Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Type support for Eleventy using defineConfig
wrapper. This module can be dropped in to your .eleventy.js
configuration file and will provide type support to the entire 11ty API, with JSDoc annotated descriptions and documentation linked references.
Type support is assumed nowadays and when modules don't provide this basic capability it makes life difficult and reflects poorly on otherwise good projects (like Eleventy). The team behind Eleventy have floated type support but seem hesitant and from my understanding were considering using JSDoc types (We live in a society, We are not animals). The last time I actively looked in the issues it was clear and rather apparent that those discussing type support or working on it were not very well versed on the subject (imo).
The module requires @11ty/eleventy be installed along side it.
pnpm add 11ty.ts @11ty/eleventy -D
Pass it to the module.exports
within a .eleventy.js
or .eleventy.cjs
configuration file.
const eleventy = require("11ty.ts");
module.exports = eleventy(function(eleventyConfig) {
config.addPlugin()
return {
htmlTemplateEngine: 'liquid',
passthroughFileCopy: false,
pathPrefix: '',
templateFormats: [
'liquid',
'json',
'md',
'css',
'html',
'yaml'
],
dir: {
input: 'site',
output: 'public',
includes: 'views/include',
layouts: 'views/layouts',
data: 'data'
}
}
});
In addition to the default export, you may optionally prefer to use the defineConfig
named export:
const { defineConfig } = require('11ty.ts');
module.exports = defineConfig(eleventyConfig => {
// {}
})
Eleventy plugins which provide typings within their distribution package will work if the syntactical structure of the plugin parameters apply options at index 1
of the argument order. The type utilities exposed in this module will convert the function parameters of plugins to a tuple and then reference the second argument, which is assumed to be the plugin options. It's far from an elegant approach, but due to the manner in which Eleventy digests plugins, this (for now) seems to be the only viable approach I've come up with.
For the sake of brevity, let's assume you've installed a plugin from the NPM register called 11ty-plugin-example
and this (fake) plugin has the following type declaration accompanied in the distribution package.
// Assuming the plugins uses this argument order
export function pluginName(eleventyConfig, options: {
foo: string;
bar: number;
baz: boolean;
}) {
// ...
}
This is rather typical and plugins which adhere to the above will be automatically typed. Using the eleventyConfig.addPlugin
method will simply reference parameter options
via tuple, so in your .eleventy.js
file, completions will be applied when doing the following:
const { defineConfig } = require('11ty.ts');
const { pluginName } = require('11ty-plugin-example');
module.exports = defineConfig(eleventyConfig => {
eleventyConfig.addPlugin(pluginName, {
// Auto-typing will occur and intellisense completes
// foo, bar and baz options.
})
})
FAQs
An Eleventy wrapper for type supported configuration.
The npm package 11ty.ts receives a total of 489 weekly downloads. As such, 11ty.ts popularity was classified as not popular.
We found that 11ty.ts demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.