Installations
npm install @rpai/wdio-logger
Developer Guide
Typescript
Yes
Module System
CommonJS, ESM, UMD
Node Version
20.15.0
NPM Version
10.7.0
Releases
Contributors
Languages
TypeScript (94.43%)
JavaScript (3.32%)
EJS (1.46%)
CSS (0.69%)
Gherkin (0.06%)
Dockerfile (0.03%)
Vue (0.01%)
Developer
Download Statistics
Total Downloads
489
Last Day
1
Last Week
10
Last Month
34
Last Year
489
GitHub Statistics
9,159 Stars
7,774 Commits
2,532 Forks
215 Watching
27 Branches
615 Contributors
Bundle Size
466.00 B
Minified
296.00 B
Minified + Gzipped
Package Meta Information
Latest Version
1.0.3
Package Id
@rpai/wdio-logger@1.0.3
Unpacked Size
32.15 kB
Size
8.89 kB
File Count
14
NPM Version
10.7.0
Node Version
20.15.0
Publised On
27 Sept 2024
Total Downloads
Cumulative downloads
Total Downloads
489
Last day
-50%
1
Compared to previous day
Last week
-23.1%
10
Compared to previous week
Last month
385.7%
34
Compared to previous month
Last year
0%
489
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
4
WDIO Logger Utility
A helper utility for logging of WebdriverIO packages
This package is used across all WebdriverIO packages to log information using the loglevel
package. It can also be used for any other arbitrary Node.js project.
Install
To install the package just call
1npm install @wdio/logger
or when adding it to a WebdriverIO subpackage:
1lerna add @wdio/logger --scope <subpackage>
Usage
The package exposes a logger function that you can use to register an instance for your scoped package:
1import logger from '@wdio/logger' 2 3const log = logger('myPackage') 4log.info('some logs')
For more info see loglevel
package on NPM.
Custom Log Levels
This package extends the log levels available in loglevel
by introducing a new level called progress
.
The progress
level is particularly useful when you need to dynamically update a specific line in the terminal. For example, it can be utilized to display the download progress of browsers or drivers.
Notably, the progress
level is equivalent to the info
level. Therefore, if you set the log level to error
or silent
, any progress
logs will be suppressed.
It's important to mention that progress
writes directly to process.stdout
, and these logs won't be captured in any log files.
To ensure consistent formatting with subsequent logs while using progress
, it's essential to clear it at the end. To do so, simply call progress
with an empty string, which will clear the last line:
log.progress('')
Illustrative Usage of Progress
1import logger from '@wdio/logger'; 2 3const log = logger('internal'); 4 5const totalSize = 100; 6let uploadedSize = 0; 7 8const uploadInterval = setInterval(() => { 9 const chunkSize = 10; 10 uploadedSize += chunkSize; 11 const data = `Progress: ${(uploadedSize * 100) / totalSize}%`; 12 log.progress(data); 13 if (uploadedSize >= totalSize) { 14 clearInterval(uploadInterval); 15 log.progress(''); // Called at the end to maintain the alignment of subsequent logs. 16 console.log('Upload complete.'); 17 } 18}, 100);
No vulnerabilities found.
