Security News
Cloudflare Adds Security.txt Setup Wizard
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
Using npm:
$ npm install hashmap
Using bower:
$ bower install hashmap
You can download the last stable version from the releases page.
If you like risk, you can download the latest master version, it's usually stable.
To run the tests:
$ npm test
This project provides a HashMap
class that works both on Node.js and the browser.
HashMap instances store key/value pairs allowing keys of any type.
Unlike regular objects, keys will not be stringified. For example numbers and strings won't be mixed, you can pass Date
's, RegExp
's, DOM Elements, anything! (even null
and undefined
)
get(key:*) : *
returns the value stored for that key.set(key:*, value:*) : void
stores a key-value pairhas(key:*) : Boolean
returns whether a key is set on the hashmapsearch(value:*) : *
returns key under which given value is stored (null
if not found)remove(key:*) : void
deletes a key-value pair by keytype(key:*) : String
returns the data type of the provided key (used internally)keys() : Array<*>
returns an array with all the registered keysvalues() : Array<*>
returns an array with all the valuescount() : Number
returns the amount of key-value pairsclear() : void
removes all the key-value pairs on the hashmaphash(key:*) : String
returns the stringified version of a key (used internally)forEach(function(value, key))
iterates the pairs and calls the function for each oneAssume this for all examples below
var map = new HashMap();
If you're using this within Node, you first need to import the class
var HashMap = require('hashmap').HashMap;
map.set("some_key", "some value");
map.get("some_key"); // --> "some value"
map.set("1", "string one");
map.set(1, "number one");
map.get("1"); // --> "string one"
A regular Object
used as a map would yield "number one"
var key = {};
var key2 = {};
map.set(key, 123);
map.set(key2, 321);
map.get(key); // --> 123
A regular Object
used as a map would yield 321
map.set(1, "test 1");
map.set(2, "test 2");
map.set(3, "test 3");
map.forEach(function(value, key) {
console.log(key + " : " + value);
});
The MIT License (MIT)
Copyright (c) 2014 Ariel Flesler
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF
1.2.0
FAQs
HashMap Class for JavaScript
The npm package hashmap receives a total of 10,421 weekly downloads. As such, hashmap popularity was classified as popular.
We found that hashmap demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.
Security News
The Socket Research team breaks down a malicious npm package targeting the legitimate DOMPurify library. It uses obfuscated code to hide that it is exfiltrating browser and crypto wallet data.
Security News
ENISA’s 2024 report highlights the EU’s top cybersecurity threats, including rising DDoS attacks, ransomware, supply chain vulnerabilities, and weaponized AI.