Security News
tea.xyz Spam Plagues npm and RubyGems Package Registries
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
blister
Advanced tools
Readme
Minimalist dependency injection container for JavaScript, inspired by Fabien Potencier's Pimple.
The package is available as a UMD module: compatible with AMD, CommonJS and exposing a global variable Blister
in dist/blister.min.js
(910 bytes minified and gzipped).
It can be installed via npm (for both Node.js and browserify/webpack), Bower or downloading it from the repository:
npm install blister
bower install blister
var Blister = require('blister');
require(['blister'], function(Blister) {
// Usage
});
<script src="bower_components/blister/dist/blister.min.js"></script>
<script>var Blister = window.Blister;</script>
var container = new Blister();
Raw values can be stored in the container. The registered parameters is what the container returns when the dependency is requested.
If the dependency is not a function, the parameter is optional.
Example:
container.set('protocol', 'http://' /*, container.VALUE */);
container.get('protocol'); //> 'http://'
container.set('randomFn', Math.random, container.VALUE);
container.get('randomFn'); //> function random() { [native code] }
Dependencies can be registered as a singleton functions. Those functions are executed the first time the associated dependency is requested. The result of the functions is returned and cached for subsequent calls.
All the dependencies specified as functions are singletons by default.
Example:
container.set('host', function(c) {
console.log('called');
return c.get('protocol') === 'http://' ?
'example.com' : 'secure.example.com';
} /*, container.SINGLETON */);
container.get('host'); //> 'example.com'
// called
container.get('host'); //> 'example.com'
Dependencies can also be registered as factory functions. Those functions are executed every time the dependency is requested.
Example:
container.set('timestamp', function() {
return Date.now();
}, container.FACTORY);
container.get('timestamp'); 1431773272660
container.get('timestamp'); 1431773281953
Dependencies already defined in the container can be modified or extended. That functionality can be useful, for example, to add plugins to a service.
If both the extension and the original definitions were functions, the extension inherits the type of dependency (SINGLETON or FACTORY) by default.
Example:
container.set('some-service', function() {
return service;
});
// after that definition
container.extend('some-service', function(c, service) {
service.addLogger(c.get('logger'));
});
container.get('service'); //> singleton service with logger
If the previous dependency is not used in the definition of the extension, it can be replaced using set
instead.
Service providers can be used to help organizing the registration of dependencies. A service provider is any object implementing a register
method.
Example:
var provider = {
register: function(container) {
container.set('protocol', 'http://');
container.set('host', 'example.com');
}
};
var container = new Blister();
container.register(provider);
To generate the code documentation of the project:
npm run doc
To run the tests of the project, clone the repository and execute:
npm install && npm test
git clone https://github.com/rubennorte/blister.git
git checkout -b my-new-feature
git commit -am 'Add some feature'
npm run build
git push origin my-new-feature
FAQs
Minimalist dependency injection container for JavaScript
The npm package blister receives a total of 142 weekly downloads. As such, blister popularity was classified as not popular.
We found that blister demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Tea.xyz, a crypto project aimed at rewarding open source contributions, is once again facing backlash due to an influx of spam packages flooding public package registries.
Security News
As cyber threats become more autonomous, AI-powered defenses are crucial for businesses to stay ahead of attackers who can exploit software vulnerabilities at scale.
Security News
UnitedHealth Group disclosed that the ransomware attack on Change Healthcare compromised protected health information for millions in the U.S., with estimated costs to the company expected to reach $1 billion.