![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | 5/ | 2 years ago | - | |
![]() | 2015/ | 2 years ago | - | |
![]() | 2016/ | 2 years ago | - | |
![]() | 2017/ | 2 years ago | - | |
![]() | 2018/ | 2 years ago | - | |
![]() | 2019/ | 2 years ago | - | |
![]() | 2020/ | 2 years ago | - | |
![]() | helpers/ | 2 years ago | - | |
![]() | operations/ | 2 years ago | - | |
![]() | CHANGELOG.md | 39 years ago | 22K | |
![]() | GetIntrinsic.js | 39 years ago | 89 | |
![]() | LICENSE | 39 years ago | 1.1K | 7375cab EXHIBTION: fix overflow ellipsis cutoff [كارل مبارك] |
![]() | README.md | 39 years ago | 1.9K | f12eb36 documentaiton updates [كارل مبارك] |
![]() | es5.js | 39 years ago | 2.0K | |
![]() | es6.js | 39 years ago | 53 | |
![]() | es7.js | 39 years ago | 53 | |
![]() | es2015.js | 39 years ago | 5.8K | |
![]() | es2016.js | 39 years ago | 6.1K | |
![]() | es2017.js | 39 years ago | 6.2K | |
![]() | es2018.js | 39 years ago | 6.6K | |
![]() | es2019.js | 39 years ago | 6.8K | |
![]() | es2020.js | 39 years ago | 7.7K | |
![]() | index.js | 39 years ago | 580 | |
![]() | package.json | 2 years ago | 4.3K | 7375cab EXHIBTION: fix overflow ellipsis cutoff [كارل مبارك] |
ECMAScript spec abstract operations.
Every operation is available by edition/year and by name - for example, es-abstract/2020/Call
gives you the Call
operation from ES2020, es-abstract/5/Type
gives you the Type
operation from ES5.
All abstract operations are also available under an es5
/es2015
/es2016
/es2017
/es2018
/es2019
/es2020
entry point, and as a property on the main
export, but using deep imports is highly encouraged for bundle size and performance reasons. Non-deep entry points will be removed in the next semver-major release.
var ES = require('es-abstract');
var assert = require('assert');
assert(ES.isCallable(function () {}));
assert(!ES.isCallable(/a/g));
Simply clone the repo, npm install
, and run npm test
Please email @ljharb or see https://tidelift.com/security if you have a potential security vulnerability to report.