||
| "@volar/language-core": "2.4.22", | ||
| "@volar/language-core": "2.4.23", | ||
| "path-browserify": "^1.0.1", | ||
@@ -23,5 +23,5 @@ "vscode-uri": "^3.0.8" | ||
| "@types/path-browserify": "latest", | ||
| "@volar/language-service": "2.4.22" | ||
| "@volar/language-service": "2.4.23" | ||
| }, | ||
| "gitHead": "5e2c8f4ba3e71e322101a94139943edf41e054d1" | ||
| "gitHead": "9b06fb744475622284870f6cc4e638dc7747daef" | ||
| } |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
212520
0.12%4515
0.09%+ Added
+ Added
- Removed
- Removed
Updated