
Product
Introducing Pull Request Stories to Help Security Teams Track Supply Chain Risks
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
config-templator
Advanced tools
Dynamic replacement in object, inspired by GruntJS config
Install the module with: npm install config-templator
(Coming soon)
Flatten:
var config = { foo: 'bar', baz: '<%= bar %>' };
var config-templator = require('config-templator');
config = config-templator.flatten(config); // { foo: 'bar', baz: 'bar' }
Get:
config = config-templator.get(config, 'baz'); // bar
var config = { port: 3000, uri: 'localhost:<%= port %>' };
var config-templator = require('config-templator');
config = config-templator.get(config, 'uri'); // localhost:3000
In lieu of a formal styleguide, take care to maintain the existing coding style. Add unit tests for any new or changed functionality. Lint and test your code using Grunt.
(Nothing yet)
Copyright (c) 2013 Loic Mahieu. Licensed under the MIT license.
FAQs
Dynamic replacement in object, inspired by GruntJS config
The npm package config-templator receives a total of 33 weekly downloads. As such, config-templator popularity was classified as not popular.
We found that config-templator demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Pull Request Stories give security teams clear visibility into dependency risks and outcomes across scanned pull requests.
Research
/Security News
npm author Qix’s account was compromised, with malicious versions of popular packages like chalk-template, color-convert, and strip-ansi published.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.