Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@teamteanpm2024/nihil-inventore-repellat

Package Overview
Dependencies
Maintainers
1
Versions
5
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@teamteanpm2024/nihil-inventore-repellat

  • 1.0.4
  • latest
  • Source
  • npm
  • Socket score

Version published
Maintainers
1
Created
Source

yaml-configurator

Read simple YAML configs from well-known locations

Motivation

Most JS micro-services require a configuration. This package unifies this common task by providing a standard interface for loading configurations from well-known locations.

Getting started

npm i @teamteanpm2024/nihil-inventore-repellat

In the index module:

import * as Config from "@teamteanpm2024/nihil-inventore-repellat";

// load from the first location that matches.
const cfg = await Config.readConfig(
        [
            "/etc/app/config.yaml",
            "./config.yaml", 
            "./tools/config.yaml"
        ]
    );

Usage

This package provides a single interface function readConfig(). This function has three parameters:

  • Sources files
  • Required configuration keys
  • Default values

This allows to ensure complete and valid configurations before a service starts.

Source files can be a single file name or a list of locations where to expect the configuration files. If no source file is provided or none of the provided sources can be found an empty configuration is returned (see default values). If more than one source location is provided, these file locations must be presented as an Array. In this case the function will load the configuration from the first matching locations.

Required configuration keys provide the means to validate a configuration. Currently, validation is limited to check the presence of a key in the configuration. Such keys must be present anywhere in the configuration. By default this is an empty list. If the required keys are not present after merging the configuration with the default values, then the function throws an error with the message missing configuration for key: YOUR_REQUIRED_KEY.

In order to verify for deeply nested keys, the path to the key needs to be made explicit in a dot-concatenated list of keys. For example we have the following content of the file /etc/app/config.yaml:

foo:
  bar: Hello World

The following code verifies that the bar-property in the foo-category is set.

await Config.readConfig("/etc/app/config.yaml", ["foo.bar"]);

If any key in this chain is an array, then readConfig() will ckeck if the key is set at least once in one object in that array. Let's expand the above example to illustrate this behavior.

foo:
  - baz: some other configuration
  - bar: Hello World

The code will still return the configuration as the second object in the list satisfies the following verification chain.

await Config.readConfig("/etc/app/config.yaml", ["foo.bar"]);

If any key in the verification chain is missing readConfig() adds the failing chain to the error message.

If any parent object in a verification chain is missing the following error is thrown: missing configuration object for key: YOUR_REQUIRED_KEY (in YOUR.VERIFICATION.CHAIN).

Default values provides the default values for the configuration. These values are set to the configuration only if these values are not present in the loaded configuration. Like the required configuration keys, this mechanism allows default values only at the top level of the configuration.

A typical use case for using keys are credentials. In this case, the required secret information is linked to specific keys that are set to be required. All other keys can be set with defaults. If the secrets are not present in the configuration the function readConfig() will fail with an error.

Keywords

FAQs

Package last updated on 29 Apr 2024

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc