refactor: correct @publicApi and @codeGenApi markers in various files (#38224)
The markers were previously incorrectly assigned. I noticed the issues when reviewing the golden files and this change corrects them. PR Close #38224
This commit is contained in:
parent
9338556872
commit
a7a8938291
@ -109,6 +109,7 @@ export function injectInjectorOnly<T>(
|
|||||||
*
|
*
|
||||||
* @see inject
|
* @see inject
|
||||||
* @codeGenApi
|
* @codeGenApi
|
||||||
|
* @publicApi This instruction has been emitted by ViewEngine for some time and is deployed to npm.
|
||||||
*/
|
*/
|
||||||
export function ɵɵinject<T>(token: Type<T>|InjectionToken<T>): T;
|
export function ɵɵinject<T>(token: Type<T>|InjectionToken<T>): T;
|
||||||
export function ɵɵinject<T>(token: Type<T>|InjectionToken<T>, flags?: InjectFlags): T|null;
|
export function ɵɵinject<T>(token: Type<T>|InjectionToken<T>, flags?: InjectFlags): T|null;
|
||||||
|
@ -22,9 +22,9 @@ import {ClassProvider, ConstructorProvider, ExistingProvider, FactoryProvider, S
|
|||||||
* `InjectorDef`, `NgModule`, or a special scope (e.g. `'root'`). A value of `null` indicates
|
* `InjectorDef`, `NgModule`, or a special scope (e.g. `'root'`). A value of `null` indicates
|
||||||
* that the injectable does not belong to any scope.
|
* that the injectable does not belong to any scope.
|
||||||
*
|
*
|
||||||
* NOTE: This is a private type and should not be exported
|
* @codeGenApi
|
||||||
*
|
* @publicApi This instruction has been emitted by ViewEngine for some time and is deployed to npm.
|
||||||
* @publicApi
|
|
||||||
*/
|
*/
|
||||||
export interface ɵɵInjectableDef<T> {
|
export interface ɵɵInjectableDef<T> {
|
||||||
/**
|
/**
|
||||||
@ -65,7 +65,7 @@ export interface ɵɵInjectableDef<T> {
|
|||||||
*
|
*
|
||||||
* NOTE: This is a private type and should not be exported
|
* NOTE: This is a private type and should not be exported
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export interface ɵɵInjectorDef<T> {
|
export interface ɵɵInjectorDef<T> {
|
||||||
factory: () => T;
|
factory: () => T;
|
||||||
@ -137,6 +137,7 @@ export interface InjectorTypeWithProviders<T> {
|
|||||||
* The factory can call `inject` to access the `Injector` and request injection of dependencies.
|
* The factory can call `inject` to access the `Injector` and request injection of dependencies.
|
||||||
*
|
*
|
||||||
* @codeGenApi
|
* @codeGenApi
|
||||||
|
* @publicApi This instruction has been emitted by ViewEngine for some time and is deployed to npm.
|
||||||
*/
|
*/
|
||||||
export function ɵɵdefineInjectable<T>(opts: {
|
export function ɵɵdefineInjectable<T>(opts: {
|
||||||
token: unknown,
|
token: unknown,
|
||||||
@ -175,7 +176,7 @@ export const defineInjectable = ɵɵdefineInjectable;
|
|||||||
* whose providers will also be added to the injector. Locally provided types will override
|
* whose providers will also be added to the injector. Locally provided types will override
|
||||||
* providers from imports.
|
* providers from imports.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵdefineInjector(options: {factory: () => any, providers?: any[], imports?: any[]}):
|
export function ɵɵdefineInjector(options: {factory: () => any, providers?: any[], imports?: any[]}):
|
||||||
never {
|
never {
|
||||||
|
@ -32,7 +32,7 @@ import {_sanitizeUrl as _sanitizeUrl} from './url_sanitizer';
|
|||||||
* @returns `html` string which is safe to display to user, because all of the dangerous javascript
|
* @returns `html` string which is safe to display to user, because all of the dangerous javascript
|
||||||
* and urls have been removed.
