Product
Introducing SSO
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
textlint-rule-no-surrogate-pair
Advanced tools
Readme
Detects surrogate pairs (D800-DBFF and DC00-DFFF) in sentences.
文章の中でUnicodeのサロゲートペアの文字が使われていると検出します。サロゲートペアの文字は一部の電子書籍のリーディングシステムで表示ができないため注意が必要です。
参考:電書ラボEPUB制作仕様 2016.07.28 β0.99
Install with npm:
npm install textlint-rule-no-surrogate-pair
Via .textlintrc
(Recommended)
{
"rules": {
"no-surrogate-pair": true
}
}
Via CLI
textlint --rule no-surrogate-pair README.md
Builds source codes for publish to the lib
folder.
You can write ES2015+ source codes in src/
folder.
npm run build
Run test code in test
folder.
Test textlint rule by textlint-tester.
npm test
MIT ©
FAQs
Detects surrogate pairs in sentences.
The npm package textlint-rule-no-surrogate-pair receives a total of 242 weekly downloads. As such, textlint-rule-no-surrogate-pair popularity was classified as not popular.
We found that textlint-rule-no-surrogate-pair demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Streamline your login process and enhance security by enabling Single Sign-On (SSO) on the Socket platform, now available for all customers on the Enterprise plan, supporting 20+ identity providers.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.