Security News
Node.js EOL Versions CVE Dubbed the "Worst CVE of the Year" by Security Experts
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
@cloudcannon/configuration-types
Advanced tools
Contains TypeScript declarations and generates JSONSchema files for the CloudCannon configuration file.
Contains TypeScript declarations and generates JSONSchema files for the CloudCannon configuration file.
npm i -D @cloudcannon/configuration-types
The primary use of this package is to validate your configuration file. You can also use it to autocomplete and read inline documention while editing. Here are some suggested workflows below.
We plan to add the configuration schema to JSON Schema Store, which would automatically enable in-editor validation, autocomplete and tooltips with the YAML or JSON LSP enabled.
Alternatively, you can add a comment to the top of your file to use a specific schema for YAML files:
# yaml-language-server: $schema=https://raw.githubusercontent.com/CloudCannon/configuration-types/main/build/cloudcannon-config.json
collections_config:
posts:
name: Blog
icon: event
Or the top-level $schema
entry for JSON files:
{
"$schema": "https://raw.githubusercontent.com/CloudCannon/configuration-types/main/build/cloudcannon-config.json",
"collections_config": {
"posts": {
"name": "Blog",
"icon": "event"
}
}
}
You could also/alternatively validate the file on the command line with something like ajv-cli:
npm i @cloudcannon/configuration-types ajv-cli
npm run ajv validate -s node_modules/@cloudcannon/configuration-types/cloudcannon-config.json -d cloudcannon.config.yml
For a CommonJS formatted configuration file (e.g. /cloudcannon.config.cjs
), you can use a JSDoc comment to indicate the type of the module export:
/** @type {import("@cloudcannon/configuration-types").Configuration} */
const config = {
collections_config: {
posts: {
name: 'Blog',
icon: 'event',
},
},
};
module.exports = config;
Then use the TypeScript LSP in your supported editor, ensuring it is set up to check JavaScript files. This would provide in-editor validation, autocomplete and tooltips as you modify the file.
You could also/alternatively run tsc
over your file to validate there are no issues outside of your editor:
npx tsc test/cloudcannon.config.js --allowJs --checkJs --noEmit
Install dependencies:
npm i
Build JSONSchema files:
npm run build
MIT
FAQs
Contains TypeScript declarations and generates JSONSchema files for the CloudCannon configuration file.
The npm package @cloudcannon/configuration-types receives a total of 41 weekly downloads. As such, @cloudcannon/configuration-types popularity was classified as not popular.
We found that @cloudcannon/configuration-types demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Critics call the Node.js EOL CVE a misuse of the system, sparking debate over CVE standards and the growing noise in vulnerability databases.
Security News
cURL and Go security teams are publicly rejecting CVSS as flawed for assessing vulnerabilities and are calling for more accurate, context-aware approaches.
Security News
Bun 1.2 enhances its JavaScript runtime with 90% Node.js compatibility, built-in S3 and Postgres support, HTML Imports, and faster, cloud-first performance.