
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
module-importer
Advanced tools
The module-importer is a fully featured tool for bulk loading modules. It provides support for loading modules locally (peer loading), including any other directory on the filesystem, filtering, and direct loading of individual modules.
The module-importer loads all specified modules into an object that has a collection of keys (keys are the filenames converted to camelcase) and the contents of each module. In addition each imports
object has a property imports._loadedModules
that contains more detailed information on every module loaded.
npm install module-importer
This package has some built-in tests to verify functionality. Tests use Mocha and Chai.
npm install --dev
npm test
To make full use of the module-importer you can pass an options object upon instantiation.
var imports = new Importer({
//opts
});
boolean
Flag for including peer modulesfunction|regex|string
Filters out modules based on relative path to executing scriptArray[objects]
Array of option objects that specifies where else to look for modulesstring
Path of the file or folder to include. Can be relative or absolute.boolean
Indicates if the path should be loaded directly as a single module(see above)
string
Spoofs location path of executing scriptstring
Spoofs file name of executing scriptDetailed information on what modules were loaded and where they were loaded from is located in the _loadedModules
property on imports
if(!imports.error){
console.log(imports._loadedModules)
}
var Importer = require('module-import');
//load all local (peer) modules
var imports = new Importer();
if(!imports.error){
//do something with loaded modules
}else{
//handle error
}
//load all local (peer) modules
var imports = new Importer({
//only load models in current directory
filter: /model/g
});
//loads only non-peer modules
var imports = new Importer({
includeLocal: false,
includes:[{
//load all controllers
//that dont't start with dev
path:'../controllers',
filter: function(path){
if(path.indexOf('dev') !== 0) return true;
}
},{
//also load the authentication module
path:'../lib/authentication',
direct:true
}]
});
TODO: Document Common Usage With Express
Copyright (c) 2015, Alexander Wolden
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
FAQs
Bulk import of node modules
We found that module-importer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.