+4
-0
@@ -0,1 +1,5 @@ | ||
| # 1.3.0 Touching Base | ||
| - Alternative way to provide image paths using `base64` values | ||
| # 1.2.8 Scoped Terminal | ||
@@ -2,0 +6,0 @@ |
+2
-2
@@ -14,3 +14,3 @@ { | ||
| }, | ||
| "version": "1.2.9", | ||
| "version": "1.3.0", | ||
| "licenses": "MIT", | ||
@@ -37,4 +37,4 @@ "keywords": [ | ||
| "mustache": "~0.8.0", | ||
| "ultramarked": "^1.0.2" | ||
| "ultramarked": "^1.3.1" | ||
| } | ||
| } |
+8
-0
@@ -175,2 +175,10 @@ ![campaign.png][9]  | ||
| Instead of a `file` you can provide a `data` value with the base64 encoded data, and avoid the overhead of creating a temporary file. If you choose this approach you must set the `mime` property as well. | ||
| ```js | ||
| [ | ||
| { name: 'housing', mime: 'image/png', data: buff.toString('base64') } | ||
| ] | ||
| ``` | ||
| ### `social` | ||
@@ -177,0 +185,0 @@ |
@@ -29,2 +29,5 @@ 'use strict'; | ||
| function encoder (image, transformed) { | ||
| if (image.data && image.mime) { | ||
| transformed(null, image); return; | ||
| } | ||
| encode(image.file, function (err, encoded) { | ||
@@ -31,0 +34,0 @@ if (err) { return transformed(err); } |
@@ -101,2 +101,5 @@ 'use strict'; | ||
| function reallyReallySend (apiModel, next) { | ||
| var cpy = JSON.parse(JSON.stringify(apiModel,null,2)) | ||
| cpy.images = cpy.images.map(function (i){i.content=i.content.slice(0,30); return i;}); | ||
| console.log(JSON.stringify(cpy,null,2)); | ||
| client.messages.send(apiModel, function (response) { | ||
@@ -103,0 +106,0 @@ next(null, response); |
+1
-1
@@ -7,3 +7,3 @@ 'use strict'; | ||
| }); | ||
| var template = '<p>Your password reset key is: {{reset}}</p>'; | ||
| var template = '<p>Your <i>password reset key</i> is: <b>{{reset}}</b></p>'; | ||
| var model = { | ||
@@ -10,0 +10,0 @@ to: 'someone@important.com', |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
45067
1.6%421
1.45%419
1.95%Updated