Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
@babel/plugin-transform-named-capturing-groups-regex
Advanced tools
Compile regular expressions using named groups to ES5.
The @babel/plugin-transform-named-capturing-groups-regex package allows Babel to transform named capturing groups in regular expressions into a format that can be understood by environments that do not support this feature natively. Named capturing groups in regular expressions provide a way to assign names to the various parts of a matched input, making the regex more readable and the matches easier to work with.
Transformation of named capturing groups
This feature allows developers to use named capturing groups in their regular expressions, which are then transformed by Babel for compatibility with environments that do not support this syntax. The code sample shows a regular expression that uses named capturing groups to match a date format.
"const regex = /(?<year>\d{4})-(?<month>\d{2})-(?<day>\d{2})/;"
regexp-tree is a toolkit for working with regular expressions in JavaScript. It includes capabilities for parsing, transforming, optimizing, and generating regular expressions. While it offers a broader set of functionalities compared to @babel/plugin-transform-named-capturing-groups-regex, it can be used for similar purposes in terms of transforming regular expressions, including transformations related to named capturing groups.
xregexp provides augmented, extensible regular expressions. It includes support for additional syntax and features not found in the native JavaScript RegExp, such as named capture groups. While @babel/plugin-transform-named-capturing-groups-regex focuses on transforming existing named capturing groups for compatibility, xregexp extends the capabilities of regular expressions in JavaScript, including providing its own implementation of named capturing groups that works across all JavaScript environments.
Compile regular expressions using named groups to ES5.
See our website @babel/plugin-transform-named-capturing-groups-regex for more information.
Using npm:
npm install --save-dev @babel/plugin-transform-named-capturing-groups-regex
or using yarn:
yarn add @babel/plugin-transform-named-capturing-groups-regex --dev
v7.16.8 (2022-01-10)
babel-generator
, babel-plugin-syntax-typescript
, babel-plugin-transform-parameters
babel-traverse
babel-register
@babel/register
options (@nicolo-ribaudo)babel-plugin-transform-modules-commonjs
babel-plugin-transform-typescript
babel-generator
babel-helper-fixtures
, babel-plugin-proposal-record-and-tuple
, babel-preset-env
babel-helper-remap-async-to-generator
, babel-helper-wrap-function
, babel-plugin-transform-async-to-generator
transform-async-to-generator
output (@magic-akari)FAQs
Compile regular expressions using named groups to ES5.
The npm package @babel/plugin-transform-named-capturing-groups-regex receives a total of 22,886,542 weekly downloads. As such, @babel/plugin-transform-named-capturing-groups-regex popularity was classified as popular.
We found that @babel/plugin-transform-named-capturing-groups-regex demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 4 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.