Gathering detailed insights and metrics for @types/inquirer-fuzzy-path
Gathering detailed insights and metrics for @types/inquirer-fuzzy-path
Gathering detailed insights and metrics for @types/inquirer-fuzzy-path
Gathering detailed insights and metrics for @types/inquirer-fuzzy-path
The repository for high quality TypeScript type definitions.
npm install @types/inquirer-fuzzy-path
Typescript
Module System
TypeScript (99.84%)
JavaScript (0.15%)
Shell (0.01%)
Total Downloads
0
Last Day
0
Last Week
0
Last Month
0
Last Year
0
NOASSERTION License
50,023 Stars
89,737 Commits
30,435 Forks
640 Watchers
6 Branches
9,957 Contributors
Updated on Jul 12, 2025
Latest Version
2.3.9
Package Id
@types/inquirer-fuzzy-path@2.3.9
Unpacked Size
7.64 kB
Size
2.36 kB
File Count
5
Published on
Nov 07, 2023
Cumulative downloads
Total Downloads
Last Day
0%
NaN
Compared to previous day
Last Week
0%
NaN
Compared to previous week
Last Month
0%
NaN
Compared to previous month
Last Year
0%
NaN
Compared to previous year
2
npm install --save @types/inquirer-fuzzy-path
This package contains type definitions for inquirer-fuzzy-path (https://github.com/adelsz/inquirer-fuzzy-path).
Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/inquirer-fuzzy-path.
1import { Answers, KeyUnion, QuestionCollection } from "inquirer"; 2import { AutocompleteQuestionOptions } from "inquirer-autocomplete-prompt"; 3import InquirerAutocomplete = require("inquirer-autocomplete-prompt"); 4import { Interface as ReadlineInterface } from "readline"; 5 6export = InquirerFuzzyPath; 7 8/** 9 * Provides the functionality to create a new Inquirer plugin 10 */ 11declare class InquirerFuzzyPath<T extends Answers> extends InquirerAutocomplete<T> { 12 /** 13 * Create new InquirerFuzzyPath 14 * 15 * @param questions 16 * The questions to prompt 17 * @param rl 18 * The readline interface 19 * @param answers 20 * The currently supplied answers 21 */ 22 constructor(questions: QuestionCollection<T>, rl: ReadlineInterface, answers: Answers); 23 24 /** 25 * Curate list of choices. 26 * 27 * @param searchTerm 28 * The term to search for 29 */ 30 search(searchTerm: string): Promise<void>; 31 32 /** 33 * When user presses `enter` key 34 * 35 * @param line 36 * The input on the line. 37 */ 38 onSubmit(line: string): void; 39} 40 41/** 42 * Provides inquirer prompt options for type `InquirerFuzzyPath`. 43 */ 44declare namespace InquirerFuzzyPath { 45 /** 46 * Provides options for a question of type `InquirerFuzzyPath`. 47 * 48 * @template T 49 * The type of the answers. 50 */ 51 interface FuzzyPathQuestionOptions<T extends Answers = Answers> 52 extends Partial<Omit<AutocompleteQuestionOptions<T>, "type">> 53 { 54 /** 55 * The key to save the answer to the answers-hash. 56 */ 57 type: "fuzzypath"; 58 59 /** 60 * The key to save the answer to the answers-hash. 61 */ 62 name: KeyUnion<T>; 63 64 /** 65 * The root search directory, default to ".". 66 */ 67 rootPath?: string | undefined; 68 69 /** 70 * A function to exclude some paths from the file-system scan. 71 */ 72 excludePath?: ((path: string) => boolean) | undefined; 73 74 /** 75 * A function to exclude some paths from the final list. 76 */ 77 excludeFilter?: ((path: string) => boolean) | undefined; 78 79 /** 80 * A string to specify the type of nodes to display, default to "any". 81 */ 82 itemType?: "any" | "directory" | "file" | undefined; 83 84 /** 85 * An integer (>= 0) to limit the depth of sub-folders to scan, 86 * undefined means infinite. 87 */ 88 depthLimit?: number | undefined; 89 } 90} 91
These definitions were written by 迷子 (Maiko Tan).
No vulnerabilities found.
Reason
30 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 10
Reason
security policy file detected
Details
Reason
no dangerous workflow patterns detected
Reason
0 existing vulnerabilities detected
Reason
no binaries found in the repo
Reason
Found 27/30 approved changesets -- score normalized to 9
Reason
license file detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 8
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
project is not fuzzed
Details
Score
Last Scanned on 2025-07-07
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More