Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
@matrixai/async-init
Advanced tools
Asynchronous initialization and deinitialization decorators for JavaScript/TypeScript applications.
Because decorators are experimental, you must enable: "experimentalDecorators": true
in your tsconfig.json
to use this library.
TypeScript does not allow decorator properties that are protected or private.
Example Usage:
import { CreateDestroyStartStop, ready } from '@matrixai/async-init/dist/CreateDestroyStartStop';
// this hack is necessary to ensure that X's type is decorated
interface X extends CreateDestroyStartStop {};
@CreateDestroyStartStop(new Error('Running'), new Error('Destroyed'))
class X {
protected y: Y;
public static async createX(
{
y
}: {
y?: Y
} = {}
) {
y = y ?? await Y.createY();
const x = new X({ y });
await x.start();
return x;
}
public constructor ({ y }: { y: Y }) {
this.y = y;
}
public async start(): Promise<void> {
await this.y.start();
console.log('X started');
}
public async stop(): Promise<void> {
await this.y.stop();
console.log('X stopped');
}
public async destroy(): Promise<void> {
await this.y.destroy();
console.log('X destroyed');
}
@ready(new Error('Not Running'))
public async doSomething() {
await this.y.doSomething();
console.log('X did something');
}
}
// this hack is necessary to ensure that Y's type is decorated
interface Y extends CreateDestroyStartStop {};
@CreateDestroyStartStop(new Error('Running'), new Error('Destroyed'))
class Y {
public static async createY() {
return new Y;
}
public constructor () {
}
public async destroy(): Promise<void> {
console.log('Y destroyed');
}
@ready(new Error('Not Running'))
public async doSomething(): Promise<void> {
console.log('Y did something');
}
}
async function main () {
const x = await X.createX();
await x.doSomething();
await x.stop();
await x.destroy();
console.log(x);
}
main();
The start
, stop
, and destroy
calls are all concurrent-controlled with RWLock
. They are idempotent and they are mutually exclusive between each other and any blocking ready
decorated methods. Decorated methods can block start
, stop
, and destroy
, but share a read lock between each other.
Refer to https://gist.github.com/CMCDragonkai/1dbf5069d9efc11585c27cc774271584 for further the motivation of this library.
npm install --save @matrixai/async-init
Run nix-shell
, and once you're inside, you can use:
# install (or reinstall packages from package.json)
npm install
# build the dist
npm run build
# run the repl (this allows you to import from ./src)
npm run ts-node
# run the tests
npm run test
# lint the source code
npm run lint
# automatically fix the source
npm run lintfix
npm run docs
See the docs at: https://matrixai.github.io/js-async-init/
# npm login
npm version patch # major/minor/patch
npm run build
npm publish --access public
git push
git push --tags
FAQs
Asynchronous Initialisation and Deinitialisation Decorators
The npm package @matrixai/async-init receives a total of 2,894 weekly downloads. As such, @matrixai/async-init popularity was classified as popular.
We found that @matrixai/async-init demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.