Reason
30 commit(s) and 24 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
security policy file detected
Details
- Info: security policy file detected: .github/SECURITY.md:1
- Info: Found linked content: .github/SECURITY.md:1
- Info: Found disclosure, vulnerability, and/or timelines in security policy: .github/SECURITY.md:1
- Info: Found text in security policy: .github/SECURITY.md:1
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
binaries present in source code
Details
- Warn: binary detected: e2e/browser-runner/wasm/add.wasm:1
Reason
badge detected: Passing
Reason
Found 6/28 approved changesets -- score normalized to 2
Reason
dependency not pinned by hash detected -- score normalized to 2
Details
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/authorize.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/authorize.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/cr.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/cr.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/cr.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/cr.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/expense.yml:51: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/expense.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/publish.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/publish.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/publish.yml:45: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/publish.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/publish.yml:46: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/publish.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-cloud.yml:49: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/test-cloud.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-component.yml:52: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/test-component.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-launch.yml:34: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/test-launch.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-multiremote.yml:34: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/test-multiremote.yml/main?enable=pin
- Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test-testrunner.yml:36: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/test-testrunner.yml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/update.yaml:22: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/update.yaml/main?enable=pin
- Warn: third-party GitHubAction not pinned by hash: .github/workflows/update.yaml:30: update your workflow using https://app.stepsecurity.io/secureworkflow/webdriverio/webdriverio/update.yaml/main?enable=pin
- Warn: containerImage not pinned by hash: .devcontainer/Dockerfile:1: pin your Docker image by updating mcr.microsoft.com/devcontainers/javascript-node:0-18 to mcr.microsoft.com/devcontainers/javascript-node:0-18@sha256:ed57dd8755b4e75a0426bd10ab1d3a60a22bb21fc2e093801375990978c42fb5
- Warn: containerImage not pinned by hash: .gitpod/dev.dockerfile:1: pin your Docker image by updating gitpod/workspace-node to gitpod/workspace-node@sha256:efb5a80c171761d1584ded29524bb629e294ac29082ff3fe3ab0f1e045fa475b
- Warn: npmCommand not pinned by hash: .devcontainer/Dockerfile:22-26
- Warn: npmCommand not pinned by hash: .gitpod/dev.dockerfile:14-15
- Info: 16 out of 25 GitHub-owned GitHubAction dependencies pinned
- Info: 0 out of 5 third-party GitHubAction dependencies pinned
- Info: 0 out of 2 containerImage dependencies pinned
- Info: 0 out of 2 npmCommand dependencies pinned
Reason
detected GitHub workflow tokens with excessive permissions
Details
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/expense.yml:45
- Warn: jobLevel 'contents' permission set to 'write': .github/workflows/publish.yml:36
- Warn: no topLevel permission defined: .github/workflows/authorize.yml:1
- Warn: no topLevel permission defined: .github/workflows/build.yml:1
- Warn: no topLevel permission defined: .github/workflows/cr.yml:1
- Info: topLevel 'contents' permission set to 'read': .github/workflows/deploy.yml:8
- Warn: no topLevel permission defined: .github/workflows/expense.yml:1
- Warn: no topLevel permission defined: .github/workflows/labeler.yml:1
- Warn: no topLevel permission defined: .github/workflows/publish.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-cloud.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-component.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-interop.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-launch.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-multiremote.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-smoke.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-standalone.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-static.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-testrunner.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-typings.yml:1
- Warn: no topLevel permission defined: .github/workflows/test-unit.yml:1
- Warn: no topLevel permission defined: .github/workflows/test.yml:1
- Warn: topLevel 'contents' permission set to 'write': .github/workflows/update.yaml:11
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 16 are checked with a SAST tool
Reason
16 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-pxg6-pf52-xh8x
- Warn: Project is vulnerable to: GHSA-pfrx-2q88-qq97
- Warn: Project is vulnerable to: GHSA-p6mc-m468-83gw
- Warn: Project is vulnerable to: GHSA-c76h-2ccp-4975
- Warn: Project is vulnerable to: GHSA-qwcr-r2fm-qrc7
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-qw6h-vgh9-j6wx
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55
- Warn: Project is vulnerable to: GHSA-9wv6-86v2-598j
- Warn: Project is vulnerable to: GHSA-rhx6-c78j-4q9w
- Warn: Project is vulnerable to: GHSA-gcx4-mw62-g8wm
- Warn: Project is vulnerable to: GHSA-m6fv-jmcg-4jfg
- Warn: Project is vulnerable to: GHSA-cm22-4g7w-348p
- Warn: Project is vulnerable to: GHSA-4vvj-4cpr-p986
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
Score
4.9
/10
Last Scanned on 2025-01-20
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More