1
0
Fork 0
forked from svrjs/svrjs
This repository has been archived on 2024-11-10. You can view files and clone it, but cannot push or open issues or pull requests.
svrjs/node_modules/get-intrinsic
2024-08-26 08:36:01 +02:00
..
.github Add node_modules 2023-07-29 20:33:28 +02:00
test Add node_modules 2023-07-29 20:33:28 +02:00
.eslintrc Add node_modules 2023-07-29 20:33:28 +02:00
.nycrc Add node_modules 2023-07-29 20:33:28 +02:00
CHANGELOG.md Update to SVR.JS 3.15.7 2024-08-26 08:36:01 +02:00
index.js Update to SVR.JS 3.15.7 2024-08-26 08:36:01 +02:00
LICENSE Add node_modules 2023-07-29 20:33:28 +02:00
package.json Update to SVR.JS 3.15.7 2024-08-26 08:36:01 +02:00
README.md Add node_modules 2023-07-29 20:33:28 +02:00

get-intrinsic Version Badge

github actions coverage dependency status dev dependency status License Downloads

npm badge

Get and robustly cache all JS language-level intrinsics at first require time.

See the syntax described in the JS spec for reference.

Example

var GetIntrinsic = require('get-intrinsic');
var assert = require('assert');

// static methods
assert.equal(GetIntrinsic('%Math.pow%'), Math.pow);
assert.equal(Math.pow(2, 3), 8);
assert.equal(GetIntrinsic('%Math.pow%')(2, 3), 8);
delete Math.pow;
assert.equal(GetIntrinsic('%Math.pow%')(2, 3), 8);

// instance methods
var arr = [1];
assert.equal(GetIntrinsic('%Array.prototype.push%'), Array.prototype.push);
assert.deepEqual(arr, [1]);

arr.push(2);
assert.deepEqual(arr, [1, 2]);

GetIntrinsic('%Array.prototype.push%').call(arr, 3);
assert.deepEqual(arr, [1, 2, 3]);

delete Array.prototype.push;
GetIntrinsic('%Array.prototype.push%').call(arr, 4);
assert.deepEqual(arr, [1, 2, 3, 4]);

// missing features
delete JSON.parse; // to simulate a real intrinsic that is missing in the environment
assert.throws(() => GetIntrinsic('%JSON.parse%'));
assert.equal(undefined, GetIntrinsic('%JSON.parse%', true));

Tests

Simply clone the repo, npm install, and run npm test

Security

Please email @ljharb or see https://tidelift.com/security if you have a potential security vulnerability to report.