Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
A string template renderer for JavaScript without memory leaks. It supports referencing variables by position, by name. One can access properties and array elements.
const render = require('ez-string');
let book;
// Format using variable's position
book = render('One of my favorite books is "{0}" by {1}.', 'The Name of the Wind', 'Patrick Rothfuss');
// book = 'One of my favorite books is "The Name of the Wind" by Patrick Rothfuss.'
// Format using variable's name
// Variable names must use A-Za-z0-9$_
book = render('One of my favorite books is "{title}" by {author}.',
{ title: 'The Name of the Wind', author: 'Patrick Rothfuss'});
// book = 'One of my favorite books is "The Name of the Wind" by Patrick Rothfuss.'
// Curly braces are escaped by using double braces
let example;
example = render('{{title}}');
// example = '{title}'
// One can use array indices
book = render('"{arr[0]}" was first published in {arr[1]}.',
{ arr: ['The Hobbit', 1937]});
// book = '"The Hobbit" was first published in 1937.'
// One can use object properties.
// Properties with names consisting of A-Za-z0-9$_ can be accessed using property notation
// Properties with other names can be accessed using index notation
book = render('"{book.title}" was written by {book.author["first name"]} {book.author["last name"]}. It was published in {book.year}.', {
book: {
title: 'Marina',
year : 1999,
author: {
'first name': 'Carlos',
'last name': 'Zafon'
}
}
});
// book = '"Marina" was written by Carlos Zafon. It was published in 1999.'
// If a property name contains a quote character or backslash, they need to be escaped.
// Quotes are prepended by a backslash
// Backslashes need to be doubled
example = render('{data["\\\\"]}', {
data: {'\\': 'backslash'}
});
// example = 'backslash'
example = render('{data["\\""]}', {
data: {'"': 'quote'}
});
// example = 'quote'
Using NodeJS:
$ npm i --save ez-string
const render = require('ez-string');
let book;
// Format using variable's position
book = render('One of the best books by {author} is "{title}".', {
author: 'Stephen King',
title: '11/22/63'
});
// book = 'One of the best books by Stephen King is "11/22/63".'
In a browser:
<!-- Load library which is UMD packed -->
<script src="ez-string.js"></script>
<script>
const render = require('ez-string');
let book;
// Format using variable's position
book = render('One of the best books by {author} is "{title}".', {
author: 'Stephen King',
title: '11/22/63'
});
// book = 'One of the best books by Stephen King is "11/22/63".'
</script>
The most important reason is that this library doesn't leak memory.
Many of the existing template renderers perform a two-step process. They compile a string template into a JavaScript function and then execute it while passing context data. However, most users of such libraries rarely cache the resulting compiled function. Instead they may compile the same template again and again. Due to inticacies of NodeJS memory garbage collection. Such pattern usually results in a memory leak, as described by Meteor developers.
Library documentation is here.
FAQs
A string template renderer for JavaScript without memory leaks.
The npm package ez-string receives a total of 0 weekly downloads. As such, ez-string popularity was classified as not popular.
We found that ez-string demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.