
Product
Introducing Socket Firewall: Free, Proactive Protection for Your Software Supply Chain
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
@lillallol/outline-pdf-cjs
Advanced tools
Add outline to outline-less pdf. Works in node and does not have any dependency on other programming languages.
NOTICE: If you have outlined your pdf using a version from 1.0.0 to 1.0.4, then if you edit your pdf it will get corrupted due to a bug introduced by @lillallol/outline-pdf. From version 1.0.5 this bug has been resolved.
Like @lillallol/outline-pdf but with a higher level API that takes advantage of the node file system.
npm install @lillallol/outline-pdf-cjs
import { outlinePdfCjs } from "@lillallol/outline-pdf";
await outlinePdfCjs({
loadPath: "path/to/pdf/to/outline.pdf",
savePath: "path/to/save/outlined.pdf",
// first column : page number
// negative for collapsing outline
// second column : outline depth
// third column : outline title
outline: `
1||Title 1
2|-|Title 2
-3|--|Title 3
4|---|Title 4
5|---|Title 5
6|-|Title 6
7||Title 7
`,
});
1.0.5
CHANGELOG.md
FAQs
Add outline to outline-less pdf. Works in node and does not have any dependency on other programming languages.
We found that @lillallol/outline-pdf-cjs demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket Firewall is a free tool that blocks malicious packages at install time, giving developers proactive protection against rising supply chain attacks.
Research
Socket uncovers malicious Rust crates impersonating fast_log to steal Solana and Ethereum wallet keys from source code.
Research
A malicious package uses a QR code as steganography in an innovative technique.