|
* and urls have been removed.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeHtml(unsafeHtml: any): string {
|
export function ɵɵsanitizeHtml(unsafeHtml: any): string {
|
||||||
const sanitizer = getSanitizer();
|
const sanitizer = getSanitizer();
|
||||||
@ -54,7 +54,7 @@ export function ɵɵsanitizeHtml(unsafeHtml: any): string {
|
|||||||
* @param unsafeStyle untrusted `style`, typically from the user.
|
* @param unsafeStyle untrusted `style`, typically from the user.
|
||||||
* @returns `style` string which is safe to bind to the `style` properties.
|
* @returns `style` string which is safe to bind to the `style` properties.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeStyle(unsafeStyle: any): string {
|
export function ɵɵsanitizeStyle(unsafeStyle: any): string {
|
||||||
const sanitizer = getSanitizer();
|
const sanitizer = getSanitizer();
|
||||||
@ -81,7 +81,7 @@ export function ɵɵsanitizeStyle(unsafeStyle: any): string {
|
|||||||
* @returns `url` string which is safe to bind to the `src` properties such as `<img src>`, because
|
* @returns `url` string which is safe to bind to the `src` properties such as `<img src>`, because
|
||||||
* all of the dangerous javascript has been removed.
|
* all of the dangerous javascript has been removed.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeUrl(unsafeUrl: any): string {
|
export function ɵɵsanitizeUrl(unsafeUrl: any): string {
|
||||||
const sanitizer = getSanitizer();
|
const sanitizer = getSanitizer();
|
||||||
@ -103,7 +103,7 @@ export function ɵɵsanitizeUrl(unsafeUrl: any): string {
|
|||||||
* @returns `url` string which is safe to bind to the `src` properties such as `<img src>`, because
|
* @returns `url` string which is safe to bind to the `src` properties such as `<img src>`, because
|
||||||
* only trusted `url`s have been allowed to pass.
|
* only trusted `url`s have been allowed to pass.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeResourceUrl(unsafeResourceUrl: any): string {
|
export function ɵɵsanitizeResourceUrl(unsafeResourceUrl: any): string {
|
||||||
const sanitizer = getSanitizer();
|
const sanitizer = getSanitizer();
|
||||||
@ -126,7 +126,7 @@ export function ɵɵsanitizeResourceUrl(unsafeResourceUrl: any): string {
|
|||||||
* @returns `url` string which is safe to bind to the `<script>` element such as `<img src>`,
|
* @returns `url` string which is safe to bind to the `<script>` element such as `<img src>`,
|
||||||
* because only trusted `scripts` have been allowed to pass.
|
* because only trusted `scripts` have been allowed to pass.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeScript(unsafeScript: any): string {
|
export function ɵɵsanitizeScript(unsafeScript: any): string {
|
||||||
const sanitizer = getSanitizer();
|
const sanitizer = getSanitizer();
|
||||||
@ -169,7 +169,7 @@ export function getUrlSanitizer(tag: string, prop: string) {
|
|||||||
* @param prop name of the property that contains the value.
|
* @param prop name of the property that contains the value.
|
||||||
* @returns `url` string which is safe to bind.
|
* @returns `url` string which is safe to bind.
|
||||||
*
|
*
|
||||||
* @publicApi
|
* @codeGenApi
|
||||||
*/
|
*/
|
||||||
export function ɵɵsanitizeUrlOrResourceUrl(unsafeUrl: any, tag: string, prop: string): any {
|
export function ɵɵsanitizeUrlOrResourceUrl(unsafeUrl: any, tag: string, prop: string): any {
|
||||||
return getUrlSanitizer(tag, prop)(unsafeUrl);
|
return getUrlSanitizer(tag, prop)(unsafeUrl);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user