Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
blister
Advanced tools
Readme
Minimalist dependency injection container for JavaScript.
The package is available as a UMD module: compatible with AMD, CommonJS and exposing a global variable Blister
in dist/blister.min.js
(1.2 KB minified and gzipped).
It can be installed via npm (for both Node.js and browserify/webpack), Bower or downloading it from the repository:
npm install blister
bower install blister
var Blister = require('blister');
require(['blister'], function(Blister) {
// Usage
});
<script src="bower_components/blister/dist/blister.min.js"></script>
<script>var Blister = window.Blister;</script>
var container = new Blister();
Example:
container.value('name', 'Robert');
container.get('name'); //> 'Robert'
container.has('name'); //> true
Raw values can be stored in the container. The registered parameters is what the container returns when the dependency is requested.
Example:
container.value('protocol', 'http://');
container.get('protocol'); //> 'http://'
container.value('randomFn', Math.random);
container.get('randomFn'); //> function random() { [native code] }
Dependencies can be registered as a singleton functions. Those functions are executed the first time the associated dependency is requested. The result of the functions is returned and cached for subsequent calls.
Example:
container.service('host', function(c) {
console.log('called');
return c.get('protocol') === 'http://' ?
'example.com' : 'secure.example.com';
});
container.get('host'); //> 'example.com'
// called
container.get('host'); //> 'example.com'
Dependencies can also be registered as factory functions. Those functions are executed every time the dependency is requested.
Example:
container.factory('timestamp', function() {
return Date.now();
});
container.get('timestamp'); 1431773272660
container.get('timestamp'); 1431773281953
Dependencies already defined in the container can be modified or extended. That functionality can be useful, for example, to add plugins to a service.
The extension preserves the type of the original dependency (factory or service).
Example:
container.service('some-service', function() {
return service;
});
// after that definition
container.extend('some-service', function(service, c) {
service.addLogger(c.get('logger'));
});
container.get('service'); //> singleton service with logger
If the previous dependency is not used in the definition of the extension, it can be replaced using value
, factory
or service
instead.
Service providers can be used to help organizing the registration of dependencies. A service provider is any object implementing a register
method.
Example:
var provider = {
register: function(container) {
container.value('protocol', 'http://');
container.value('host', 'example.com');
}
};
var container = new Blister();
container.register(provider);
Some scenarios may require different instances of a DI container. For example, we may want to have different DI containers to handle different requests of a server (having specific dependencies for the current request).
In order to be able to define global dependencies and context-specific dependencies, we can create a new context from a container, which is just a container that inherits dependencies from the original one.
Example:
var container = new Blister();
container.service('logger', function() {
return 'system logger';
});
var context = container.createContext();
context.get('logger'); // 'system logger'
context.service('logger', function() {
return 'request logger';
});
context.get('logger'); // 'request logger'
IMPORTANT:
If you have dependencies in a container that should use dependencies from a sub-context when accessing through it, define them as factories instead of as services.
All the dependencies of a given service are fetched from the context where the service is defined:
var container = new Blister();
container.service('logger', function(c) {
return c.get('scope') + ' logger';
});
container.value('scope', 'system');
var context = container.createContext();
context.value('scope', 'request');
context.get('logger'); // 'system logger';
container.get('logger'); // 'system logger';
This is because services are cached in the scope where they are defined (to make them a system-wide singleton as expected), so accessing a dependency of the context would make the service inconsistent in the scope of the container (as it would use a dependency of a specifc sub-context).
This problem does not exist in factories, because they do not have this kind of side-effects (they are not cached):
var container = new Blister();
container.factory('logger', function(c) {
return c.get('scope') + ' logger';
});
container.value('scope', 'system');
var context = container.createContext();
context.value('scope', 'request');
context.get('logger'); // 'request logger';
container.get('logger'); // 'system logger';
To generate the code documentation of the project:
npm run doc
To run the tests of the project, clone the repository and execute:
npm install && npm test
git clone https://github.com/rubennorte/blister.git
git checkout -b my-new-feature
git commit -am 'Add some feature'
npm run build
git push origin my-new-feature
FAQs
Minimalist dependency injection container for JavaScript
The npm package blister receives a total of 137 weekly downloads. As such, blister popularity was classified as not popular.
We found that blister demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.