
Security News
Next.js Patches Critical Middleware Vulnerability (CVE-2025-29927)
Next.js has patched a critical vulnerability (CVE-2025-29927) that allowed attackers to bypass middleware-based authorization checks in self-hosted apps.
chainify-object
Advanced tools
make an object's functions chainable.
var chainify = require('chainify-object');
var chain = chainify({
add: function(a, b) { return a + b; },
multiply: function(a, b) { return a * b; }
});
chain(2)
.add(3)
.multiply(5)
.add(5)
.multiply(2)
(); // 60
chainify(obj[, opts])
Returns a chainable version of the given object.
When the chainable is invoked, a chain is started. A chain consists of 'curried' versions of the original object's enumerable function properties. Each function invoked in the chain will be curried with the chain's current value, and its result used as the chain's new value. The given value will be used as the starting value for the chain. When the chain is invoked directly, its value is returned:
var chained = chainify({add: function(a, b) { return a + b; }});
chained(2)
.add(3)
.add(5);
() // 10
The chain's value can be reset explicitly by invoking the chain directly with a value:
var chained = chainify({});
var chain = chain(2);
chain(); // 2
chain(3);
chain(); // 3
If obj
is a function, it will be invoked at the start of the chain. Its return value will be used as the starting value of the chain:
function thing(a, b) { return a + b; }
thing.multiply = function(a, b) { return a * b; };
var chained = chainify(thing);
chained(2, 3)
.multiply(4)
(); // 20
if 'exits'
is provided as an option, the functions with the given names will return the chain's current value instead of returning the chain:
var chained = chainify(
{foo: function(v) { return v * 10; }},
{exits: ['foo']});
chained(2).foo(); // 20
if 'get'
is provided as an option, it will be used as a hook whenever the chain's value is requested:
var chained = chainify({}, {get: function(v) { return v * 10; }})
var chain = chained(2);
chain(); // 20
if 'set'
is provided as an option, it will be used as a hook whenever the chain's value is changed:
var chained = chainify({}, {set: function(v) { return v * 10; }})
var chain = thing(2);
chain(); // 20
chain(3);
chain(); // 30
obj
's properties can be accessed directly from the chainable:
var obj = {
foo: 2,
bar: 3,
baz: {},
quux: function() {}
};
var chained = chainify(obj);
chained.foo === obj.foo; // true
chained.bar === obj.bar; // true
chained.baz === obj.baz; // true
chained.quux === obj.quux; // true
You can use this library as the npm package chainify-object
:
npm i chainify-object
# or
yarn add chainify-object
It can be used in both es-module-aware and commonjs bundlers/environments.
// es module
import chainifyObject from 'chainify-object'
// commonjs
const chainifyObject = require('chainify-object')
It can also be used a <script>
:
<script crossorigin src="https://unpkg.com/chainify-object/dist/umd/chainify-object.js"></script>
<script>
chainifyObject()
</script>
FAQs
make an object's functions chainable
The npm package chainify-object receives a total of 0 weekly downloads. As such, chainify-object popularity was classified as not popular.
We found that chainify-object demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Next.js has patched a critical vulnerability (CVE-2025-29927) that allowed attackers to bypass middleware-based authorization checks in self-hosted apps.
Security News
A survey of 500 cybersecurity pros reveals high pay isn't enough—lack of growth and flexibility is driving attrition and risking organizational security.
Product
Socket, the leader in open source security, is now available on Google Cloud Marketplace for simplified procurement and enhanced protection against supply chain attacks.