
Product
Introducing Module Reachability: Focus on the Vulnerabilities That Matter
Module Reachability filters out unreachable CVEs so you can focus on vulnerabilities that actually matter to your application.
isomorphic-rslog
Advanced tools
A tiny, intuitive, type-friendly logger for Node.js/Browser.
# with npm
npm add isomorphic-rslog
# with yarn
yarn add isomorphic-rslog
# with pnpm
pnpm add isomorphic-rslog
# with bun
bun add isomorphic-rslog
// with require
const { logger } = require('isomorphic-rslog');
// with import
import { logger } from 'isomorphic-rslog';
// A gradient welcome log
logger.greet(`\n➜ Rslog v1.0.0\n`);
// Info
logger.info('This is a info message');
// Start
logger.start('This is a start message');
// Warn
logger.warn('This is a warn message');
// Ready
logger.ready('This is a ready message');
// Success
logger.success('This is a success message');
// Error
logger.error('This is a error message');
logger.error(new Error('This is a error message with stack'));
// Debug
logger.debug('This is a debug message');
// Same as console.log
logger.log('This is a log message');
You can create a new logger instance through createLogger
and specify the log level:
import { createLogger } from 'isomorphic-rslog';
const logger = createLogger({ level: 'warn' });
// Will print
logger.error('This is a error message');
logger.warn('This is a warn message');
// Will not print
logger.info('This is a info message');
logger.log('This is a log message');
You can also directly modify the level attribute of the logger instance:
logger.level = 'verbose';
The log levels of each method are as follows:
Level | Method |
---|---|
error | error |
warn | warn |
info | info , start , ready , success |
log | log |
verbose | debug |
You can create a new logger instance through createLogger
and specify the label prefix:
import { createLogger } from 'isomorphic-rslog';
const logger = createLogger({ level: 'warn' });
const logger = createLogger({
labels: {
warn: '[ Prefix ] Warn',
error: '[ Prefix ] Error',
success: '[ Prefix ] Success',
info: '[ Prefix ] Info',
ready: '[ Prefix ] Ready',
debug: '[ Prefix ] Debug',
},
});
logger.info('this is an info message');
logger.warn('this is a warn message');
logger.ready('this is a ready message');
logger.debug('this is a debug message');
logger.success('this is a success message');
You can use logger.override
to override some or all methods of the default logger.
import { logger } from 'isomorphic-rslog';
logger.override({
log: message => {
console.log(`[LOG] ${message}`);
},
info: message => {
console.log(`[INFO] ${message}`);
},
warn: message => {
console.log(`[WARN] ${message}`);
},
error: message => {
console.log(`[ERROR] ${message}`);
},
});
isomorphic-rslog
provides both CommonJS and ESModule output and supports Node.js >= 14.
isomorphic-rslog
is fork from rslog.
isomorphic-rslog
is built with Modern.js.
The color implementation of isomorphic-rslog
are modified from alexeyraspopov/picocolors.
isomorphic-rslog
is MIT licensed.
FAQs
A tiny, intuitive, type-friendly logger for Node.js/Browser.
The npm package isomorphic-rslog receives a total of 666,203 weekly downloads. As such, isomorphic-rslog popularity was classified as popular.
We found that isomorphic-rslog demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Module Reachability filters out unreachable CVEs so you can focus on vulnerabilities that actually matter to your application.
Company News
Socket is bringing best-in-class reachability analysis into the platform — cutting false positives, accelerating triage, and cementing our place as the leader in software supply chain security.
Product
Socket is introducing a new way to organize repositories and apply repository-specific security policies.