Security News
JSR Working Group Kicks Off with Ambitious Roadmap and Plans for Open Governance
At its inaugural meeting, the JSR Working Group outlined plans for an open governance model and a roadmap to enhance JavaScript package management.
require-object-coercible-x
Advanced tools
ES6-compliant shim for RequireObjectCoercible.
Requires ES3 or above.
See: 7.2.1 RequireObjectCoercible ( argument )
Version: 1.2.0
Author: Xotic750 Xotic750@gmail.com
License: MIT
Copyright: Xotic750
module.exports(value)
⇒ string
⏏The abstract operation RequireObjectCoercible throws an error if argument is a value that cannot be converted to an Object using ToObject.
Kind: Exported function
Returns: string
- The value
.
Throws:
TypeError
If value
is a null
or undefined
.Param | Type | Description |
---|---|---|
value | * | The value to check. |
Example
var RequireObjectCoercible = require('require-object-coercible-x');
RequireObjectCoercible(); // TypeError
RequireObjectCoercible(null); // TypeError
RequireObjectCoercible('abc'); // 'abc'
RequireObjectCoercible(true); // true
RequireObjectCoercible(Symbol('foo')); // Symbol('foo')
FAQs
ES6-compliant shim for RequireObjectCoercible.
The npm package require-object-coercible-x receives a total of 2,387 weekly downloads. As such, require-object-coercible-x popularity was classified as popular.
We found that require-object-coercible-x demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
At its inaugural meeting, the JSR Working Group outlined plans for an open governance model and a roadmap to enhance JavaScript package management.
Security News
Research
An advanced npm supply chain attack is leveraging Ethereum smart contracts for decentralized, persistent malware control, evading traditional defenses.
Security News
Research
Attackers are impersonating Sindre Sorhus on npm with a fake 'chalk-node' package containing a malicious backdoor to compromise developers' projects.