
Product
Announcing Bun and vlt Support in Socket
Bringing supply chain security to the next generation of JavaScript package managers
@instructure/babel-plugin-transform-imports
Advanced tools
This will convert any non-default imports that are referencing the package only to reference the full path to the module instead. For example:
---
type: code
---
// a named member import:
import { Text } from '@instructure/ui-elements'
would be converted to
---
type: code
---
// a named import using the full module path:
import { Text } from '@instructure/ui-elements/lib/Text'
Note that any default imports you are currently using will not be transformed:
---
type: code
---
// a default import using the full path (will not be transformed):
import Text from '@instructure/ui-elements/lib/Text'
Note that this plugin will fail if the exported name is not the filename! This means that it cannot handle multiple exports from the same file.
A babel plugin made by Instructure Inc.
npm install @instructure/babel-plugin-transform-imports
FAQs
A babel plugin made by Instructure Inc.
The npm package @instructure/babel-plugin-transform-imports receives a total of 1,524 weekly downloads. As such, @instructure/babel-plugin-transform-imports popularity was classified as popular.
We found that @instructure/babel-plugin-transform-imports demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 41 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Bringing supply chain security to the next generation of JavaScript package managers

Product
A safer, faster way to eliminate vulnerabilities without updating dependencies

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.