Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
angular-ui-mask
Advanced tools
Apply a mask on an input field so the user can only type pre-determined pattern.
Apply a mask on an input field so the user can only type pre-determined pattern.
You can get it from Bower
bower install angular-ui-mask
Load the script files in your application:
<script type="text/javascript" src="bower_components/angular/angular.js"></script>
<script type="text/javascript" src="bower_components/angular-ui-mask/dist/mask.js"></script>
Add the specific module to your dependencies:
angular.module('myApp', ['ui.mask', ...])
Also you can use it as CommonJS or ES6 module with any build system that supports those type of modules (Webpack, SystemJS, JSPM etc):
npm install angular-ui-mask
And then include it with
// CommonJS
var uiMask = require('angular-ui-mask');
angular.module('myApp', [uiMask, ...]);
// ES6 module
import uiMask from 'angular-ui-mask';
angular.module('myApp', [uiMask, ...]);
You can customize several behaviors of ui-mask by taking advantage of the ui-options
object. Declare ui-options
as an additional attribute on the same element where you declare ui-mask
.
Inside of ui-options
, you can customize these four properties:
maskDefinitions
- default: { '9': /\d/, 'A': /[a-zA-Z]/, '*': /[a-zA-Z0-9]/ }
,clearOnBlur
- default: true
,clearOnBlurPlaceholder
- default: false
,eventsToHandle
- default: ['input', 'keyup', 'click', 'focus']
When customizing eventsToHandle
or clearOnBlur
, the value you supply will replace the default. To customize eventsToHandle
, be sure to replace the entire array.
When setting clearOnBlurPlaceholder
to true
, it will show the placeholder text instead of the empty mask. It requires the ui-mask-placeholder
attribute to be set on the input to display properly.
Whereas, maskDefinitions
is an object, so any custom object you supply will be merged together with the defaults using angular.extend()
. This allows you to override the defaults selectively, if you wish.
The keys in maskDefinitions
represent the special tokens/characters used in your mask declaration to delimit acceptable ranges of inputs. For example, we use '9' here to accept any numeric values for a phone number: ui-mask="(999) 999-9999"
. The values associated with each token are regexen. Each regex defines the ranges of values that will be acceptable as inputs in the position of that token.
We use Karma and jshint to ensure the quality of the code. The easiest way to run these checks is to use gulp:
npm install -g gulp-cli
npm install && bower install
gulp
The karma task will try to open Firefox and Chrome as browser in which to run the tests. Make sure this is available or change the configuration in karma.conf.js
gulp watch
will automatically test your code and build a release whenever source files change.
Use gulp to bump version, build and create a tag. Then push to GitHub:
gulp release [--patch|--minor|--major]
git push --tags origin master # push everything to GitHub
Travis will take care of testing and publishing to npm's registry (bower will pick up the change automatically). Finally create a release on GitHub from the tag created by Travis.
FAQs
Apply a mask on an input field so the user can only type pre-determined pattern.
The npm package angular-ui-mask receives a total of 13,694 weekly downloads. As such, angular-ui-mask popularity was classified as popular.
We found that angular-ui-mask demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.